

By employing virtual machines, multiple honeypots can be hosted on a single physical machine. High-interaction honeypots imitate the activities of the production systems that host a variety of services and, therefore, an attacker may be allowed a lot of services to waste their time. Even though a pure honeypot is useful, stealthiness of the defense mechanisms can be ensured by a more controlled mechanism. The activities of the attacker are monitored by using a bug tap that has been installed on the honeypot's link to the network.

Pure honeypots are full-fledged production systems.

īased on design criteria, honeypots can be classified as: Research honeypots are complex to deploy and maintain, capture extensive information, and are used primarily by research, military, or government organizations. These honeypots do not add direct value to a specific organization instead, they are used to research the threats that organizations face and to learn how to better protect against those threats. Research honeypots are run to gather information about the motives and tactics of the black hat community targeting different networks. They give less information about the attacks or attackers than research honeypots. Normally, production honeypots are low-interaction honeypots, which are easier to deploy.

Production honeypots are placed inside the production network with other production servers by an organization to improve their overall state of security. Production honeypots are easy to use, capture only limited information, and are used primarily by corporations. Based on deployment, honeypots may be classified as: Honeypots can be classified based on their deployment (use/action) and based on their level of involvement. Virtual honeypots: the use of these types of honeypot allow one to install and simulate hosts on the network from different operating systems, but in order to do so, it is necessary to simulate the TCP/IP of the target operating system.Many times this modality is not used as much as the high price of acquiring new machines, their maintenance and the complication affected by configuring specialized hardware Physical honeypots: real machine with its own IP address, this machine simulates behaviors modeled by the system.Honeypots can be differentiated based on if they are physical or virtual: Diagram of an information system honeypot Types
