In the world of computer security, honeypots are called traps designed to detect or neutralize any unauthorized access to computer networks.
Honeypots can exist on individual computers, clusters data, or areas of the network that appear valuable or worth exploring by uninvited visitors, but are actually designed to trap or even track the attacker.
In general, a honeypot consists of data (for example, in a network location) that appears to be a normal site location, but is actually isolated and monitored. So it may appear to contain information valuable to attackers, but it is designed to block them.
Honeypots are usually divided into two main categories: Production honeypots and research honeypots.
Production honeypots are the traps of real entities that seek to protect valuable data from a public organization or a company, and research honeypots are designed to track and study hackers who fall into the trap.
Two or more honeypots in a network constitute a Honeynet. Typically, a Honeynet is used to monitor a larger or more diverse network in which a single honeypot is not sufficient. Honeynets and honeypots are usually implemented as parts of larger network intrusion detection systems. A honeyfarm is one collection με honeypοts και tools analysis.
The concept of Honeynet first started in 1999, when Lance Spitzner, founder of the Honeynet project, published "Build and Honeypot. "
"A Honeynet is a highly interactive honeypots network that simulates a production network and is designed so that all activity is monitored, recorded and to some extent, discreetly regulated."