Honey Potting using Containerization Technique

DOI: https://doi.org/10.46610/JONSCN.2022.v08i02.004

Authors

  • Mr. Gaurav Purswani
  • Mr. Raunak Parashar
  • Mr. Hemanth N
  • Mr. Raja Kumar Singh
  • Ms. Divya C D

Keywords:

Attack, Honeypots, Hybrid, Intrusion Detection System, Network

Abstract

In this paper, we overview the latest benefits of honeypots. Few outstanding plans and their analysis is specified. The facts related to honeypots in schooling and hybrid surroundings with the Intrusion Detection System were specified. In this paper, we specify the use of the signature approach in honeypots for visitor analysis. In this, we summarize all these features. Containerization encourages a few functions to run machine kernel that is Name spaces and control organizations. These are some Linux kernel capabilities that permit separation of process and whilst these kernel functions had been addressed one after the other with the purpose to develop lightweight, OS-level virtualization, Docker changed into evolved.

Published

2022-07-08

Issue

Section

Articles