Honeypot - An Adaptive Security Method to Combat Cybercrime
Honeypot machines are designed to mimic the system to mislead intruders into the actual system in two layers. An administrator can monitor the activity of trespass by a honeypot machine in first layer to lure an intruder. Keeping this view in mind, we have proposed a two layer Honeypot on system to monitor the various viruses and intruders. After scanning the user activity in real time, the intruder will be under observation and data of intruder will be used as Evidence for cybercrime.
Keywords: DMZ, Honeypot, Virtual Machine, IDS