HoneyMonkey
HoneyMonkey depends on the honeypot idea, with the distinction that it effectively looks for sites that attempt to misuse it. The term was instituted by Microsoft Research in 2005. It is short form for Strider HoneyMonkey Exploit Detection System. With HoneyMonkey it is possible to discover open security gaps that are not yet freely known but rather are misused by attackers. This program utilizes a network of PCs to crawl the World Wide Web scanning for sites that utilization program endeavors to introduce malware on the HoneyMonkey PC. A depiction of the memory, executables and registry of the honeypot PC is recorded before crawling a site. After visiting the site, the condition of memory, executables, and registry is recorded and contrasted with the previous snapshot. The progressions are dissected to decide whether the visit to site introduced any malware onto the customer honeypot computer.