Implementation of a Honey Pot Security Mechanism on a Raspberry Pi

  • Unique Paper ID: 144364
  • Volume: 3
  • Issue: 10
  • PageNo: 238-240
  • Abstract:
  • In the modern day, most of the enterprises have decided to move their services to a web based system which is more convenient and easily accessible to all the customers. With the advent of Internet of Things, several thousand more devices transmit data through the internet to perform various tasks that optimize our issues. These devices can provide a possible security loophole for unauthorized or illegal access. These peripheral devices that transmit data over a network and this security loophole is what we plan to address by implementing a honey pot mechanism on these very devices and neutralise any intrusion attempts through these access points. This paper in essence discusses a possible mechanism to deal with the security threats that are evolving due to the internet of things.
email to a friend

Cite This Article

  • ISSN: 2349-6002
  • Volume: 3
  • Issue: 10
  • PageNo: 238-240

Implementation of a Honey Pot Security Mechanism on a Raspberry Pi

Related Articles