Hello, I am through with the work. Have a look at it. Thank you.
Running Head: HONEYPOTS
Name of Student
Name of Professor
The need to keep the network safe and secured is highly needed nowadays, especially with
the growth in the attacks numbers. According to Grimes (2005), Honeypots is windows based
interaction solution. Basically, Honeypot makes a protected environment to interact and capture
with unwanted network traffic. A honeypot is a best and easy solution for network security studies
or as part of an early warning intrusion detection system (IDS). The logging ability of a honeypot
is far more than some other system security tools and catches raw packet level data even including
the keystrokes and errors made by attackers. Honeypots are becoming one of the main tools for
security to monitor the latest exploits and tricks of hackers by recording the hackers move so the
security society can more quickly to respond to the new exploits. According to Danchenko,
Prokofiev and Silnov (2017), the technology of honeypot is seamless for analysts, as it adds lots
of benefits such as; the expressive usage need; easy installation, conf...