![](https://static.wixstatic.com/media/nsplsh_4d7162305944524e72376b~mv2_d_2501_2001_s_2.jpg/v1/fill/w_975,h_780,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/nsplsh_4d7162305944524e72376b~mv2_d_2501_2001_s_2.jpg)
HONEYNET QUARTER (HNQ)
Powered by The Honeynet Project, Singapore Chapter
MISSION
To learn the tools, tactics and motives involved in cyber attacks, and share the lessons learned.
​
VISION
A diverse, talented and engaged group of cybersecurity experts who conduct open, cross-disciplinary research and development into the evolving cyber threat landscape.
WHAT WE DO
![](https://static.wixstatic.com/media/3f896a_281c56dbeeff4643b2684428565dfdd0~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/3f896a_281c56dbeeff4643b2684428565dfdd0~mv2.png)
RESEARCH
Cybersecurity research efforts covering data analysis approaches, unique cybersecurity tool developments, and gathering data about attackers.
![](https://static.wixstatic.com/media/3f896a_1e2f03ac958f426a9e997f66ed2cef83~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/3f896a_1e2f03ac958f426a9e997f66ed2cef83~mv2.png)
TOOLS
Develop cybersecurity tools to combat cyber threats.
![Awareness](https://static.wixstatic.com/media/3f896a_9be41ffe6f7f4426b9545b191a31bacd~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Awareness.png)
AWARENESS
Raise awareness of cyber threats and vulnerabilities that exist on the cyberspace today — Allowing people to better understand the cybersecurity threat landscape, and take action to manage cyber risk.
![Image by Taylor Vick](https://static.wixstatic.com/media/nsplsh_4d35747a5a7446434f6673~mv2.jpg/v1/fill/w_490,h_275,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/nsplsh_4d35747a5a7446434f6673~mv2.jpg)
OUR SENSORS NETWORK & DATA ANALYTICS PLATFORM
We deploys a wide range of honeypots and sensors in the global cyberspace. Data captured and collected allows our members and partners to conduct research, analysis and development.
PROJECTS
![Honeynet 4.0](https://static.wixstatic.com/media/3f896a_cae4924a4a4346c093c8d66f5fe0becd~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Honeynet%204_0.png)
HONEYPOT 4.0
Completed 2020
![Incident Management](https://static.wixstatic.com/media/3f896a_75ae1ec0844d49f2800deebaa03713b5~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Incident%20Management.png)
USING HONEYPOTS FOR CYBERSECURITY INCIDENT MANAGEMENT
Completed 2019
![Defending the Deceptor](https://static.wixstatic.com/media/3f896a_a12598d5ad9c448c84adb93cfdb41f64~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Defending%20the%20Deceptor.png)
SECURE.JAR — DEFENDING THE DECEPTOR
Completed 2019
![Deception Framework](https://static.wixstatic.com/media/3f896a_edc42c038aa14329a07e23033c3bbc20~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Deception%20Framework.png)
D3O — DECEPTION FRAMEWORK
Completed 2018
![Home Network Honeynet](https://static.wixstatic.com/media/3f896a_4134673e53104192aaee6569f67e0728~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Home%20Network%20Honeynet.png)
BEETRACE — IOT HONEYPOT FRAMEWORK
Completed 2018
![Web Browser Honeyclient](https://static.wixstatic.com/media/3f896a_e28e5a5e1f434a60b74c5718d4a30498~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Web%20Browser%20Honeyclient.png)
BEEWARE — WEB BROWSER HONEYCLIENT
Completed 2018
![HOST](https://static.wixstatic.com/media/3f896a_c91828370178456ca2dc7e7968d0dd09~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/HOST.png)
H.O.S.T. — STATE OF INTERNET CYBERSECURITY SURVEY TOOL
Completed 2017
![Sodeztia](https://static.wixstatic.com/media/3f896a_4c9a6f82119b4f45b7479dc8d09ac5de~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Sodeztia.png)
SODEZTIA — MANAGING HONEYPOTS WITH DEVSECOPS
Completed 2017
![Cyber Threat Intelligence](https://static.wixstatic.com/media/3f896a_701f465aa40546a184faf7dfdc84c21e~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Cyber%20Threat%20Intelligence.png)
I4RMHONEY — HONEYPOTS & CYBER THREAT INTELLIGENCE
Completed 2017
![Game Theory](https://static.wixstatic.com/media/3f896a_de03c3c2bbec4c6e95fc3f112e4533d1~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Game%20Theory.png)
HONEYPOTS & GAME THEORY
Completed 2017
![HTTP WebCam](https://static.wixstatic.com/media/3f896a_0a1cd127b2f641aa8a0140b48bafdb0a~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/HTTP%20WebCam.png)
IOT HONEYPOT — HTTP WEBCAM
Completed 2015
![HoneyS](https://static.wixstatic.com/media/3f896a_b35c9a51df424c608df2980906cc823f~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/HoneyS.png)
HONEYS — SINKHOLE HONEYPOT
Completed 2011
![hBot](https://static.wixstatic.com/media/3f896a_0f1bfb89068a4af7a62f2f02e39d2320~mv2.png/v1/fill/w_40,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/hBot.png)
HBOT — INSTANT MESSAGING HONEYPOT
Completed 2010
TERMS OF REFERENCE
HNQ Crew/members has an obligation to perform 2 or more of the following activities in a given year:
Deploying Honeypots — Collecting & Analysing Cyber Attack Data
Developing Tools
Play an active in The Honeynet Project's Google Summer of Code (GSoC)
Writing and/or reviewing papers regarding honeypots
Writing books, contributing to a book chapter, or giving feedback to a book author regarding honeypots
Presenting about honeypots at meetups or conferences
Providing honeypots training activities at workshops and other venues
Running a booth about honeypots at an event
Supporting The Honeynet Project's activities in a committee, officer or director position
Obtaining funds for The Honeynet Project through Workshop sponsorships, donations, and grants