Overview

A honeypot is a system that appears to be a high-value target (e.g., a database or server) but is actually isolated and closely monitored. Any interaction with a honeypot is considered suspicious.

Types

  • Low-interaction Honeypots: Simulate only certain services and are easy to deploy.
  • High-interaction Honeypots: Run real operating systems and applications to provide more detailed information about attacker behavior.
  • Honeynets: A network of multiple honeypots.

Benefits

  • Early warning of new attack techniques.
  • Diverting attackers away from real assets.
  • Gathering intelligence for threat research.

Related Terms