This ppt contains all the basics of honeypots like their types, implementation technologies, position in the network etc.
In the end, it contains a screenshot of a live honeypot processing.
2. HONEYPOTS
• What is honeypot ?
A honeypot is a computer security mechanism
set to detect, deflect or counteract attempts at
unauthorized use of information system.
It’s simply a TRAP to attacker.
3. HONEYPOTS
• How it works ?
A honeypot consists of data that appears to be
a legitimate part of the site but is actually
isolated and monitored, and that seems to
contain information or a resource of value to
attackers, which are then blocked.
7. HONEYPOTS
• HONEYPOT CLASSIFICATION:
By Implementation
• Virtual
• Physical
By purpose
• Production
• Research
By level of interaction
• High
• Low
• Middle?
8. HONEYPOTS
• IMPLEMENTATION OF HONEYPOT:
Physical
• Real machines
• Own IP Addresses
• Often high-interactive
Virtual
• Simulated by other machines that:
–Respond to the traffic sent to the honeypots
–May simulate a lot of virtual honeypots at the
same time
9. HONEYPOTS
• PROPOSE OF HONEYPOT:
Research
Complex to deploy and maintain.
Captures extensive information.
Run by a volunteer(non-profit).
Used to research the threats organization face.
Production
Easy to use
Capture only limited information
Used by companies or corporations
Mitigates risks in organization