SlideShare a Scribd company logo
1 of 26
Download to read offline
HONEYPOTS
PRESENTED BY,
SARANYA.S
S7 CSE
1
CONTENTS
 Introduction
 What are Honey pots?
 Classification
 Honeyd
 Honeynet
 Advantages of honeypot
 Disadvantages of honeypot
 Conclusion
2
INTRODUCTION
The internet is growing very fast.
 New attacks every day
The more you know about your enemy, the better you can protect
yourself.
The main goal of honeypot is to gather as much information as
possible.
3
WHAT ARE HONEYPOTS?
Honeypot is an exciting new technology with enormous
potential for the security community.
According to Lance Spitzner, founder of honeypot project: “A
honeypot is an information system resource whose value lies
in unauthorized or illicit use of that resource.”
Used for monitoring, detecting and analyzing attacks
4
CLASSIFICATION
By level of
interaction
High Low
By level of
interaction
By
implementation
Physical Virtual
By
purpose
Production Research
5
High interaction
Simulates all aspects of
the OS: real systems.
Can be compromised
completely, higher risk.
More Information
Eg:-Honeynet
Architecture of high interaction honeypots
6
Low interaction
Simulates some aspects
of the system
Easy to deploy, minimal
risk
 Limited Information
Eg:- Honeyd
7
Architecture of low interaction honeypots
Physical Honeypots
Real machines
Own IP Addresses
Often high-interactive
8
Virtual Honeypots
Simulated by other machines that:
• Respond to the network traffic sent to the honeypots
• May simulate a lot of (different) virtual honeypots at the same
time
9
Production Honeypots
Help to mitigate risk in your organizations
3 categories:
1.Prevention
• Keeping the bad guys out
• Mechanism such as encryption prevent attackers from
accessing critical information.
10
Contd…
2. Detection
• Detecting the attacker when he breaks in.
• Challenges: False positive, False negative
3.Response
• Can easily be pulled offline
11
Research Honeypots
Capture extensive information
Used primarily by research, military, government organization.
Used:
• To capture automated threats, such autorooters
• To capture unknown tools or techniques
• To better understand attackers motives
12
HONEYD
 Open source software released under GNU General Public
License.
Able to simulate big network on a single host.
 Provides simple functionality.
13
A Honeyd config file
create windows
set windows personality "Windows NT 4.0 Server SP5-SP6"
set windows default tcp action reset
set windows default udp action reset
add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl"
add windows tcp port 139 open
add windows tcp port 137 open
add windows udp port 137 open
add windows udp port 135 open
set windows uptime 3284460
bind 192.168.1.201 windows
14
How Honeyd Works?
15
Overview of honeyd
architecture
16
Routing
Personality
engine
Packet
dispatcher
ICMP TCP UDP
Services
Routing
Configuration
Personality
Network
Lookup
• Packet dispatcher
• Configuration database
• Protocol handlers
• Router
• Personality engine
HONEYNET
High interaction honeypots
Two or more honeypots on a network form a honeynet.
It is basically an architecture, an entire network of computers
designed to be attacked.
 The key to the honeynet architecture is “Honey wall”.
17
ARCHITECTURE OF
HONEYNET
18
Gen 1
19
Gen 2
20
Advantages of Honeypots
Collect small data sets of high value
Reduced false positive
Cost effective
Simplicity
Minimal resources
21
Disadvantages of Honeypots
Limited view
Risk
Finger Printing
22
CONCLUSION
 Effective tool for observing hacker movements as well as preparing
the system for future attacks.
Flexible tool with different applications to security
 Primary value in detection and information gathering.
23
REFERENCES
• R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,”
International Conference on Computer Communication and Networks CSI-COMNET-
2011, vol. 1, no. 1, pp. 4–27, 2011.
• Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html.
• http://www.tracking-hackers.com/papers/honeypots.html
• The Honeynet Project, “Know Your Enemy: Statistics,” available
online:http://honeynet.org/papers/stats
• http://www.honeynet.org
• http://project.honeypot.org
24
QUESTIONS…….
25
THANKYOU
26

More Related Content

Similar to Honeypots Explained: Learn About Honeypot Types, Uses, Advantages & More

Similar to Honeypots Explained: Learn About Honeypot Types, Uses, Advantages & More (20)

E0312834
E0312834E0312834
E0312834
 
Honeypot
Honeypot Honeypot
Honeypot
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
 
Honeypots
HoneypotsHoneypots
Honeypots
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypot
HoneypotHoneypot
Honeypot
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 

More from Poooi2

eddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptxeddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptxPoooi2
 
microgrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptxmicrogrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptxPoooi2
 
schneider-electric-storage.pptx
schneider-electric-storage.pptxschneider-electric-storage.pptx
schneider-electric-storage.pptxPoooi2
 
162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptxPoooi2
 
artificial intellegence.pptx
artificial intellegence.pptxartificial intellegence.pptx
artificial intellegence.pptxPoooi2
 
Night-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptxNight-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptxPoooi2
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxPoooi2
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdfPoooi2
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
developementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptxdevelopementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptxPoooi2
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxPoooi2
 
solartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptxsolartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptxPoooi2
 
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptxa36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptxPoooi2
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.pptPoooi2
 

More from Poooi2 (14)

eddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptxeddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptx
 
microgrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptxmicrogrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptx
 
schneider-electric-storage.pptx
schneider-electric-storage.pptxschneider-electric-storage.pptx
schneider-electric-storage.pptx
 
162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx
 
artificial intellegence.pptx
artificial intellegence.pptxartificial intellegence.pptx
artificial intellegence.pptx
 
Night-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptxNight-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptx
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
developementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptxdevelopementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptx
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
 
solartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptxsolartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptx
 
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptxa36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Honeypots Explained: Learn About Honeypot Types, Uses, Advantages & More

  • 2. CONTENTS  Introduction  What are Honey pots?  Classification  Honeyd  Honeynet  Advantages of honeypot  Disadvantages of honeypot  Conclusion 2
  • 3. INTRODUCTION The internet is growing very fast.  New attacks every day The more you know about your enemy, the better you can protect yourself. The main goal of honeypot is to gather as much information as possible. 3
  • 4. WHAT ARE HONEYPOTS? Honeypot is an exciting new technology with enormous potential for the security community. According to Lance Spitzner, founder of honeypot project: “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.” Used for monitoring, detecting and analyzing attacks 4
  • 5. CLASSIFICATION By level of interaction High Low By level of interaction By implementation Physical Virtual By purpose Production Research 5
  • 6. High interaction Simulates all aspects of the OS: real systems. Can be compromised completely, higher risk. More Information Eg:-Honeynet Architecture of high interaction honeypots 6
  • 7. Low interaction Simulates some aspects of the system Easy to deploy, minimal risk  Limited Information Eg:- Honeyd 7 Architecture of low interaction honeypots
  • 8. Physical Honeypots Real machines Own IP Addresses Often high-interactive 8
  • 9. Virtual Honeypots Simulated by other machines that: • Respond to the network traffic sent to the honeypots • May simulate a lot of (different) virtual honeypots at the same time 9
  • 10. Production Honeypots Help to mitigate risk in your organizations 3 categories: 1.Prevention • Keeping the bad guys out • Mechanism such as encryption prevent attackers from accessing critical information. 10
  • 11. Contd… 2. Detection • Detecting the attacker when he breaks in. • Challenges: False positive, False negative 3.Response • Can easily be pulled offline 11
  • 12. Research Honeypots Capture extensive information Used primarily by research, military, government organization. Used: • To capture automated threats, such autorooters • To capture unknown tools or techniques • To better understand attackers motives 12
  • 13. HONEYD  Open source software released under GNU General Public License. Able to simulate big network on a single host.  Provides simple functionality. 13
  • 14. A Honeyd config file create windows set windows personality "Windows NT 4.0 Server SP5-SP6" set windows default tcp action reset set windows default udp action reset add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl" add windows tcp port 139 open add windows tcp port 137 open add windows udp port 137 open add windows udp port 135 open set windows uptime 3284460 bind 192.168.1.201 windows 14
  • 16. Overview of honeyd architecture 16 Routing Personality engine Packet dispatcher ICMP TCP UDP Services Routing Configuration Personality Network Lookup • Packet dispatcher • Configuration database • Protocol handlers • Router • Personality engine
  • 17. HONEYNET High interaction honeypots Two or more honeypots on a network form a honeynet. It is basically an architecture, an entire network of computers designed to be attacked.  The key to the honeynet architecture is “Honey wall”. 17
  • 21. Advantages of Honeypots Collect small data sets of high value Reduced false positive Cost effective Simplicity Minimal resources 21
  • 22. Disadvantages of Honeypots Limited view Risk Finger Printing 22
  • 23. CONCLUSION  Effective tool for observing hacker movements as well as preparing the system for future attacks. Flexible tool with different applications to security  Primary value in detection and information gathering. 23
  • 24. REFERENCES • R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,” International Conference on Computer Communication and Networks CSI-COMNET- 2011, vol. 1, no. 1, pp. 4–27, 2011. • Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html. • http://www.tracking-hackers.com/papers/honeypots.html • The Honeynet Project, “Know Your Enemy: Statistics,” available online:http://honeynet.org/papers/stats • http://www.honeynet.org • http://project.honeypot.org 24