A Review on Honeypot Deployment

Abstract

A honeypot is a source which is proposed to be attacked and cooperated to gain more information about the attacker and its used tools. It can also be installed to draw and divert an attacker from their existent targets. The honeypots are planned and placed in a cloud network to gather the strange presence as well as known occurrences happened in cloud computing. Honeypots are a computer software tool designed to help, learn the purpose and methods of the hacker community. Honeypot describes in-depth the concepts of their involvement in the field of security. The present review paper proposes and designs the importance of honeypot deployment technique in the protection of data based on the infrastructures of honeypot, its advantages and disadvantages. The authors also try to offer possible solutions for issues that are generated while using honeypot.

Keywords

attacker Honeypots Information. technique.

  • Research Identity (RIN)

  • License

    Attribution 2.0 Generic (CC BY 2.0)

  • Language & Pages

    English, 1-10

  • Classification

    C.2.m