Claim Missing Document
Check
Articles

Found 2 Documents
Search

PortaX Secure Automation System Using IoT: A Survey Shivamadhu, Gagan Deep; Venkatesh, Aditya; Alva, Aishwarya; Nausheer, Daniya; Devi K. A, Sumithra
International Journal of Recent Technology and Applied Science (IJORTAS) Vol 2 No 1 (2020)
Publisher : Lamintang Education and Training Centre, in collaboration with the International Association of Educators, Scientists, Technologists, and Engineers (IA-ESTE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36079/lamintang.ijortas-0201.61

Abstract

In recent times, everything around us is automated. People are looking to make things easier and easier day by day, by reducing the work they do, but not reduce the efficiency of work. The most important thing in this technically forward world, is, what we mentioned above i.e. Automation and Security. Travel needs a lot of automation in this day and age, especially Airports. The idea of a bag can check-in by itself, and tell us where it is and deprive us of the worry of continuously checking or thinking if the luggage is okay, is just a dream for most people.
HONEYPOT: Intrusion Detection System Akshay, Akshat Divya; Bhushan, Anchit; Anand, Nihal; Khemka, Rishabh; Devi K. A, Sumithra
International Journal of Education, Science, Technology, and Engineering (IJESTE) Vol 3 No 1 (2020)
Publisher : Lamintang Education and Training Centre, in collaboration with the International Association of Educators, Scientists, Technologists, and Engineers (IA-ESTE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36079/lamintang.ijeste-0301.66

Abstract

The number of computers connecting to the internet is getting increased day by day, while the number of computers connected is increasing then it is obvious that the amount of network-based attacks will also increase. In this way, we use a honeypot that is a framework trap that is set to act against unapproved utilization of PCs and data frameworks. Around the globe, a huge number of individuals get to the web each day, honeypot which can likewise be called Intrusion Detection Technology is another time of security innovation that screens device to avoid malicious sports. The whole factor of this research paper is an Intrusion Detection System and Intrusion Prevention System, elements accomplished via honeypot and honeytrap methodologies. A great deal of research went into this review paper and the discoveries propose that the honeypots are drawing in light of a legitimate concern for analysts as a significant security system that can be actualized to stop or occupy the assaults the system assaults and give a chance to find out increasingly more about the source and nature of these assaults. Hence we can say that a honeypot can be utilized as an examination apparatus to accumulate increasingly more data about the expanding number of system assaults that are going on consistently.