Part 1
Honey potting is an optimal detection method of botnets. Honeypots can be set up to listen for rogue connections and attract them (Wang et al. 2010). In today’s networks and the internet, honeypots have been successfully deployed to attract botnets and expose their membership and attacker behaviors. Honeypots are also optimal because they can be customized to increase their effectiveness depending on the use intended. For example in peer to peer networks they can be customized to emulate a node or a peer. As a security director, I would consider implementing a honeypot as a security control. Honeypots ...