Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

Honeynet architecture

514 Aufrufe

Veröffentlicht am

Honeynet architecture and attacks on different OS and tracking the attacks using honeymap.

Veröffentlicht in: Internet
  • Als Erste(r) kommentieren

  • Gehören Sie zu den Ersten, denen das gefällt!

Honeynet architecture

  1. 1. The Use of Honeynet to Detect Exploited Systems
  2. 2. INTRODUCTION ● One of the most active threats we face today on the Internet is cyber-crime. ● Hackers are constantly developing more sophisticated means of profiting from online criminal activity. It’s become very hard to track these hackers.
  3. 3. ● All your personal files,password of online accounts and other stuff which you don’t want others to have access to. ● Then….How to save your password? ● So to answer this question a group of people came forward with a network setup called “Honeynet”.
  4. 4. What Is Honeynet? ● A Honeynet is a network that is intended to be compromised, its purpose is to get attacked, so that an attacker’s activities and methods can be studied and this information can be used to increase the network security. ● A Honeynet is placed behind a reverse firewall. ● The reverse firewall limits the amount of malicious traffic that can leave the Honeynet. ● There are two critical principles concerning the successful operation of a Honeynet. These two principles are the
  5. 5. Most Targeted Operating Systems in 2013
  6. 6. Advantages and Disadvantages ● Data Value ● Resources ● Simplicity ● Narrow Field of View ● Risk
  7. 7. CONCLUSION ● Risks are part of Honeynet research and we have to manage it ● Honeynets are used to be better prepared to information system attacks. ● Honeynets can early detect new threats and issues. ● Honeynets are a source of in-depth information that classical information security system can't easily provide.
  8. 8. THANK YOU