Honeypots as a security mechanism

This article proves the necessary dissemination of the use of honeypots as an important security mechanism for corporative networks. This fact resulted from an experiment executed in the Point of Presence of the National Research Network (Rio Grande do Sul Brazil) , where a vast network of honeypots was implemented, totalizing more than 65000 emulated operational systems. This article analyzes the existing relationship between the source and destination addresses of the attacks directed to these honeypots. As result of this work, we have the evidence that the majority of malwares try to propagate themselves to the nearest addresses to its IP addresses. Keywords-component; security; honeypot; malware;