Files
Download Full Text (729 KB)
Description
Throughout daily life, computer users encounter different forms of malware, such as ransomware, adware, viruses, trojan horses, and spyware. To protect networks, individuals need to be able to comprehensively analyze a malicious actor’s behavior and tactics. These observations can be made through the usage of honeypots – a computer security mechanism set to track and deflect unauthorized activity. Honeypots frequently operate like decoys of legitimate websites that perfectly mimic an existing database, which makes them a valuable tool for researching cyber criminals’ behavior.
Publication Date
2026
Recommended Citation
Aliyeva, Maryam and Kramer, Andrew, "Interactions of Bad Actors with Honeypots" (2026). Annual Research Symposium. 79.
https://scholar.dsu.edu/research-symposium/79