Abstract:
Every day, more and more people all over the world use the Internet. It is
becoming a part of everyone's life. People check emails, go online, buy products, play
games online, pay bills online, and so on. However, in the process of accomplishing
all these things, how many people know about safety? Are you aware of the risks of
malware attacks and infections? Some malicious programs have even spread across
the Internet, posing further threats to users. How many users know that their computer
can be used as an intermediary against other systems? As with rapidly evolving
technology, new attacks are constantly emerging. Safety is the key to solving all these
problems. In this article, we will introduce how to improve security by using
honeypots.Honeypot is a system that attracts hackers into it. By luring the hacker into
the system, it is easly to verify all the actions that are being taken from the hacker. In
other words, the honeypot is a booby trap, which looks like a realistic system to lure
attackers. The goal of a honeypot is to analyze, understand, monitor, and track the
behavior of hackers to create a more secure system.
Honeypot is an extraordinary method to find out about the system security managers
and to figure out how to get data from a casualty framework. Honeypots are also very
useful for tracking future threats from new technology attacks.