Files

Download

Download Full Text (729 KB)

Description

Throughout daily life, computer users encounter different forms of malware, such as ransomware, adware, viruses, trojan horses, and spyware. To protect networks, individuals need to be able to comprehensively analyze a malicious actor’s behavior and tactics. These observations can be made through the usage of honeypots – a computer security mechanism set to track and deflect unauthorized activity. Honeypots frequently operate like decoys of legitimate websites that perfectly mimic an existing database, which makes them a valuable tool for researching cyber criminals’ behavior.

Publication Date

2026

Interactions of Bad Actors with Honeypots

Share

COinS