Reprise: Developing and Prototyping Honeypots


The Duke IT Security Office (ITSO) uses “honeypots” to develop actionable threat intelligence. A honeypot, as defined by, “is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems" (see

Picking up on a successful Code+ 2023 project by the same name, a team of students will work with Duke’s ITSO to explore a set of applications as candidates for new network honeypot types. By analyzing network traffic and potential security vulnerabilities in these applications, students will use these examples to design a framework for rapid development and prototyping of new honeypots.