Honeypot - An Adaptive Security Method to Combat Cybercrime

Authors

  • Varun Bansal, Dr. Tarun Kumar Sharma, Sumika Jain, Dr. Mahipal Singh

Abstract

Honeypot machines are designed to mimic the system to mislead intruders into the actual system in two layers. An administrator can monitor the activity of trespass by a honeypot machine in first layer to lure an intruder. Keeping this view in mind, we have proposed a two layer Honeypot on system to monitor the various viruses and intruders. After scanning the user activity in real time, the intruder will be under observation and data of intruder will be used as Evidence for cybercrime.

Keywords: DMZ, Honeypot, Virtual Machine, IDS

Published

2021-03-02

Issue

Section

Articles