SlideShare ist ein Scribd-Unternehmen logo
1 von 26
HONEYPO
TS
1
CONTENTS
2
 Introduction
 What are Honey pots?
 Classification
 Honeyd
 Honeynet
 Advantages of honeypot
 Disadvantages of honeypot
 Conclusion
INTRODUCTION
3
The internet is growing very fast.
 New attacks every day
The more you know about your enemy, the better you can protect
yourself.
The main goal of honeypot is to gather as much information as
possible.
WHAT ARE HONEYPOTS?
4
Honeypot is an exciting new technology with enormous
potential for the security community.
According to Lance Spitzner, founder of honeypot project: “A
honeypot is an information system resource whose value lies
in unauthorized or illicit use of that resource.”
Used for monitoring, detecting and analyzing attacks
CLASSIFICATION
By level of
interaction
High Low
By
implementation
Physical Virtual
By
purpose
Production Research
5
High interaction
Simulates all aspects of
the OS: real systems.
Can be compromised
completely, higher risk.
More Information
Eg:-Honeynet
Architecture of high interaction honeypots
6
Low interaction
Simulates some aspects
of the system
Easy to deploy, minimal
risk
 Limited Information
Eg:- Honeyd
Architecture of low interaction honeypots
7
Physical Honeypots
8
Real machines
Own IP Addresses
Often high-interactive
Virtual Honeypots
9
Simulated by other machines that:
• Respond to the network traffic sent to the honeypots
• May simulate a lot of (different) virtual honeypots at the same
time
Production Honeypots
10
Help to mitigate risk in your organizations
3 categories:
1.Prevention
• Keeping the bad guys out
• Mechanism such as encryption prevent attackers from
accessing critical information.
Contd…
11
2. Detection
• Detecting the attacker when he breaks in.
• Challenges: False positive, False negative
3.Response
• Can easily be pulled offline
Research Honeypots
12
Capture extensive information
Used primarily by research, military, government organization.
Used:
• To capture automated threats, such autorooters
• To capture unknown tools or techniques
• To better understand attackers motives
HONEYD
13
Open source software released under GNU General Public
License.
Able to simulate big network on a single host.
 Provides simple functionality.
A Honeyd config file
14
create windows
set windows personality "Windows NT 4.0 Server SP5-SP6"
set windows default tcp action reset
set windows default udp action reset
add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl"
add windows tcp port 139 open
add windows tcp port 137 open
add windows udp port 137 open
add windows udp port 135 open
set windows uptime 3284460
bind 192.168.1.201 windows
How Honeyd Works?
15
Overview of honeyd
architecture
Routing
Personality
engine
Packet
dispatcher
ICMP TCP UDP
Services
Routing
Configuration
Personality
Network
Lookup
• Packet dispatcher
• Configuration database
• Protocol handlers
• Router
• Personality engine
16
HONEYNET
17
High interaction honeypots
Two or more honeypots on a network form a honeynet.
It is basically an architecture, an entire network of computers
designed to be attacked.
 The key to the honeynet architecture is “Honey wall”.
ARCHITECTURE OF
HONEYNET
18
Gen 1
19
Gen2
20
Advantages of Honeypots
21
Collect small data sets of high value
Reduced false positive
Cost effective
Simplicity
Minimal resources
Disadvantages of Honeypots
22
Limited view
Risk
Finger Printing
CONCLUSION
23
Effective tool for observing hacker movements as well as preparing
the system for future attacks.
Flexible tool with different applications to security
 Primary value in detection and information gathering.
REFERENCES
24
• R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,”
International Conference on Computer Communication and Networks CSI-COMNET-
2011, vol. 1, no. 1, pp. 4–27, 2011.
• Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html.
• http://www.tracking-hackers.com/papers/honeypots.html
• The Honeynet Project, “Know Your Enemy: Statistics,” available
online:http://honeynet.org/papers/stats
• http://www.honeynet.org
• http://project.honeypot.org
QUESTIONS…….
25
THANKYOU
26

Weitere ähnliche Inhalte

Ähnlich wie honeypotss.pptx

Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN
 

Ähnlich wie honeypotss.pptx (20)

honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
E0312834
E0312834E0312834
E0312834
 
Honeypot
Honeypot Honeypot
Honeypot
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 

Mehr von Poooi2

eddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptxeddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptx
Poooi2
 
microgrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptxmicrogrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptx
Poooi2
 
schneider-electric-storage.pptx
schneider-electric-storage.pptxschneider-electric-storage.pptx
schneider-electric-storage.pptx
Poooi2
 
162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx
Poooi2
 
artificial intellegence.pptx
artificial intellegence.pptxartificial intellegence.pptx
artificial intellegence.pptx
Poooi2
 
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptxa36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
Poooi2
 
honeypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptxhoneypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptx
Poooi2
 

Mehr von Poooi2 (15)

eddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptxeddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptx
 
microgrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptxmicrogrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptx
 
schneider-electric-storage.pptx
schneider-electric-storage.pptxschneider-electric-storage.pptx
schneider-electric-storage.pptx
 
162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx
 
artificial intellegence.pptx
artificial intellegence.pptxartificial intellegence.pptx
artificial intellegence.pptx
 
Night-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptxNight-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptx
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
developementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptxdevelopementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptx
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
 
solartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptxsolartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptx
 
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptxa36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
 
honeypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptxhoneypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptx
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

honeypotss.pptx

  • 2. CONTENTS 2  Introduction  What are Honey pots?  Classification  Honeyd  Honeynet  Advantages of honeypot  Disadvantages of honeypot  Conclusion
  • 3. INTRODUCTION 3 The internet is growing very fast.  New attacks every day The more you know about your enemy, the better you can protect yourself. The main goal of honeypot is to gather as much information as possible.
  • 4. WHAT ARE HONEYPOTS? 4 Honeypot is an exciting new technology with enormous potential for the security community. According to Lance Spitzner, founder of honeypot project: “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.” Used for monitoring, detecting and analyzing attacks
  • 5. CLASSIFICATION By level of interaction High Low By implementation Physical Virtual By purpose Production Research 5
  • 6. High interaction Simulates all aspects of the OS: real systems. Can be compromised completely, higher risk. More Information Eg:-Honeynet Architecture of high interaction honeypots 6
  • 7. Low interaction Simulates some aspects of the system Easy to deploy, minimal risk  Limited Information Eg:- Honeyd Architecture of low interaction honeypots 7
  • 8. Physical Honeypots 8 Real machines Own IP Addresses Often high-interactive
  • 9. Virtual Honeypots 9 Simulated by other machines that: • Respond to the network traffic sent to the honeypots • May simulate a lot of (different) virtual honeypots at the same time
  • 10. Production Honeypots 10 Help to mitigate risk in your organizations 3 categories: 1.Prevention • Keeping the bad guys out • Mechanism such as encryption prevent attackers from accessing critical information.
  • 11. Contd… 11 2. Detection • Detecting the attacker when he breaks in. • Challenges: False positive, False negative 3.Response • Can easily be pulled offline
  • 12. Research Honeypots 12 Capture extensive information Used primarily by research, military, government organization. Used: • To capture automated threats, such autorooters • To capture unknown tools or techniques • To better understand attackers motives
  • 13. HONEYD 13 Open source software released under GNU General Public License. Able to simulate big network on a single host.  Provides simple functionality.
  • 14. A Honeyd config file 14 create windows set windows personality "Windows NT 4.0 Server SP5-SP6" set windows default tcp action reset set windows default udp action reset add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl" add windows tcp port 139 open add windows tcp port 137 open add windows udp port 137 open add windows udp port 135 open set windows uptime 3284460 bind 192.168.1.201 windows
  • 16. Overview of honeyd architecture Routing Personality engine Packet dispatcher ICMP TCP UDP Services Routing Configuration Personality Network Lookup • Packet dispatcher • Configuration database • Protocol handlers • Router • Personality engine 16
  • 17. HONEYNET 17 High interaction honeypots Two or more honeypots on a network form a honeynet. It is basically an architecture, an entire network of computers designed to be attacked.  The key to the honeynet architecture is “Honey wall”.
  • 21. Advantages of Honeypots 21 Collect small data sets of high value Reduced false positive Cost effective Simplicity Minimal resources
  • 22. Disadvantages of Honeypots 22 Limited view Risk Finger Printing
  • 23. CONCLUSION 23 Effective tool for observing hacker movements as well as preparing the system for future attacks. Flexible tool with different applications to security  Primary value in detection and information gathering.
  • 24. REFERENCES 24 • R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,” International Conference on Computer Communication and Networks CSI-COMNET- 2011, vol. 1, no. 1, pp. 4–27, 2011. • Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html. • http://www.tracking-hackers.com/papers/honeypots.html • The Honeynet Project, “Know Your Enemy: Statistics,” available online:http://honeynet.org/papers/stats • http://www.honeynet.org • http://project.honeypot.org