Honeypots are bogus subnetworks or knowledge storages that security teams deploy as decoys. These network segments have intentional flaws that bring in attackers. Frequent people tend not to access honeypots, so any exercise in that network location is an indicator of third-get together presence. After the network verifies the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network