Honeypots
Honeypots
Honeypots
UMRAKH
SEMINAR ON : HONEYPOTS
3
HISTRORY OF HONEYPOTS…
The history of Honeypots so far according to
Lance Spitzner (2002):
4
1998: BackOfficer Friendly honeypot was
introduced. It was free and easy to configure. It is
working under Windows operating system. Most
of the people tried this software and the concept
of honeypot became more and more known
among people.
6
WHY HONEYPOTS ?
An additional layer of security.
Firewall IDS
HoneyPots
7
HOW IT WORKS…
8
TYPES OF HONEYPOTS …
Research Honeypots: Research honeypots are
mostly used by military, research and
government organizations. They are capturing a
huge amount of information. Their aim is to
discover new threats and learn more about the
Blackhat motives and techniques. The objective
is to learn how to protect a system better, they do
not bring any direct value to the security of an
organization.
9
Production Honeypots : Production honeypots
are used to protect the company from attacks,
they are implemented inside the production
network to improve the overall security. They are
capturing a limited amount of information,
mostly low interaction honeypots are used. Thus,
security administrator watches the hacker’s
movements carefully and tries to lower the risks
that may come from it towards the company.
10
HONEYPOTS IN CYBER SECURITY
A honeypot is a decoy computer system for
trapping hackers or tracking unconventional or
new hacking methods. Honeypots are designed
to purposely engage and deceive hackers and
identify malicious activities performed over the
Internet. Multiple honeypots can be set on a
network to form a honeynet.
11
ADVANTAGES
Small data sets of high value.
12
Work fine in encrypted or IPv6 environments.
(The most obvious improvement in IPv6 is
that IP addresses are lengthened from 32 bits to
128 bits. This extension anticipates considerable
future growth of the Internet and provides relief.)
13
DISADVANTAGES
Can only track and capture activity that directly interacts
with them.
14
High interaction honeypot introduces a high level of risk.
15
COMPARISION : HONEYPOTS VS IDS
To detect malicious behavior, Intrusion Detection
System (IDS require signatures of known attacks
and often fail to detect compromises that were
unknown at the time it was deployed. On the
other hand, honeypots can detect vulnerabilities
that are not yet understood.
17
COMPARISION : HONEYPOTS VS FIREWALL
A firewall is designed to keep the attackers out of
the network whereas honeypots are designed to
entice the hackers to attack the system.
19
CONCLUSION
• Can collect in depth data which no other technology can.
• Different from others – its value lies in being attacked,
probed or compromised.
• Extremely useful in observing hacker movements and
preparing the systems for future attacks.
20
11. REFERENCES
Webography
https://www.google.com/search?ei=Lq0tXKKuM4
z7vgTa9LewBQ&q=webography&oq=webogra&gs_l
=psy-
ab.3.0.0i67j0l9.92369.93609..94747...0.0..1.213.9
98.0j6j1......0....1..gws-
wiz.......0i71j0i10i67j0i10.ZSIbgeq2I70
21
22