全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Proficient and Secure Path For Data Communication Using Honey Pot Method And Encrypted IP Address With Randomizing In Cryptographical Algorithm

Full-Text   Cite this paper   Add to My Lib

Abstract:

Core of the organizations data is available in the back end server. Securing the data from unauthorized people and transmitting the data to the authorized person through a secure route is the aim of the organization. A protective model for back-end servers is accomplished by the novel combination of honeypot deployment, honeypot masquerading, and strict authentication for back-end server access. In our approach, a solution that has been catching on in the network security and computer incident response environment is to employ “Honey Pots.” Honey Pots, also known as deception systems, honey-pots or tar-pits, are phony components setup to entice unauthorized users by presenting numerous system vulnerabilities, while attempting to restrict unauthorized access to network information systems. These features include suspicious event alerts to a management workstation for visual and audible notification, the ability to capture the unauthorized user’s keystrokes and send it to a remote server, various customized logging and bogus system files and information to have the unauthorized user waste time as the security administrator prepares a counter measure.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413