Tel: 03333 200 222
Email: [email protected]

What is a Honeypot in cyber security?

05/01/2023
2 minute read
Honeypot is a network-attached system set up as a decoy (fake) system deployed by people, organisations and other entities, designed to appear as a high-value asset like a server to log user activity and the way they approach the system to hack it or do any other activity.
By, Jack Wong
Share

A honeypot in cyber security is a network-attached system set up as a decoy (fake) system deployed by people, organisations and other entities. It is designed to appear as a high-value asset like a server to log user activity and how they approach the system to hack it or do any other activity.

A honeypot is also designed to look like any digital asset, such as software programs, servers and networks. The purpose of a honeypot is to pretend to look like a potential target to hackers. This is meant to convince the adversary that they have accessed the current system and encourage them to spend time within this controlled environment. All the information collected from honeypots is helping companies develop and enhance their cyber security strategy in response to potential real-world threats.

How do Honeypots work in cyber security? 

Honeypot can track cybercriminals actions to have a better understanding of their methods and motivations. In fact, organisations can rely on the information collected by Honeypot to develop security protocols to prevent similar attacks in the future. Below are some features of Honeypots.

  • Logs the user’s IP address
  • Logs the keystrokes submitted by the user
  • The resources the user has modified, deleted and accessed

Types of Honeypots in cyber security

Low-interaction honeypots

These types of honeypots run on limited services and have restricted permissions; they can be used to track UDP, TCP, IIC, CMP and other protocols/services. In short, low-interaction honeypots only track the user’s IP address.

Medium-interaction honeypots

These are based on real-time functioning operating systems. They have the same services as the actual application. The purpose of this honeypot is to collect more information on the attack so the organisation can take extra time when medicating the attack.

High-interaction honeypots

These types of honeypots are real applications are vulnerable, hard to maintain, but the success rates are high. Attackers normally think it might be vulnerable, so they will decide to hack it and get blocked eventually. In that case, the organisation will be able to collect some information and understand how the attacker hacked this machine; therefore, they can prevent future attacks.

Pure honeypots

These types of honeypots are deployed in real working environments. Once the attackers see them, they will directly spend time enumerating and exploiting them. The organisation will be alerted and understand how the attackers hack the real system.

Honeypot Benefits

  • Real data collection
  • Fewer false positive intruder alerts
  • Cost-effectiveness
  • Encryption circumvention

More from Swiftcomm

Cyber Attacks: How To Support Your Business
In today's digital landscape, cyber attacks are a very real threat to businesses. Find out more about what to do in the event of a cyber attack, and how to protect your business.
Full Article
right-chevron
Welcoming a New Chapter for Swiftcomm in Peterborough
We're thrilled to share details of the new head-office for Swiftcomm in Peterborough. Offering extra space to grow our team, strengthen our collaboration, the move is an exciting next chapter for Swiftcomm.
Full Article
right-chevron
grey-tick-icon
Trusted by 100s of businesses already
grey-tick-icon
Uniquely tailored approach
grey-tick-icon
Outstanding customer service
swift-tag

Talk with us

We pride ourselves on being an honest trustworthy business communications provider
phone-icon
Telephone
Call 03333 200 222 or if you would prefer us to call you.
Schedule a call
email-icon
Email
We love emails, to send us one use [email protected] or fill in our
Contact Form
chat-icon
Live Chat
Got a question? Our live chat is open and ready to assist
Chat Now
Contact a specialist
crosschevron-down