Tarpits are computer systems that are used to absorb and delay incoming connections and sessions from an attacker. Tarpits doesn’t prevent cyber security attacks instead they listen and engage with the attacker but respond slowly. This makes the attacker efforts ineffective. Types of Tarpits Layer 7 Tarpits engage with Layer 7 Applications requests of HTTP…
Category: Intrusion Detection And Prevention
Honeypot
Honeypots are decoy system that are placed in infrastructure to attract and deflect attackers. Honeypots simulate and look like real system having applications and services running on it with vulnerabilities intentionally being kept open which makes it as a trap and lures the attackers towards it. Honeynet is collections of Honeypots. Types of Honeypots Production…