Securing Network using Honeypots: A Comparative Study on Honeytrap and T-Pot
Keywords:
Cybersecurity, T-Pot, Honeytrap, Honeypot, cyberattackAbstract
A wider attack surface has been produced by the growing reliance on technology and the internet for communication, business, and other activities, making it simpler for attackers to identify flaws and use them to their advantage. The sophistication of cybercriminals is also rising, and they are adopting cutting-edge methods and technologiesto get beyond conventional security measures and avoid detection. With the implementation of honeypots, networks can defend against potential attacks and safeguard dataon the systems and networks. A honeypot is a decoy system set up as part of a security mechanism to draw in potential attackers and record their activities for further examination. Two honeypot solutions, namely Honeytrap and T-Pot were deployed and implemented in the simulated private network to study the hardware requirements, installation complexities, range of emulated services supported, and the level of their interaction. Through analysis, it was found that both Honeytrap and T-Pot contribute to enhancing the systems and network security underscoring the significance of honeypots as valuable resources for security networks and systems.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 JNEC Thruel Rig Sar Toed

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
All articles published in JNEC Thruel Rig Sar Toed are registered under Creative Commons Attribution 4.0 International License.. unless otherwise mentioned. JNEC Thruel Rig Sar Toed allows unrestricted use of articles in any medium, reproduction, and distribution by providing adequate credit to the authors and the source of publication.