ABSTRACT

Honeypots have evolved as a security tool. The basic motive behind a honeypot is to lure the attacker away from the production network and its valuable resources, such as file servers, web servers, administrator hosts, etc. Over the years, honeypots have evolved as a powerful tool for recording malicious behavior inside the host. On the other hand, honeynets are the special arrangement of honeypots inside the network, and they have the capacity to record various activities over the network. Honeypots are predominantly used for analysis of viruses and worms on a specific host, and honeynets are designed to record and analyze network-based attacks.