Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers’ motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.
Otto Hrad, Simo Kemppainen (University of Jyväskylä): Honeypot utilization for analyzing cyber attacks
Presented at ECSAW ’16, the 10th European Conference on Software Architecture Workshops, November 28 – December 02, 2016, Copenhagen
http://dl.acm.org/citation.cfm?doid=2993412.2993415