Encrypted Honeypot Security System
Abstract
A cyber honeypot operates in a similar way in computer security terms, baiting a trap for hackers. It is a sacrificial computer device that, like a decoy, is supposed to attract cyberattacks. It mimics a destination for hackers and uses their attempts at infiltration to collect data about cyber criminals and how they work or to divert them from other targets. The purpose of this project is to create the Encrypted Honeypot System and, by port scanning and DDOS attack, to demonstrate or test the Encrypted Honeypot System. The configuration of the honeypot and tools to be used for the attack that is Port Scanning will also show in this project that Nmap will be used and TorsHammer will be used for the DDOS attack and the result of the honeypot will show the two attacks by the attacker in this project for the last segment.