Description : Many solutions have been arrived at in the past to counter the problem of intruders in a network among which Firewalls were predominantly ruling. However with rapid growth of the Internet, hackers and attackers are provided with the ability to inflict major damage to organizationâ„¢s vital data. Attackers are forever in the process of developing new tools to exploit applications necessary for an organization to maintain an Internet presence. As methods to overcome or exploit the firewall are employed by them, it becomes mandatory that more advanced and layered security technologies be employed to protect against hacker attacks. A technology that has gained momentum attention from industry analysts and trade media is Decoy-based intrusion protection, otherwise known as "Honey pot" technology. This technology is used to contain and control an attack and resembles deception techniques employed in warfare that divert enemies into attacking false troops or airfields. Systems here can defend against attacks on network assets from attackers raging a war on the enterprise for information. Honey pots were used by researchers and generally placed outside the firewall to discover hackers on a network system. Using Honeypots, researchers could study the tactics, tools, movements, and behavior of intruders. Today honeypots play an important part in enterprise security. This paper defines honeypots, describes their advantages, and outlines how they act as complementary components of an overall intrusion protection strategy.
Technologies : java ,Swing