SlideShare ist ein Scribd-Unternehmen logo
1 von 34
HONEYPOTS

PRESENTED BY KAJAL MITTAL
B.TECH(IT) 5TH SEM

DATE – 11TH SEPTEMBER, 2013
ABSTRACT

 Countermeasure to detect or prevent attacks
 Know attack strategies
 Gather information which is then used to better
identify, understand and protect against
threats.
 Divert hackers from productive systems
PURPOSE

The Problem

Honeypots
THE PROBLEM

 The Internet security is hard
 New attacks every day
 Our computers are static targets

 What should we do?
 The more you know about your enemy, the better you
can protect yourself
 Fake target
CYBERTERRORISM:
TODAY AND TOMORROW
Cost of Capability

Availability of Capability

1945

Invasion

1955

Strategic
Nuclear
Weapons

1960

1970

1975

1985

Today

Cruise Missile Precision
Computer
Guided
Missiles
Munitions
ICBM & SLBM
Malicious code or malicious software is a
software program designed to
access a computer without the owners
consent or permission.

Problem(s) via computer
INTRODUCTION


 A honeypot can be almost any type of server or
application that is meant as a tool to catch or trap an
attacker.
 A honeypot is an internet attached server that acts as
decoy , luring in potential hackers in order to study
their activities and monitor how they are able to
break into a system.
History of Honeypots

 1990/1991 The Cuckoo’s Egg and Evening with
Berferd
 1997 - Deception Toolkit
 1998 - CyberCop Sting
 1998 - NetFacade (and Snort)
 1998 - BackOfficer Friendly
 1999 - Formation of the Honeynet Project
 2001 - Worms captured
Continue…


 The idea of honeypots began in 1991 with two
publications, “The Cuckoos Egg” and “An Evening with
Breferd ”.
 “The Cuckoos Egg” by Clifford Stoll was about his
experience catching a computer hacker that was in his
corporation searching for secrets.

 The other publication, “An Evening with Berferd” by Bill
Chewick is about a computer hacker’s moves through
traps that he and his colleagues used to catch him. In both
of these writings were the beginnings of what became
honeypots.
Continue…

 The first type of honeypot was released in 1997
called the Deceptive Toolkit. The point of this kit was
to use deception to attack back.
 In 1998 the first commercial honeypot came out. This
was called Cybercop Sting.
 In the year, 2005, The Philippine Honeypot Project
was started to promote computer safety over in the
Philippines.
What is Honeypot?

 In computer terminology, a honeypot is a trap set to
detect, deflect, or in some manner counteract
attempts at unauthorized use of information
systems.
 Generally it consists of a computer, data, or a
network site that appears to be part of a network, but
is actually isolated and monitored, and which seems
to contain information or are source of value to
attackers.
LOCATION

 In front of the firewall(Internet)
 DMZ(demilitarized zone)
DMZ is to add an additional layer of security to
an organization's local area network (LAN).
 Behind the firewall
Placement of Honeypot

Types of Honeypots

 By level of interaction
 High
 Low
 Pure

 By Implementation
 Virtual
 Physical

 By purpose
 Production
 Research
Level of Interaction


 Low Interaction





Easy to deploy, minimal risk
Limited Information
Simulate services frequently requested by attackers
Honeyd

 High Interaction






Highly expensive to maintain
Can be compromised completely, higher risk
More Information
Provide more security by being difficult to detect
Honeynet
Pure Honeypots


 Pure honeypots are full-fledged production systems .
 The activities of the attacker are monitored using a casual tap
that has been installed on the honeypot's link to the network.
No other software needs to be installed.
Level of Interaction


Low

Fake Daemon

Medium

Operating system

Disk

High

Other
local
resource
On Implementation basis


 Two types
 Physical
 Real machines
 Own IP Addresses
 Often high-interactive

 Virtual
 Simulated by other machines that:
 Respond to the traffic sent to the honeypots
 May simulate a lot of (different) virtual honeypots at the
same time
How do HPs work?


Prevent
Detect

Response

No connection

Monitor

Attackers

Attack Data

HoneyPot A

Gateway
Basis of Deployment

 Based on deployment, honeypots maybe classified
as:
 1. Production honeypots
 2. Research honeypots
Production HPs: Protect the systems


 Prevention
 Keeping the bad guys out
 not effective prevention mechanisms.
 Deception, Deterence , Decoys do NOT work against
automated attacks: worms, auto-rooters, mass-rooters

 Detection
 Detecting the burglar when he breaks in.
 Great work

 Response
 Can easily be pulled offline
 Little to no data pollution
Research HPs: gathering information



 Collect compact amounts of high value information
 Discover new Tools and Tactics
 Understand Motives, Behavior, and Organization
 Develop Analysis and Forensic Skills
 Not add direct value to a specific organization
 HONEYNET
Honeyd: A virtual honeypot application, which allows us
to create thousands of IP addresses with virtual machines
and corresponding network services.
What is a Honeynet

 High-interaction honeypot designed to:
 capture in-depth information
 learn who would like to use your
system without your permission
for their own ends

 Its an architecture, not a product or software.
 Populate with live systems.
 Can look like an actual production system
Diagram of Honeynet

Diagram of Honeynet

ADVANTAGES

 Provides security to the systems.
 Data Value : Honeypots can give you the precise information
you need in a quick and easy-to-understand format.
 Resources : The honeypot only captures activities directed at
itself, so the system is not overwhelmed by the traffic.
 It can be a relatively cheap computer.
 Simplicity : There are no fancy algorithms to develop, no
signature databases to maintain, no rule bases to misconfigure.
DISADVANTAGES

 Narrow Field of View : They only see what activity is
directed against them.
 Fingerprinting : Fingerprinting is when an attacker
can identify the true identity of a honeypot because
it has certain expected characteristics or behaviors.
 Risk : By risk, we mean that a honeypot, once
attacked, can be used to attack, infiltrate, or harm
other systems or organizations.
CONCLUSION

 Just the beginning for honeypots.
 Honeypots are not a solution, they are a flexible tool
with different applications to security.
 Primary value in detection and information
gathering.
 Yet, honeypot technology is moving ahead
rapidly, and, in a year or two, honeypots will be
hard to ignore.
REFERENCES

 http://searchsecurity.techtarget.com/feature/Honeyp
ot-technology-How-honeypots-work-in-the-enterprise
 http://searchsecurity.techtarget.com/definition/honey
-pot
 http://www.euractiv.com/specialreportcybersecurity/europe-needs-honeypots-trap-cybenews-518279
 http://www.technologyreview.com/news/514216/ho
neypots-lure-industrial-hackers-into-the-open/
 http://www.tomshardware.com/news/microsoftpatent-honeypot-security-network,15659.html
References

 http://my.safaribooksonline.com/book/networking/sec
urity/0321108957/the-value-of-honeypots/ch04lev1sec2
 http://www.123seminarsonly.com/SeminarReports/012/53599210-Honey-Pots.pdf
 http://searchsecurity.techtarget.com/feature/Honeypottechnology-How-honeypots-work-in-the-enterprise
 http://ezinearticles.com/?Malicious-Code-and-ItsOrigins&id=4500377
QUERY?
Honeypot ss

Weitere ähnliche Inhalte

Was ist angesagt?

Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
Sina Manavi
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
Inder NeGi
 

Was ist angesagt? (20)

Honeypots
HoneypotsHoneypots
Honeypots
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Honeypot
HoneypotHoneypot
Honeypot
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Honeypot
HoneypotHoneypot
Honeypot
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 

Andere mochten auch

Andere mochten auch (17)

Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Honeypot
HoneypotHoneypot
Honeypot
 
Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honey Potz - BSides SLC 2015
Honey Potz - BSides SLC 2015Honey Potz - BSides SLC 2015
Honey Potz - BSides SLC 2015
 
Interactive presentation screen format 16-9 - minimal for slideshare
Interactive presentation   screen format 16-9 - minimal for slideshareInteractive presentation   screen format 16-9 - minimal for slideshare
Interactive presentation screen format 16-9 - minimal for slideshare
 
Computing (cloude & grid) & honey pots
Computing (cloude & grid) & honey potsComputing (cloude & grid) & honey pots
Computing (cloude & grid) & honey pots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
CDE future sonar webinar
CDE future sonar webinar CDE future sonar webinar
CDE future sonar webinar
 
Ppt
PptPpt
Ppt
 
Honeypot Project
Honeypot ProjectHoneypot Project
Honeypot Project
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
GIS for Defence
GIS for DefenceGIS for Defence
GIS for Defence
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
 
Honeypots - November 8th Misec presentation
Honeypots - November 8th Misec presentationHoneypots - November 8th Misec presentation
Honeypots - November 8th Misec presentation
 

Ähnlich wie Honeypot ss

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
Alison Hall
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
amar koppal
 

Ähnlich wie Honeypot ss (19)

Honeypots
HoneypotsHoneypots
Honeypots
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
HoneyPots.pptx
HoneyPots.pptxHoneyPots.pptx
HoneyPots.pptx
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
 
Honeypot
HoneypotHoneypot
Honeypot
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Honeypot ss

  • 1. HONEYPOTS  PRESENTED BY KAJAL MITTAL B.TECH(IT) 5TH SEM DATE – 11TH SEPTEMBER, 2013
  • 2. ABSTRACT   Countermeasure to detect or prevent attacks  Know attack strategies  Gather information which is then used to better identify, understand and protect against threats.  Divert hackers from productive systems
  • 4. THE PROBLEM   The Internet security is hard  New attacks every day  Our computers are static targets  What should we do?  The more you know about your enemy, the better you can protect yourself  Fake target
  • 5. CYBERTERRORISM: TODAY AND TOMORROW Cost of Capability Availability of Capability 1945 Invasion 1955 Strategic Nuclear Weapons 1960 1970 1975 1985 Today Cruise Missile Precision Computer Guided Missiles Munitions ICBM & SLBM
  • 6. Malicious code or malicious software is a software program designed to access a computer without the owners consent or permission. Problem(s) via computer
  • 7. INTRODUCTION   A honeypot can be almost any type of server or application that is meant as a tool to catch or trap an attacker.  A honeypot is an internet attached server that acts as decoy , luring in potential hackers in order to study their activities and monitor how they are able to break into a system.
  • 8. History of Honeypots   1990/1991 The Cuckoo’s Egg and Evening with Berferd  1997 - Deception Toolkit  1998 - CyberCop Sting  1998 - NetFacade (and Snort)  1998 - BackOfficer Friendly  1999 - Formation of the Honeynet Project  2001 - Worms captured
  • 9. Continue…   The idea of honeypots began in 1991 with two publications, “The Cuckoos Egg” and “An Evening with Breferd ”.  “The Cuckoos Egg” by Clifford Stoll was about his experience catching a computer hacker that was in his corporation searching for secrets.  The other publication, “An Evening with Berferd” by Bill Chewick is about a computer hacker’s moves through traps that he and his colleagues used to catch him. In both of these writings were the beginnings of what became honeypots.
  • 10. Continue…   The first type of honeypot was released in 1997 called the Deceptive Toolkit. The point of this kit was to use deception to attack back.  In 1998 the first commercial honeypot came out. This was called Cybercop Sting.  In the year, 2005, The Philippine Honeypot Project was started to promote computer safety over in the Philippines.
  • 11. What is Honeypot?   In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.  Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or are source of value to attackers.
  • 12. LOCATION   In front of the firewall(Internet)  DMZ(demilitarized zone) DMZ is to add an additional layer of security to an organization's local area network (LAN).  Behind the firewall
  • 14. Types of Honeypots   By level of interaction  High  Low  Pure  By Implementation  Virtual  Physical  By purpose  Production  Research
  • 15. Level of Interaction   Low Interaction     Easy to deploy, minimal risk Limited Information Simulate services frequently requested by attackers Honeyd  High Interaction      Highly expensive to maintain Can be compromised completely, higher risk More Information Provide more security by being difficult to detect Honeynet
  • 16. Pure Honeypots   Pure honeypots are full-fledged production systems .  The activities of the attacker are monitored using a casual tap that has been installed on the honeypot's link to the network. No other software needs to be installed.
  • 17. Level of Interaction  Low Fake Daemon Medium Operating system Disk High Other local resource
  • 18. On Implementation basis   Two types  Physical  Real machines  Own IP Addresses  Often high-interactive  Virtual  Simulated by other machines that:  Respond to the traffic sent to the honeypots  May simulate a lot of (different) virtual honeypots at the same time
  • 19. How do HPs work?  Prevent Detect Response No connection Monitor Attackers Attack Data HoneyPot A Gateway
  • 20. Basis of Deployment   Based on deployment, honeypots maybe classified as:  1. Production honeypots  2. Research honeypots
  • 21. Production HPs: Protect the systems   Prevention  Keeping the bad guys out  not effective prevention mechanisms.  Deception, Deterence , Decoys do NOT work against automated attacks: worms, auto-rooters, mass-rooters  Detection  Detecting the burglar when he breaks in.  Great work  Response  Can easily be pulled offline  Little to no data pollution
  • 22. Research HPs: gathering information   Collect compact amounts of high value information  Discover new Tools and Tactics  Understand Motives, Behavior, and Organization  Develop Analysis and Forensic Skills  Not add direct value to a specific organization  HONEYNET
  • 23. Honeyd: A virtual honeypot application, which allows us to create thousands of IP addresses with virtual machines and corresponding network services.
  • 24. What is a Honeynet   High-interaction honeypot designed to:  capture in-depth information  learn who would like to use your system without your permission for their own ends  Its an architecture, not a product or software.  Populate with live systems.  Can look like an actual production system
  • 27. ADVANTAGES   Provides security to the systems.  Data Value : Honeypots can give you the precise information you need in a quick and easy-to-understand format.  Resources : The honeypot only captures activities directed at itself, so the system is not overwhelmed by the traffic.  It can be a relatively cheap computer.  Simplicity : There are no fancy algorithms to develop, no signature databases to maintain, no rule bases to misconfigure.
  • 28.
  • 29. DISADVANTAGES   Narrow Field of View : They only see what activity is directed against them.  Fingerprinting : Fingerprinting is when an attacker can identify the true identity of a honeypot because it has certain expected characteristics or behaviors.  Risk : By risk, we mean that a honeypot, once attacked, can be used to attack, infiltrate, or harm other systems or organizations.
  • 30. CONCLUSION   Just the beginning for honeypots.  Honeypots are not a solution, they are a flexible tool with different applications to security.  Primary value in detection and information gathering.  Yet, honeypot technology is moving ahead rapidly, and, in a year or two, honeypots will be hard to ignore.
  • 31. REFERENCES   http://searchsecurity.techtarget.com/feature/Honeyp ot-technology-How-honeypots-work-in-the-enterprise  http://searchsecurity.techtarget.com/definition/honey -pot  http://www.euractiv.com/specialreportcybersecurity/europe-needs-honeypots-trap-cybenews-518279  http://www.technologyreview.com/news/514216/ho neypots-lure-industrial-hackers-into-the-open/  http://www.tomshardware.com/news/microsoftpatent-honeypot-security-network,15659.html
  • 32. References   http://my.safaribooksonline.com/book/networking/sec urity/0321108957/the-value-of-honeypots/ch04lev1sec2  http://www.123seminarsonly.com/SeminarReports/012/53599210-Honey-Pots.pdf  http://searchsecurity.techtarget.com/feature/Honeypottechnology-How-honeypots-work-in-the-enterprise  http://ezinearticles.com/?Malicious-Code-and-ItsOrigins&id=4500377