I. Introduction
In today's virtually connected world, the cyber security threats are increasing exponentially [1]. Cyber-attacks through mail and other social engineered attacks remain the foremost methods gain unauthorized access to computers in a protected environment. This inevitably results into one of the major concerns, that is, to respond efficiently and effectively against such advances. Recently ransomware has grown to affect more than 50% of institutions in the world. Hence it is pivotal to have a grip of the general scene of measurements encompassing cybersecurity issues, including what the most widely recognized sorts of assaults are and where they originate from. A portion of these most regular assaults incorporate phishing, whaling, social designing, Distributed Denial of Service (DDoS) assaults, malware and ransomware. A honeypot is a device which mainly depends on silent collection of data about the intrusion patterns, utilized programs and reason to penetrate the system. This also enables to learn about the capabilities of the intruder [2]. There are many ways to divert intruder from fertile systems and get notice of the attacker while it is in the system [3]. A honeypot is a system with in-built vulnerabilities to allow the attacker to gain unauthorized access and learn from the information. [4]. The honeypots can be categorized into different types based on different parameters. First categorization of honeypot is put forth by Mokube et. al. [5]. Based on the degree of interaction between system and attackers, Mokube et. al. has classified honeypots into three class, viz., High, medium and low interaction honeypots. Seifert et. al. [6] has categorized honeypots as client-based honeypot and server-based honeypot which respectively simulates client and server machine. The third type of categorization is made as physical honeypot and virtual honeypot. This classification is based on whether the honeypot run on physical machine or in virtual environment [7]. Another classification is made by Lance et. al. based on the intent of honeypot. They have categorized honeypot as production honeypot and research honeypot [8]. Production honeypot is generally used by business organization and is intended achieve a higher security level within the network. On the other hand, Research honeypots are used by research organizations to understand the behavior pattern of attackers.