To search, Click below search items.

 

All Published Papers Search Service

Title

Comparison of Honeypot System, Types, and Tools

Author

Muhammad Junaid Iqbal, Muhammad Usman Ahmed, Muhammad Asaf

Citation

Vol. 23  No. 11  pp. 169-177

Abstract

Network security is now more crucial than ever for consumers, companies, and military clients. Security has elevated to the top of the priority list since the Internet's creation. The evolution of security technology is now better understood. The area of community protection as a whole is broad and dynamic. News from the days before the internet and more recent advancements in community protection are both included in the topic of observation. Recognize current research techniques, previous Defence strategies that were significant, and network attack techniques that have been used before. The security of various domain names is the subject of this article's description of bibliographic research.

Keywords

Internet, information security, and bibliography research

URL

http://paper.ijcsns.org/07_book/202311/20231121.pdf