If its a large-scale scan, it is usually more malicious.
It can have the same number of nodes, web link topology and configurations to fool the hacker.
These shadow networks can be created to simulate complex data pipe structures.
The researchers will deploy their method in a real web link in the future.
Source:Dailymail
Read More
source: www.techworm.net