Honeypots are faux subnetworks or facts storages that security teams deploy as decoys. These network segments have intentional flaws that appeal to attackers. Frequent consumers do not access honeypots, so any activity in that network place is surely an indicator of 3rd-occasion presence. Security orchestration, automation and response methods https://ieeexplore.ieee.org/document/9941250