GET THE APP

..

Journal of Computer Science & Systems Biology

ISSN: 0974-7230

Open Access

The Use of Honeynets to Detect Exploited Systems Across the Wireless Networks

Abstract

Mahmood I*

Any to internet is target of hackers and intruders. Every organization/institution system connected uses some kind of network security software to protect its data from unauthorized use. Software’s used by organization/institution are antivirus firewall etc. There are many types of services that are run on organization/institution networks and it is important to detect intrusion. Due to large bandwidth, monitoring is very hard and impossible. In developing, where the cyber-crimes are very easy to commit and there are not very strong lows Honeynet scheme, is use to help system administrator in detecting intrusion or malicious content. Honey net is so proposed solution because it helps in understanding the intention and ways attacker use to compromise security systems. In this paper a basic honeynet framework is proposed.

PDF

Share this article

Google Scholar citation report
Citations: 2279

Journal of Computer Science & Systems Biology received 2279 citations as per Google Scholar report

Journal of Computer Science & Systems Biology peer review process verified at publons

Indexed In

 
arrow_upward arrow_upward