Running head: HONEYPOT
Honeypots are fake servers and artificial systems deployed alongside the main systems
with the intention of tricking hackers into hacking the false system. The principal value of a
honeypot is getting hacked (Zhuge et all,2007).Honeypots are one of the few methods used to
deceive attackers and study their behavior Organizations are increasingly using honeypots to
detect the presence of attackers. The defenders can observe the attackers safely where they do
little harm, and learn more about their tactics. Honeypots are used to learn attacker's methods to
fine tune the organization's defences appropriately.
Honeypot systems can be defined as decoy system setups or decoy servers that aim to
gather information about an intruder or an attacker into a system. This technology does not
replace other traditional security systems but is meant to be an additional level of security.
Honeypot technology is a valuable tool for researching new malware and attack (Zhuge et all,
2007). The technology aids in determining the types of vulnerabilities and attacks that exist and
allow the examination and identification of new vulnerabilities. Attackers and malicious coders
are aware of this technology and try their best to develop countermeasures of this technology.
However, security technologies keep building new and better honeypots.
A honeypot is a setup to be easy prey for attackers than actual production systems but
with system modifications so that their attacking activity can be logged and traced. Since
attackers always look for easy or s...