The Honeypot Project
The Honeypot Project
The Honeypot Project
CONTENTS
Introduction
What is honeypot?
Advantages
Disadvatages
Types
Architecture
Deployment procedures
Legal issues
Summary
references
INTRODUCTION
Lance Spitzner
– A honeypot is a security resource whose
value lies in being probed, attacked, or
compromised
Honeypot Overview
HoneyPots are not a single tool but a
highly flexible technology.
Production honeypots
Research honeypots
Production Honeypots
Low-interaction
High-interaction
Prevent
Detect
No connection
Response Attackers
Monitor
Attack Data
HoneyPot A
Gateway
Honeypot Architecture
Block Diagram
Honeypot Medium
Core (WinSock) GUI
Malicious
String DB
HTTP
Telnet Login
Transactions
DB
DB
Honeypot Architecture
Communication between GUI and core
is done over Winsock
Why Winsock?
Answer:
– We wanted to allow for the expansion of
the deployment scheme. Suppose you
want to run multiple instances of the core
on different computers.
– Using Winsock allows running the GUI on
one machine while controlling others over
the network
Deplyoment procedures
Deploying a physical Honeypot can be very time
intensive and expensive as different operating
systems may require specialized hardware.
Additionally, every Honeypot requires its own physical
system and numerous configuration settings. Below
are some generalized steps used to deploy a basic
Honeypot.
Liability
Privacy
Entrapment
Summery
Honeypots are good resources for
tracing hackers.
The value of Honeypots is in being
Hacked.
Honeypots have their own pros and
cons and this technology is still
developing.
REFRENCES
http://project.honeynet.org/papers/honeyn
et/ .
www.securityfocus.com
http://www.honeypots.com
http://www.spitzner.net
Title : “Understanding Network Threats
through Honeypot Deployment” Author :
Greg M and Jake branson.
THANKS!