UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 3
March-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2403917


Registration ID:
535165

Page Number

j94-j99

Share This Article


Jetir RMS

Title

Multi-Service Honeypot: Comprehensive Network Security Monitoring and Deception Framework

Abstract

The field of cybersecurity faces a never-ending barrage of new attacks. Defenders usually concentrate on strengthening their perimeter defenses and don't pay attention to the attackers' evolving strategies. Examining current approaches for using honeynets to detect and prevent cyberattacks is the primary objective of this field's research. There are two that are especially fascinating techniques that focus on demonstrating empirically that honeypots—more precisely, Multi-service Honeypots—offer a proactive defense. The idea behind honeypots and their variations, such as Multi-service Honeypot, is to mimic a controlled environment to be able to entice an attacker and provide important details regarding any security holes in the system. Security experts can strengthen the defenses defending their company's IT systems by keeping an eye on the TTPs that attackers utilization in the regulated honeypot configuration and networks from possible online dangers. Under the pretense of purposeful deceit, honeypot’s function. They give the impression of being trustworthy systems, complete with information or weaknesses that draw in bad actors. But in reality, they have a secret goal: to learn more about threat actors that interact with the honeypot. When threat actors use the honeypot in this way, they unintentionally give the defenders recorded interactions that provide crucial details regarding the attack tactics, tools, and procedures (TTP) they employ.

Key Words

Deception, attacker behavior, tactics, techniques, and procedures (TTPs), multi-service honeypot, and system vulnerabilities.

Cite This Article

"Multi-Service Honeypot: Comprehensive Network Security Monitoring and Deception Framework", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 3, page no.j94-j99, March-2024, Available :http://www.jetir.org/papers/JETIR2403917.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Multi-Service Honeypot: Comprehensive Network Security Monitoring and Deception Framework", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 3, page no. ppj94-j99, March-2024, Available at : http://www.jetir.org/papers/JETIR2403917.pdf

Publication Details

Published Paper ID: JETIR2403917
Registration ID: 535165
Published In: Volume 11 | Issue 3 | Year March-2024
DOI (Digital Object Identifier):
Page No: j94-j99
Country: Khammam, Telangana, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00024

Print This Page

Current Call For Paper

Jetir RMS