Score: 0

Implementation of Honeynet and Honeypot in Network Infrastructure in Production Network

Published: December 8, 2025 | arXiv ID: 2512.07180v1

By: Nawshad Ahmed Evan, Md Raihan Uddin

Potential Business Impact:

Catches hackers by tricking them with fake computer systems.

Business Areas:
Intrusion Detection Information Technology, Privacy and Security

Network infrastructure in a production environment is increasingly targeted by attackers every day. Many resources and services now rely on the internet, making network infrastructure one of the most critical parts to protect, as it hosts numerous company resources and services. Several solutions have already been proposed to prevent attacks, minimize damage, and divert hackers and intruders. Among these, the honeypot stands out as a highly effective tool; it is designed to mimic both a scanner and an attacker, diverting and misleading them within a simulated, production-level environment. This paper will demonstrate the use of a honeynet where a honeypot acts like a real resource to deceive the attacker and analyze their behavior.

Country of Origin
🇺🇸 United States

Page Count
8 pages

Category
Computer Science:
Networking and Internet Architecture