preview

Decoy-Based Honey Pot

Decent Essays

In this ever changing world of global data communication, inexpensive Internet connection and fast paced software development, security has become more and more of an issue. Security is one of the basic requirements in today's world as any type of interaction and storage of data on the internet is becoming unassertive. Protecting the information access and data integrity are the basic security characteristics of computer security. A decoy based technology, Honey pot along with a Raspberry Pi makes network security cost effective and easy to implement. This paper is devoted to implement a Raspberry Pi based Honey pot in a network that will attract attackers by simulating vulnerabilities and poor security. Honey

Get Access