The Role of Honeypots in Modern Cybersecurity Stratergies
Manjula Aakunuri
Associate Professor
Dept. of Computer Science and Engineering
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India manjula3030@gmail.com
Niharika Rangu
UG Student
Dept. of Computer Science and Engineering
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India niharika12rangu@gmail.com
Ravinder Mogili
Associate Professor and Head
Dept. of Computer Science and Engineering
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India mogili.ravinder@jits.ac.in
Samyuktha Rani Atikam
UG Student
Dept. of Computer Science and Engineering
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India atikamsamyuktha123@gmail.com
Srimaja Kasthuri
UG Student
Dept. of Computer Science and Engineering
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India
srimajareddykasthuri@gmail.com
Shirisha Banothu
UG Student
Dept. of Computer Science and Engineering
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India banothushirisha105@gmail.com
Abstract—Honeypots play an important role in modern cybersecurity by acting as decoy systems designed to attract and analyze malicious activities without affecting real network resources. They help security researchers and administrators study attacker behavior, identify vulnerabilities, and understand common cyber-attack patterns. This paper focuses on developing a web-based honeypot monitoring and threat analysis system that simulates vulnerable endpoints to capture suspicious interactions. The system records important parameters such as IP address, request data, attack patterns, and timestamps, and processes this information to calculate the threat probability associated with each interaction. Additionally, the platform provides controlled user access with administrative verification and displays the analysis results through an interactive dashboard. The system’s result enable better identification of suspicious activities, visualization of attack patterns, and classification of risk levels, thereby improving cybersecurity awareness and supporting effective threat monitoring strategies.
Keywords— Honeypot, Cybersecurity, Threat Detection, Network Security, Attack Monitoring, Threat Probability Analysis, Intrusion Detection, Honeypot Simulation, Risk Classification, Security Monitoring.