ABSTRACT

Honeypots are used to delude attackers and improve security within large computer networks. As this growing activity becomes a new trend, attackers always attempt to defeat the effectiveness of the honeypot. Honeypots are very effective and attackers are working to fi nd ways to exploit and avoid them.