Honeypots are pretend subnetworks or facts storages that security groups deploy as decoys. These network segments have intentional flaws that catch the attention of attackers. Normal customers will not access honeypots, so any action in that network space is really an indicator of third-social gathering existence. Security orchestration, automation https://ieeexplore.ieee.org/document/9941250