International Journal of Computer Science & Engineering Technology (IJCSET)
Low-interaction honeypots simulate only some parts of the system as the network stack. Low-interaction honeypots simulate only services that can't be used by an attacker to get full access to the honeypot and thus are not able to control the system. Use of these honeypots includes identification of port scans, generation of attack signature and malware collection. Popular examples of this kind of honeypots are Honeyd and Nepenthes, Specter, and KFSensor. They are also used for analyzing spammers or detecting worms. A high-interaction honeypot is a conventional computer system or a fully functional Virtual Machine, a router or a switch.