Student Seminar Report & Project Report With Presentation (PPT,PDF,DOC,ZIP)

Full Version: technical seminar topics for ece honeypots abstract
You're currently viewing a stripped down version of our content. View the full version with proper formatting.

Guest

Hi am NAKUL GIRI i would like to get details on technical seminar topics for ece honeypots abstract. Please do send them on my mail- "nakul90411[at]gmail.com".
Honeypots, exciting new technology allows us to turn the tables on the bad guys. There has been a growing demand and interest in the field of honeypot technology.  A honeypot is used in the field of network security. Acts as bait for potential attackers; the honeypot in turn collects as much data as possible on the attacker to help determine their identity. A primary objective of this document is to show the possibilities of honeypots and their use in a research and production environment.

A honeypot is much better at discovering suspicious intruders than an intrusion detection system. Honeypots have a great advantage when they do not generate false traffic reports, making it more difficult for intruders to detect the device.

As global communication increases day by day in importance, so do computer crimes. Countermeasure has been developed to detect and prevent intrusions by analyzing known facts and attack patterns. Like the military, where it is imperative to know your enemy and your strategies and tools, computer security experts also need to know what your intruders are doing, what tools they are using, and where they are. If one knows this information, counter strategies can be more efficient and optimized. And one of Honeypot's main goals is to collect this information.

A honeypot is primarily a device that gathers information to learn from it. Their main goal is to camouflage themselves from the community of black hats so they can be caught with their hands in the dough. The honeypot silently gathers information such as, its attack patterns, programs used, as well as information about the black hat community. There are other ways a honeypot helps intrusion detection. A honeypot can detect intruders while making an attack and gathering information about them.

Although honey pots are good for preventing intrusions, they are not a perfect solution to prevent computer crime. They are difficult to maintain and administrators need a good understanding of operating systems and network security. In the right hands, a honeypot has immense power to eradicate the crime of the black hat community, but in the wrong hands, it becomes an instrument that takes advantage of the black hat community to commit crimes.