As defined in the honeypot Honeypot, "A honeypot is a secure resource and its value lies in being detected, attacked, and damaged ."
The purpose of the honeypot design is to allow hackers to intrude into it, so as to collect relevant evidence and hide the real server address. Honeypot generally has the following functions: discovering attacks, generating warnings, Powerful recording capabilities, deception, and assisting in investigations. Another purpose of the honeypot is to delay the attacker's attack on its real target, causing the attacker to waste time on the honeypot. At the same time, the initial attack target is protected and truly valuable content will not be infringed.
Depending on the Administrator's needs, the system and vulnerability settings of the honeypot are also different. The honeypot is diverse, including real-System Honeypot and pseudo-System Honeypot.
The virtual honeypot network Honeynet is a form of honeypot. Honeypot is a resource used for attack and security risks. Honeynet is a highly interactive Honeypot, which means it wants to protect the real operating system that directly deals with attackers. This high degree of interaction allows us to understand how intruders break through the system, how they connect and why they intrude into the system. Honeynets achieves this goal by building a network system. This network is highly integrated, and all inbound and outbound data will be controlled and captured. Every system in this network is a real honeypot, every system is designed to induce attacks.
For more information about Honeynet, see the http://www.honeynet.org/