Article
Version 1
This version is not peer-reviewed
Honeypots in Cybersecurity: Their Analysis, Evaluation and Importance
Version 1
: Received: 12 August 2024 / Approved: 13 August 2024 / Online: 13 August 2024 (14:14:03 CEST)
How to cite: Moric, Z.; Mršić, L.; Kunić, Z.; Đambić, G. Honeypots in Cybersecurity: Their Analysis, Evaluation and Importance. Preprints 2024, 2024080946. https://doi.org/10.20944/preprints202408.0946.v1 Moric, Z.; Mršić, L.; Kunić, Z.; Đambić, G. Honeypots in Cybersecurity: Their Analysis, Evaluation and Importance. Preprints 2024, 2024080946. https://doi.org/10.20944/preprints202408.0946.v1
Abstract
Honeypots are vital security tools that enable cybersecurity specialists to scrutinize the tactics employed by attackers. By doing so, they can get valuable insights into existing and upcoming internet dangers. Cyber-attacks are in a perpetual evolution, increasingly sophisticated and tailored to exploit specific vulnerabilities. Hence, it is imperative for both organizations and individuals not only to consider but also implement methods to safeguard themselves against cyberattacks and malware. This paper assesses a specific group of honeypot systems by considering detection range, emulation accuracy, data quality, dependability, scalability, performance, extensibility, installation options, setup difficulty, and maintenance requirements. Furthermore, it provides conclusions regarding the relative effectiveness of diverse honeypot systems in different situations. As a part of the research, it analyzes the latest progress and innovations in honeypot development, including enhancements in machine learning, heightened automation, integration with other security tools, cloud-based honeypots, and deception technology by using simulated assaults to showcase the logging and recording capabilities of these honeypots in capturing attack information. After carefully analyzing each honeypot, each has unique advantages, disadvantages, and special characteristics.
Keywords
honeypot; cybersecurity; attack; threat; analysis
Subject
Computer Science and Mathematics, Computer Science
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment