Gupta, B. B.; Gupta, Alisha - In: International Journal of Cloud Applications and … 8 (2018) 1, pp. 21-54
Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is trapped. It is a defensive technique which lures the attacker into performing some illicit operations on it and subsequently using it to trace the activities of attacker, generating signatures and...