A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.
A honeynet is a network set up with intentional vulnerabilities hosted on a decoy server to attract hackers.
Types of Honeypots
Types of honeypots:
- Low availability
- High availability
A low availability honeypot usually emulates a small amount of internet protocols and network services, just enough to deceive the attacker and no more. It is more cost-effective than a high availability honeypot.
A high availability honeypot provides an attacker real systems to attack, making it far less likely they will guess they are being diverted or observed.
Honeypot-related Tools
Honeypot-related tools featured on this post:
- Honeypot tools
- Honeypot detection tools
Honeypot Tools
You can find a list of honeypot tools on this post.
Honeypot Detection Tools
You can find a list of honeypot detection tools on this post.
You might also be interested in…
External References
- Igor Livshitz; “What’s the Difference Between a High Interaction Honeypot and a Low Interaction Honeypot?“; Akamai, 2019-01-03
- Honeynet
- “honeynet“