CS Department, Aptech Computer Education, Wah Cantonment, Punjab, Pakistan
Research Article
The Use of Honeynets to Detect Exploited Systems Across the Wireless
Networks
Author(s): Mahmood I*
Any to internet is target of hackers and intruders. Every organization/institution system connected uses some
kind of network security software to protect its data from unauthorized use. Software’s used by organization/institution
are antivirus firewall etc. There are many types of services that are run on organization/institution networks and it is
important to detect intrusion. Due to large bandwidth, monitoring is very hard and impossible. In developing, where
the cyber-crimes are very easy to commit and there are not very strong lows Honeynet scheme, is use to help
system administrator in detecting intrusion or malicious content. Honey net is so proposed solution because it helps
in understanding the intention and ways attacker use to compromise security systems. In this paper a basic honeynet
framework is proposed... Read More»
Journal of Computer Science & Systems Biology received 2279 citations as per Google Scholar report