SlideShare a Scribd company logo
1 of 21
Honeypots, bots
and Incidence
Response
What is Honeypot?
2
Betty Pack aka Amy Elizabeth : Honeypot
for MI 6
From the world of espionage
It is using a romantic relationship, like
Mata Hari-style spies, as a way to
steal secrets and are described as
setting a ‘honey trap’ or ‘honeypot’.
Often, a person is compromised by a
honey trap and then forced to hand
over everything he/she knows.
What is Honeytraps?
3
What is Honeypot?
4
From the computer Security World
A decoy system/ sacrificial computer system which
attracts attackers to gather information about their
actions. Baiting a trap for hackers.
Mimics a target for hackers, and uses their intrusion
attempts to gain information about cybercriminals and
the way they are operating or to distract them from
other targets.
As a monitoring system, it is used to identify potential
attacks, threats, vulnerabilities, techniques, and tools.
5
PHYSICAL ARENA
(RESIDENT AGENTS)
Increased Role of Front Offices
Reduced Physical Contact after recruitment
Information passed online to Reduce Risk
Honey Traps
VIRTUAL ARENA
Dating Sites : Location for Talent Spotting
Social Media : A Recruiting Zone
VoIP Calls : Tool for Eliciting Information
E-mails : To Infect Computers
E Banking : For Virtual Remuneration
THREAT VECTORS
Social Media Messenger Service SIM Boxs E-Mails
FaceBook, Tinder,
Instagram
Whatsapp, Facebook-
Messenger
VoIP Calls Infect Computers
(Q-Whisper/ Trust-X/ OTR.To)
& steal info
Changing face of espionage
What is Honeynet?
6
Network of high interaction
honeypots
An architecture and not a
product
Provides real systems,
applications and services for
attackers to interact with.
Source : www.honeynet.org
A simplified illustrative example of a network containing a honeynet. 7
What Honeypot Do?
8
•Assess the latest trends in attacks
•Understand where cyber attacks arise, and
•Better frame security policies to mitigate future risks.
Categories of Honeypots
2
10
Classification
By Implementation
By Purpose
By level of interaction
By Level of Interaction
Low Level Interaction
Simulated systems that
limits activities to be
performed
Does not allow the
capturing or
identification of new
exploits such as zero-
day attacks
Can be detected easily
by advanced or skilled
attackers.
Middle Level Interaction
provide more services
than low-interaction but
lesser services than
high-interaction systems
High Level Interaction
Provide enough services for
attackers to exploit
compared to low-interaction
honeypots
Not emulated systems like
low-interaction honey-pots.
Challenge is that these
systems can be used to
exploit other systems in the
network.
11
Research
High-interaction honeypot
Used for research the threats to
org & can be used to caution and
forecast future attacks and
exploits
Captures extensive information
Complex to deploy and maintain 12
Production
Low Interaction
Mitigates risks to org
Captures limited information
Simple to use
Implementation
Physical
Physical Machines
IP Address
High Interactive
High Maintenance Cost
Virtual
Virtual.
May simulate more
virtual honeypots at the
same time
e.g. Honeyd
Low Cost
13
How Honeypots Works?
Looks like a real computer system, with applications and data, fooling
cybercriminals into thinking it's a legitimate target.
Made attractive to attackers by building in deliberate security vulnerabilities. For
instance, a honeypot might have ports that respond to a port scan or weak
passwords.
14
Different Types used to identify
different types of threats
⬢ Email Honeypots
⬢ Decoy Database Honeypots
⬢ Malware Honeypots
⬢ Spider Honeypots
15
Benefits
• Distracts cybercriminals from targeting legitimate systems.
• Gives greater visibility of attacks as they’re happening.
• Monitors an attacker’s behaviors and detect zero-day
vulnerabilities.
• Puts the organization’s incident response capabilities to the test.
• Helps to improve your organization’s overall security
16
What Is a Honeypot in Network Security? Definition, Types & Uses - InfoSec Insights
(sectigostore.com)
Framework for response
⬢ The framework designed should comply with ISO/IEC 27043 and aimed
at detecting security incidents and collecting potential digital evidence
using honeypot technology.
⬢ Should be also aimed at minimizing digital forensic investigation
cost, maximizing the potential use of digital evidence gathered,
preserving, and improving information security
⬢ Should enhance the existing forensic readiness procedures for
devices as well as also enables the introduction of new forensic
technologies by organizations when adopted.
17
ISO/IEC 27043:2015
Information Technology : Security Techniques – Incident
Investigation Principles & Processes
⬢ Last reviewed and confirmed in 2020
⬢ Provides guidelines based on idealised models for common
incident investigatio rpocess across various incident investigation
scenarios involving digital evidence
⬢ Also describes processes and principles applicable to various
kinds of investigation including unauthorised access, data
corruption, system crash etc
18
19
A digital forensic readiness framework must for security threats and
challenges.
Implementation of such framework significantly improve information
security and provide reliable digital evidence for forensic investigation.
The framework must incorporate High and low interaction honeypots to
detect security incidents and collect digital evidence.
The framework should enable organizations to embed digital forensic
readiness.
Should be cost effective but also provide a trusted platform for
employees in the organization.
Digital Forensic Framework
Recommended Honeypots
and Honeynets
Low : Dionaea, HoneyDroid, Cowrie, Glastopf, BOF, DTK,
HoneyBot, GHH, Thug
High : Argos, Sebek, HoneySpider
2
Argos
21
Argos is a full and secure system emulator designed for
use in honeypots. It is based on Qemu, an open source
emulator that uses dynamic translation to achieve a fairly
good emulation speed.

More Related Content

Similar to HoneyPots.pptx

A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackCSCJournals
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network SecurityKirubaburi R
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on HoneypotAmit Poonia
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlJose Lopez
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsDam Frank
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief OverviewSILPI ROSAN
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET Journal
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypottushar mandal
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesamit kumar
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513IJRAT
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET Journal
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 

Similar to HoneyPots.pptx (20)

A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Honey pots
Honey potsHoney pots
Honey pots
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT Systems
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

HoneyPots.pptx

  • 2. What is Honeypot? 2 Betty Pack aka Amy Elizabeth : Honeypot for MI 6 From the world of espionage It is using a romantic relationship, like Mata Hari-style spies, as a way to steal secrets and are described as setting a ‘honey trap’ or ‘honeypot’. Often, a person is compromised by a honey trap and then forced to hand over everything he/she knows.
  • 4. What is Honeypot? 4 From the computer Security World A decoy system/ sacrificial computer system which attracts attackers to gather information about their actions. Baiting a trap for hackers. Mimics a target for hackers, and uses their intrusion attempts to gain information about cybercriminals and the way they are operating or to distract them from other targets. As a monitoring system, it is used to identify potential attacks, threats, vulnerabilities, techniques, and tools.
  • 5. 5 PHYSICAL ARENA (RESIDENT AGENTS) Increased Role of Front Offices Reduced Physical Contact after recruitment Information passed online to Reduce Risk Honey Traps VIRTUAL ARENA Dating Sites : Location for Talent Spotting Social Media : A Recruiting Zone VoIP Calls : Tool for Eliciting Information E-mails : To Infect Computers E Banking : For Virtual Remuneration THREAT VECTORS Social Media Messenger Service SIM Boxs E-Mails FaceBook, Tinder, Instagram Whatsapp, Facebook- Messenger VoIP Calls Infect Computers (Q-Whisper/ Trust-X/ OTR.To) & steal info Changing face of espionage
  • 6. What is Honeynet? 6 Network of high interaction honeypots An architecture and not a product Provides real systems, applications and services for attackers to interact with. Source : www.honeynet.org
  • 7. A simplified illustrative example of a network containing a honeynet. 7
  • 8. What Honeypot Do? 8 •Assess the latest trends in attacks •Understand where cyber attacks arise, and •Better frame security policies to mitigate future risks.
  • 11. By Level of Interaction Low Level Interaction Simulated systems that limits activities to be performed Does not allow the capturing or identification of new exploits such as zero- day attacks Can be detected easily by advanced or skilled attackers. Middle Level Interaction provide more services than low-interaction but lesser services than high-interaction systems High Level Interaction Provide enough services for attackers to exploit compared to low-interaction honeypots Not emulated systems like low-interaction honey-pots. Challenge is that these systems can be used to exploit other systems in the network. 11
  • 12. Research High-interaction honeypot Used for research the threats to org & can be used to caution and forecast future attacks and exploits Captures extensive information Complex to deploy and maintain 12 Production Low Interaction Mitigates risks to org Captures limited information Simple to use
  • 13. Implementation Physical Physical Machines IP Address High Interactive High Maintenance Cost Virtual Virtual. May simulate more virtual honeypots at the same time e.g. Honeyd Low Cost 13
  • 14. How Honeypots Works? Looks like a real computer system, with applications and data, fooling cybercriminals into thinking it's a legitimate target. Made attractive to attackers by building in deliberate security vulnerabilities. For instance, a honeypot might have ports that respond to a port scan or weak passwords. 14
  • 15. Different Types used to identify different types of threats ⬢ Email Honeypots ⬢ Decoy Database Honeypots ⬢ Malware Honeypots ⬢ Spider Honeypots 15
  • 16. Benefits • Distracts cybercriminals from targeting legitimate systems. • Gives greater visibility of attacks as they’re happening. • Monitors an attacker’s behaviors and detect zero-day vulnerabilities. • Puts the organization’s incident response capabilities to the test. • Helps to improve your organization’s overall security 16 What Is a Honeypot in Network Security? Definition, Types & Uses - InfoSec Insights (sectigostore.com)
  • 17. Framework for response ⬢ The framework designed should comply with ISO/IEC 27043 and aimed at detecting security incidents and collecting potential digital evidence using honeypot technology. ⬢ Should be also aimed at minimizing digital forensic investigation cost, maximizing the potential use of digital evidence gathered, preserving, and improving information security ⬢ Should enhance the existing forensic readiness procedures for devices as well as also enables the introduction of new forensic technologies by organizations when adopted. 17
  • 18. ISO/IEC 27043:2015 Information Technology : Security Techniques – Incident Investigation Principles & Processes ⬢ Last reviewed and confirmed in 2020 ⬢ Provides guidelines based on idealised models for common incident investigatio rpocess across various incident investigation scenarios involving digital evidence ⬢ Also describes processes and principles applicable to various kinds of investigation including unauthorised access, data corruption, system crash etc 18
  • 19. 19 A digital forensic readiness framework must for security threats and challenges. Implementation of such framework significantly improve information security and provide reliable digital evidence for forensic investigation. The framework must incorporate High and low interaction honeypots to detect security incidents and collect digital evidence. The framework should enable organizations to embed digital forensic readiness. Should be cost effective but also provide a trusted platform for employees in the organization. Digital Forensic Framework
  • 20. Recommended Honeypots and Honeynets Low : Dionaea, HoneyDroid, Cowrie, Glastopf, BOF, DTK, HoneyBot, GHH, Thug High : Argos, Sebek, HoneySpider 2
  • 21. Argos 21 Argos is a full and secure system emulator designed for use in honeypots. It is based on Qemu, an open source emulator that uses dynamic translation to achieve a fairly good emulation speed.