Latest Trends in Honeynet Technology

Speaking of arms races, as attacker technology evolves, the technology used by defenders has evolved too. This cat and mouse game has been taking place for years as attackers try to go undetected and defenders try to detect the latest threats and to introduce counter-measures to better defend their networks.


Honeypots are decoy systems placed in the network for the sole purpose of attracting hackers. There is no real value in the systems, there is no sensitive information, and they just look like they are valuable. They are called “honeypots” because once the hackers put their hand in the pot and taste the honey, they keep coming back for more.


A honeypot is a single system serving as ...

Get Gray Hat Hacking, Second Edition, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.