14-02-2017, 11:06 AM
A honeypot is a computer system that is configured to act as a decoy to attract cyber attack, and to detect, divert or study attempts to gain unauthorised access to information systems. Generally, it consists of a computer, applications and data that simulate the behaviour of a real system that seems to be part of a network, but which is actually isolated and closely controlled. All communications with a honeypot are considered hostile, since there is no reason for legitimate users to access a honeypot. Viewing and logging this activity can provide insight into the level and types of threats a network infrastructure faces while distracting attackers from real-valued assets.
In the area of computer security and Internet uses a Honeypot. It is a resource used to catch attacks, records intrusion information about events in the piracy process and prevents attacks that leave the compromised computer system. It can also be deployed to lure and divert an attacker from their actual targets. The document describes the classification and types of Honeypots and the possible solution of use in a research, as well as the productive environment. Honeypot is an active defence system for network security. It traps attacks, logs intrusion information about tools and activities of the piracy process. Located in or out of the firewall, Honeypot is used to learn about the intruder technique, as well as determine the vulnerabilities in the real system.