Implementation of Honeynet and Honeypot in Network Infrastructure in Production Network
By: Nawshad Ahmed Evan, Md Raihan Uddin
Potential Business Impact:
Catches hackers by tricking them with fake computer systems.
Network infrastructure in a production environment is increasingly targeted by attackers every day. Many resources and services now rely on the internet, making network infrastructure one of the most critical parts to protect, as it hosts numerous company resources and services. Several solutions have already been proposed to prevent attacks, minimize damage, and divert hackers and intruders. Among these, the honeypot stands out as a highly effective tool; it is designed to mimic both a scanner and an attacker, diverting and misleading them within a simulated, production-level environment. This paper will demonstrate the use of a honeynet where a honeypot acts like a real resource to deceive the attacker and analyze their behavior.
Similar Papers
A Cyber-Twin Based Honeypot for Gathering Threat Intelligence
Cryptography and Security
Protects water plants by tricking hackers.
Characterizing Large-Scale Adversarial Activities Through Large-Scale Honey-Nets
Cryptography and Security
Catches hackers trying to break into computers.
A Practical Honeypot-Based Threat Intelligence Framework for Cyber Defence in the Cloud
Cryptography and Security
Blocks computer hackers automatically and instantly.