Securing Network using Honeypots: A Comparative Study on Honeytrap and T-Pot

Authors

  • Sandip Biswa Jigme Namgyel Engineering College, Royal University of Bhutan
  • Pema Wangmo Jigme Namgyel Engineering College, Royal University of Bhutan
  • Tshoney Rangdel Jigme Namgyel Engineering College, Royal University of Bhutan
  • Tashi Wangchuk Jigme Namgyel Engineering College, Royal University of Bhutan
  • Younten Tshering Jigme Namgyel Engineering College, Royal University of Bhutan
  • Tashi Yangchen Jigme Namgyel Engineering College, Royal University of Bhutan

Keywords:

Cybersecurity, T-Pot, Honeytrap, Honeypot, cyberattack

Abstract

A wider attack surface has been produced by the growing reliance on technology and the internet for communication, business, and other activities, making it simpler for attackers to identify flaws and use them to their advantage. The sophistication of cybercriminals is also rising, and they are adopting cutting-edge methods and technologiesto get beyond conventional security measures and avoid detection. With the implementation of honeypots, networks can defend against potential attacks and safeguard dataon the systems and networks. A honeypot is a decoy system set up as part of a security mechanism to draw in potential attackers and record their activities for further examination. Two honeypot solutions, namely Honeytrap and T-Pot were deployed and implemented in the simulated private network to study the hardware requirements, installation complexities, range of emulated services supported, and the level of their interaction. Through analysis, it was found that both Honeytrap and T-Pot contribute to enhancing the systems and network security underscoring the significance of honeypots as valuable resources for security networks and systems.

Author Biographies

Sandip Biswa, Jigme Namgyel Engineering College, Royal University of Bhutan

Department of Information Technology, Jigme Namgyel Engineering College, Dewathang

Pema Wangmo, Jigme Namgyel Engineering College, Royal University of Bhutan

Department of Information Technology, Jigme Namgyel Engineering College, Dewathang

Tshoney Rangdel, Jigme Namgyel Engineering College, Royal University of Bhutan

Department of Information Technology, Jigme Namgyel Engineering College, Dewathang

Tashi Wangchuk, Jigme Namgyel Engineering College, Royal University of Bhutan

Lecturer, Department of Information Technology

Dean, Research and Industrial Linkages, Jigme Namgyel Engineering College, Dewathang

Younten Tshering, Jigme Namgyel Engineering College, Royal University of Bhutan

Lecturer, Department of Information Technology

Jigme Namgyel Engineering College, Dewathang

Tashi Yangchen, Jigme Namgyel Engineering College, Royal University of Bhutan

Assistant Lecturer, Department of Information Technology

Jigme Namgyel Engineering College, Dewathang

Downloads

Published

2025-02-28

How to Cite

Biswa, S. ., Wangmo, P. ., Rangdel, T. ., Wangchuk, T. ., Tshering, Y. ., & Yangchen, T. . (2025). Securing Network using Honeypots: A Comparative Study on Honeytrap and T-Pot. JNEC Thruel Rig Sar Toed , 7(1), 12–20. Retrieved from https://trst.jnec.edu.bt/index.php/thruelrigsartoed/article/view/24