Preprint Article Version 1 This version is not peer-reviewed

Honeypots in Cybersecurity: Their Analysis, Evaluation and Importance

Version 1 : Received: 12 August 2024 / Approved: 13 August 2024 / Online: 13 August 2024 (14:14:03 CEST)

How to cite: Moric, Z.; Mršić, L.; Kunić, Z.; Đambić, G. Honeypots in Cybersecurity: Their Analysis, Evaluation and Importance. Preprints 2024, 2024080946. https://doi.org/10.20944/preprints202408.0946.v1 Moric, Z.; Mršić, L.; Kunić, Z.; Đambić, G. Honeypots in Cybersecurity: Their Analysis, Evaluation and Importance. Preprints 2024, 2024080946. https://doi.org/10.20944/preprints202408.0946.v1

Abstract

Honeypots are vital security tools that enable cybersecurity specialists to scrutinize the tactics employed by attackers. By doing so, they can get valuable insights into existing and upcoming internet dangers. Cyber-attacks are in a perpetual evolution, increasingly sophisticated and tailored to exploit specific vulnerabilities. Hence, it is imperative for both organizations and individuals not only to consider but also implement methods to safeguard themselves against cyberattacks and malware. This paper assesses a specific group of honeypot systems by considering detection range, emulation accuracy, data quality, dependability, scalability, performance, extensibility, installation options, setup difficulty, and maintenance requirements. Furthermore, it provides conclusions regarding the relative effectiveness of diverse honeypot systems in different situations. As a part of the research, it analyzes the latest progress and innovations in honeypot development, including enhancements in machine learning, heightened automation, integration with other security tools, cloud-based honeypots, and deception technology by using simulated assaults to showcase the logging and recording capabilities of these honeypots in capturing attack information. After carefully analyzing each honeypot, each has unique advantages, disadvantages, and special characteristics.

Keywords

honeypot; cybersecurity; attack; threat; analysis

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.