Honeyd Concepts

People often wonder what honeypots can be used for. Here are some examples on how Honeyd and honeypots in general can be used to improve security or for network measurements.

Wireless Honeypot

Setup an isolated machine running Honeyd:

Diagram showing wireless honeypot configuration.

Diagram showing wireless honeypot configuration.

Monitor for unauthorized access:

Integrated Honeypots

Distract adversaries by mixing virtual honeypots into your production network:

Monitor for unauthorized access:

Just by running honeypots, you make live harder for adversaries because they might waste their resources by breaking into the honeypots. Honeypots can also serve as a warning sign for a highly monitored network.

Diagram showing an integrated honeypot configuration.

Diagram showing an integrated honeypot configuration.


If you are missing a concept, please let me know.