SlideShare ist ein Scribd-Unternehmen logo
1 von 16
HONEYPOTS-TRACKING HACKERS For Documentation and Downloads Visit
Abstract ,[object Object]
It describes a security tool and concept known as a Honey pot and Honeynet.
Honey Pots and Honeynets are digital network bait, and through  deception, they are designed to actually attract intruders.,[object Object]
DESIGN CONCEPT
NETWORK WIRING MECHANISMS
ADVANTAGES
LIMITATIONS,[object Object]
This includes the hacker, cracker, and script.
They have multiple uses, such as prevention, detection, or information gathering. ,[object Object]
Classification of Honeypots 1.Production Honeypots             Those used to protect organizations in real production           operating environments. 2.Research Honeypots.            They represent educational resources of demonstrative and research nature whose objective is centered towards studying all sorts of attack patterns and threats.
 NETWORK WIRING MECHANISMS Figure 1 Figure 1 - Honey net with one honey pot and management host using a shared network ,[object Object]
2 Hubs or switches are used to connect interfaces together, along with 5 cables.
The management host only needs to have one network interface.,[object Object]
This design, while simple and easy to understand, also has some serious security implications on the outside of the honey wall.,[object Object]
All cables shown in red are cross-over twisted pair cables.

Weitere ähnliche Inhalte

Was ist angesagt?

Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
Sina Manavi
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network security
chella mani
 

Was ist angesagt? (20)

Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network security
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Honeypot
HoneypotHoneypot
Honeypot
 

Andere mochten auch (9)

Honeypot
Honeypot Honeypot
Honeypot
 
Mr L Mazimba CV
Mr L Mazimba CVMr L Mazimba CV
Mr L Mazimba CV
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
 
Honey-pot profiles and malevolent e-reputation attacks on Facebook
Honey-pot profiles and malevolent e-reputation attacks on FacebookHoney-pot profiles and malevolent e-reputation attacks on Facebook
Honey-pot profiles and malevolent e-reputation attacks on Facebook
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Ppt
PptPpt
Ppt
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeynet technolgy
Honeynet technolgyHoneynet technolgy
Honeynet technolgy
 
Honeypots
HoneypotsHoneypots
Honeypots
 

Ähnlich wie Honeypots

The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
MeshDynamics
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
Lesson plan 2 mattaya 4
Lesson plan 2 mattaya 4Lesson plan 2 mattaya 4
Lesson plan 2 mattaya 4
Max Friel
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
amar koppal
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
MeshDynamics
 
CloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaCloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom Italia
Gabriele Bozzi
 
WAN Design Project
WAN Design ProjectWAN Design Project
WAN Design Project
D Ther Htun
 

Ähnlich wie Honeypots (20)

The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
 
A study on practical uses of common Network protocols
A study on practical uses of common Network protocolsA study on practical uses of common Network protocols
A study on practical uses of common Network protocols
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Lesson plan 2 mattaya 4
Lesson plan 2 mattaya 4Lesson plan 2 mattaya 4
Lesson plan 2 mattaya 4
 
Lesson plan 2 mattaya 4
Lesson plan 2 mattaya 4Lesson plan 2 mattaya 4
Lesson plan 2 mattaya 4
 
2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov
 
01 - Topology.ppt
01 - Topology.ppt01 - Topology.ppt
01 - Topology.ppt
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
 
smart street light system using IOT
smart street light system using IOTsmart street light system using IOT
smart street light system using IOT
 
INTENSIFICATION OF HOME AUTOMATION USING IOT
INTENSIFICATION OF HOME AUTOMATION USING IOTINTENSIFICATION OF HOME AUTOMATION USING IOT
INTENSIFICATION OF HOME AUTOMATION USING IOT
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
 
Rain Technology.pptx
Rain Technology.pptxRain Technology.pptx
Rain Technology.pptx
 
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
 
CloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaCloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom Italia
 
Resource Guid
Resource GuidResource Guid
Resource Guid
 
WAN Design Project
WAN Design ProjectWAN Design Project
WAN Design Project
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 

Mehr von Presentaionslive.blogspot.com

A multimodal interaction framework for pervasive game applications
A   multimodal   interaction   framework   for pervasive   game   applicationsA   multimodal   interaction   framework   for pervasive   game   applications
A multimodal interaction framework for pervasive game applications
Presentaionslive.blogspot.com
 

Mehr von Presentaionslive.blogspot.com (20)

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Phis
PhisPhis
Phis
 
Network security
Network securityNetwork security
Network security
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Grid computing
Grid computingGrid computing
Grid computing
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Information Security
Information SecurityInformation Security
Information Security
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
 
Steganography
Steganography Steganography
Steganography
 
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
 
Novel architecture
Novel architectureNovel architecture
Novel architecture
 
Neural networks
Neural networksNeural networks
Neural networks
 
Multimedia and gaming
Multimedia and gamingMultimedia and gaming
Multimedia and gaming
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A multimodal interaction framework for pervasive game applications
A   multimodal   interaction   framework   for pervasive   game   applicationsA   multimodal   interaction   framework   for pervasive   game   applications
A multimodal interaction framework for pervasive game applications
 
1 spattern matching using biometric techniques
1 spattern matching using biometric techniques1 spattern matching using biometric techniques
1 spattern matching using biometric techniques
 
Unique p mail-addressing 97-03
Unique p mail-addressing 97-03Unique p mail-addressing 97-03
Unique p mail-addressing 97-03
 
Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interface
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Honeypots

  • 1. HONEYPOTS-TRACKING HACKERS For Documentation and Downloads Visit
  • 2.
  • 3. It describes a security tool and concept known as a Honey pot and Honeynet.
  • 4.
  • 8.
  • 9. This includes the hacker, cracker, and script.
  • 10.
  • 11. Classification of Honeypots 1.Production Honeypots Those used to protect organizations in real production operating environments. 2.Research Honeypots. They represent educational resources of demonstrative and research nature whose objective is centered towards studying all sorts of attack patterns and threats.
  • 12.
  • 13. 2 Hubs or switches are used to connect interfaces together, along with 5 cables.
  • 14.
  • 15.
  • 16. All cables shown in red are cross-over twisted pair cables.
  • 17.
  • 18. This means that resources can be minimum and still enough to operate a powerful platform to operate at full scale.
  • 19.
  • 20. They do not capture information related to attacks destined towards neighboring systems
  • 21.
  • 22. In next phase the Honey net Project would be releasing a bootable CDROM that will boot into a Honey net gateway or Honey wall.
  • 23.
  • 24. Like any new technology, they have some challenges to overcome.
  • 25. Most likely none of these problems will ever be completely solved or eliminated.
  • 26.