Honeypots are phony subnetworks or information storages that security teams deploy as decoys. These network segments have intentional flaws that entice attackers. Common people do not accessibility honeypots, so any exercise in that network location is an indicator of third-social gathering presence. Security info and event management collects information https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network