When a cloud computing class at 麻豆视频 called for a team project, 尘补蝉迟别谤鈥檚 student Kevin Landry saw an opportunity to share what he knew and give classmates a taste of real-world cyber defense.
A seasoned cybersecurity enthusiast, Landry introduced his team to the concept of a honeypot鈥攁 decoy system designed to lure and monitor cyber attackers. As he put it, honeypots allow you to 鈥渞each out and touch actual attackers,鈥 bringing textbook concepts to life in a way few classroom exercises can match.
鈥淵ou鈥檒l never look at the internet the same way again after running a honeypot,鈥 Landry said. 鈥淚t鈥檚 eye-opening to see how many bots are out there scanning for vulnerabilities.鈥
For his teammates鈥攎any of whom had never built home labs鈥攖he project offered hands-on experience that mimicked an enterprise environment and bridged the gap between theory and practice. Honeypots aren鈥檛 just academic tools; companies maintain them to study hacker activity, identify patterns, and share intelligence that helps reveal common vulnerabilities.
鈥淚t鈥檚 a low-investment, high-yield product that鈥檚 passive,鈥 Landry explained. 鈥淵ou do all the coding and setup, then just let it run and watch attackers come in.鈥
The team deployed Cowrie, an open-source honeypot that simulates a Linux shell. But Landry didn鈥檛 settle for the default configuration.
鈥淚 changed every standard setting possible,鈥 he said. 鈥淔ake encryption keys, fake password files, fake directories鈥攅verything to make it look like a lazy or incompetent sysadmin left the doors open.鈥
Those tweaks made the trap convincing enough to attract hundreds of attackers, from automated bots to human hackers.
Once customized, the honeypot started buzzing鈥攍ogging intrusion attempts almost immediately. To make the experience even more interactive, the team integrated real-time alerts through Discord, receiving up to 500 notifications a day whenever an attacker engaged with the system.
At one point, the attack volume was high enough that Discord temporarily rate-limited the alerts, thinking they were automated traffic. Landry resolved the issue by rotating through multiple webhooks and fine-tuning the alert frequency to keep everything running smoothly.
Over the course of 48 days, the honeypot captured an extensive dataset. Landry even created of the activity for the team鈥檚 class presentation, showing where attacks originated and how they unfolded over time.
To make the project even more aligned with industry practices, Landry鈥檚 team uploaded the attackers鈥 IP addresses to Gray Noise Intelligence, a company that allowed him to use its enterprise-grade platform for the project. The software analyzes IP addresses and assigns confidence levels indicating how likely each one is malicious, giving students a window into professional threat intelligence workflows.
鈥淚t makes me feel good that I鈥檓 wasting hackers鈥 time or bots鈥 time,鈥 Landry said.
For Landry鈥攚ho served ten years in the U.S. Coast Guard and earned a bachelor鈥檚 degree in computer science from the University of Mary Washington before pursuing his 尘补蝉迟别谤鈥檚 in applied information technology at George 麻豆视频鈥攖he honeypot was both an academic milestone and a career-building moment. He believes projects like this are essential for breaking into cybersecurity.
鈥淐ybersecurity jobs鈥攅ven entry-level鈥攚ant three years of experience, but you can鈥檛 get experience without getting a job,鈥 he noted. 鈥淗ome labs and projects like this help build a portfolio and show employers you can do the work.鈥
As cyber threats grow more sophisticated, George 麻豆视频鈥檚 applied approach to technology education ensures students are ready to meet them head-on. For Landry, the honeypot was not only a class assignment but also a chance to turn passion into practice鈥攁nd to share that experience with others.