all InfoSec news
An Analysis of Honeypots and their Impact as a Cyber Deception Tactic. (arXiv:2301.00045v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
This paper explores deploying a cyber honeypot system to learn how cyber
defenders can use a honeypot system as a deception mechanism to gather
intelligence. Defenders can gather intelligence about an attacker such as the
autonomous system that the IP of the attacker is allocated from, the way the
attacker is trying to penetrate the system, what different types of attacks are
being used, the commands the attacker is running once they are inside the
honeypot, and what malware the …
analysis autonomous cyber cyber deception deception defenders honeypot honeypots impact intelligence learn system tactic