Published February 5, 2025 | Version v1
Journal article Open

Emerging Trends in Honeypot Research: A Review of Applications and Techniques

  • 1. Department of Computer Science and Informatics, Central University of Himachal Pradesh, India

Description

Honeypots are decoys in cybersecurity, where a system is set up to attract and monitor cyber intruders. These systems appear vulnerable but are isolated and monitored, emulating the entire real world, for example, databases or IOT devices. To gain insight into their tactics, attackers interact with these decoys. Security teams can fortify their defences by learning about these emerging threats. Honeypots are classified on the basis of interaction offered. A low-interaction honeypot will only record the most basic attacks. High-interaction honeypots, in contrast, allow attackers to be interacted with on a higher level, yielding more insight as to how they operate. By adopting this approach early, organizations can better understand how they might be targeted by potential attackers. Besides enabling the early detection of threats, they publish decoys that honeypots distract attackers away from actual systems. But they fail to catch all attacks, particularly those that do not engage the decoy. Honeypots must be kept current to remain effective against rapidly evolving threats.

Files

IJHCI-Paper-01-V3i6.pdf

Files (265.6 kB)

Name Size Download all
md5:79931740661810688da5afab4dac352b
265.6 kB Preview Download