Deployment of honeypots for proactive detection of cyber threats

Authors

  • Heidy Rodríguez Malvarez Universidad de las Ciencias Informáticas Author
  • Elizabeth Molina Mena Universidad de las Ciencias Informáticas Author
  • Mónica Peña Casanova Universidad de las Ciencias Informáticas Author

Keywords:

Cyber Threats, Cybersecurity, Proactive Detection, Honeypot, T-Pot

Abstract

In an increasingly threatened digital environment, the need to implement proactive security mechanisms has become critical. This article presents the design, configuration and validation of a honeypot system, focusing on the T-Pot tool, aimed at proactive cyber threat detection. T-Pot, recognized for its modular architecture and versatility, is deployed as the core of a solution capable of capturing, analyzing, and monitoring malicious activities in real time. The work begins with an overview of honeypots and their applications in cybersecurity, emphasizing their relevance as a deception technique to observe and analyze attacker behavior. A flexible and scalable architecture is defined and implemented in a controlled laboratory environment where various attacks are simulated to evaluate system effectiveness. The results validate the honeypot’s ability to identify intrusion attempts and suspicious behavior, demonstrating T-Pot’s effectiveness as a tool for proactive threat detection.

Published

24-02-2026

How to Cite

Deployment of honeypots for proactive detection of cyber threats. (2026). Tono, Revista Técnica De La Empresa De Telecomunicaciones De Cuba S.A, 22(2). http://www.revistatono.etecsa.cu/tono/article/view/449