Emerging Trends in Honeypot Research: A Review of Applications and Techniques
DOI:
https://doi.org/10.5281/zenodo.14811718Keywords:
Attacks, Cyber-security attacks, Data Collection, Honeypots, Threat DetectionAbstract
Honeypots are decoys in cybersecurity, where a system is set up to attract and monitor cyber intruders. These systems appear vulnerable but are isolated and monitored, emulating the entire real world, for example, databases or IOT devices. To gain insight into their tactics, attackers interact with these decoys. Security teams can fortify their defences by learning about these emerging threats. Honeypots are classified on the basis of interaction offered. A low-interaction honeypot will only record the most basic attacks. High-interaction honeypots, in contrast, allow attackers to be interacted with on a higher level, yielding more insight as to how they operate. By adopting this approach early, organizations can better understand how they might be targeted by potential attackers. Besides enabling the early detection of threats, they publish decoys that honeypots distract attackers away from actual systems. But they fail to catch all attacks, particularly those that do not engage the decoy. Honeypots must be kept current to remain effective against rapidly evolving threats.References
Kandanaarachchi, S., Ochiai, H., & Rao, A. (2022). Honeyboost: Boosting honeypot performance with data fusion and anomaly detection. Expert Systems with Applications, 201, 117073. https://doi.org/10.1016/j.eswa.2022.117073
Razali, M. F., Razali, M. N., Mansor, F. Z., Muruti, G., & Jamil, N. (2018). IoT honeypot: A review from researcher’s perspective. 2018 IEEE Conference on Application, Information and Network Security (AINS). https://doi.org/10.1109/AINS.2018.8631457
Song, J., Takakura, H., Okabe, Y., Inoue, D., Eto, M., & Nakao, K. (2010). A comparative study of unsupervised anomaly detection techniques using honeypot data. IEICE Transactions on Information and Systems, 93, 2544–2554. https://doi.org/10.1587/transinf.E93.D.2544
Maesschalck, S., Giotsas, V., Green, B., & Race, N. (2022). Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security? Computers & Security, 114, 102598. https://doi.org/10.1016/j.cose.2022.102598
Abualhija, M., Al-Shaf’i, N., Turab, N. M., & Hussein, A. (2023). Encountering social engineering activities with a novel honeypot mechanism. International Journal of Electrical & Computer Engineering, 13. https://doi.org/10.11591/ijece.v13i1
Lanka, P., Gupta, K., & Varol, C. (2024). Intelligent threat detection—AI-driven analysis of honeypot data to counter cyber threats. Electronics, 13, 2465. https://doi.org/10.3390/electronics13022465
Javadpour, A., Ja’fari, F., Taleb, T., Shojafar, M., & Benzaïd, C. (2024). A comprehensive survey on cyber deception techniques to improve honeypot performance. Computers & Security, 103792. https://doi.org/10.1016/j.cose.2024.103792
Maranco, M., et al. (2024). Enhanced honeypot security for intrusion detection and prevention systems using blockchain. World Journal of Advanced Research and Reviews, 22, 751–758.
Nishad, N., & Singh, R. (2024). Honeypot deployment: A blockchain-based distributed approach.
Muniandy, M., Ismail, N. A., Yahya, A., Al-Nahari, Y., & Yao, D. N. L. (2022). Evolution and impact of ransomware: Patterns, prevention, and recommendations for organizational resilience. International Journal of Neural Computing and Applications, 34, 12077–12096. https://doi.org/10.1007/s00521-021-06578-6
Brynielsson, J., Cohen, M., Hansen, P., Lavebrink, S., Lindström, M., & Tjörnhammar, E. (2023). Comparison of strategies for honeypot deployment. Proceedings of the International Conference on Advances in Social Networks Analysis and Mining.
Khalid, H. Y., & Aldabagh, N. B. (2024). Exploring honeypot as a deception and trigger mechanism for real-time attack detection in software-defined networking. International Journal of Computing and Digital Systems, 16, 951–960. https://doi.org/10.12785/ijcds/1604951
Sasaki, T., Kawaguchi, M., Kumagai, T., Yoshioka, K., & Matsumoto, T. (2024). Observation of human-operated accesses using remote management device honeypot. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 107, 291–305. https://doi.org/10.1587/transfun.107.291
Sezgin, A., & Boyacı, A. (2024). Decoypot: A large language model-driven web API honeypot for realistic attacker engagement. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.5009535
Holbel, R., Yerby, J., & Smith, W. (2024). Utilizing virtualized honeypots for threat hunting, malware analysis, and reporting. Issues in Information Systems, 25, 265–278.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Vishal Kumar, Sawan Bhardwaj, Pradeep Chouksey, Praveen Sadotra, Mayank Chopra

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.