SlideShare a Scribd company logo
1 of 22
Honey Pots
(Intrusion Detection System)

                           Presented By:-
Professor:-
Swati Pandey
                           Alok Singh
                           CS 3rd Year
                           0916510015
Overview
 Historical aspect
 Evolution of Honey Pots
 Concept Of Honey P0ts
 Why we use Honey Pots.
 Definition of Honey Pots
 Types of Honey Pots
 Working of Honey Pots(using Snort)
 Level of Interaction
 Some of Honey Pots Tools
 Advantages
 Disvantages
 Todays Honey Pots
 Future Honey Pots
 Any Queries
Historical aspect
 1990/1991 The Cuckoo’s Egg and Evening with Berferd
 1997 - Deception Toolkit
 1998 - CyberCop Sting
 1998 - NetFacade (and Snort)
 1998 - BackOfficer Friendly
 1999 - Formation of the Honeynet Project
 2001 - Worms captured
 2002 - dtspcd exploit capture
Evolution of Honey Pots
 Firewalls
  Early 90’s
  Must have – deployed before anything else
 Intrusion Detection System (IDS)
  Mid to late 90’s
  We can’t guard everything, so let’s watch the network
  for suspicious traffic
 Honeypots
  Early 2000
  Not only do we want to know when the black hats are
  attacking, but also answer the question, Why?
  Let’s learn rather than just react
Concept of Honeypots
 A security resource who’s value lies in being
  probed, attacked or compromised

 Has no production value; anything going to from
  a honeypot is likely a probe, attack or
  compromise

 Used for monitoring, detecting and analyzing
  attacks
 A honeypot is an information system resource
  whose value lies in unauthorized or illicit use of
  that resource.(Sorce:-Tracking-Hackers Paper)
Why we Use Honey Pots?
           An additional layer of security
 Its is different security from Firewall.
 Firewall only work upon system security.
 This security work on the Network Layer.
Honeypots
• A server that is configured to
  detect an intruder by mirroring a
  real production system.
• It appears as an ordinary server
  doing work, but all the data and
  transactions are phony.
• Located either in or outside the
  firewall, the honeypot is used to
  learn about an intruder's
  techniques as well as determine
  vulnerabilities in the real system.
• Set to detect, deflect, or in some
  manner counteract attempts at
  unauthorized use of information
  systems.
Types of Honeypots
• Generally speaking there are two       .
  different types of Honeypots:
  Production Honeypots and
   Research Honeypots
• Production Honeypots are used
  primarily by companies or
  corporations to improve their
  overall state of security.
• Research Honeypots are used
  primarily by non-profit research
  organizations or educational
  institutions to research the threats
  organizations face and learn how to
  better protect against those
  threats.
Working of Honey Pots(using Snort)
             Snort Description
    Open Source Network
    Intrusion Prevention and
    Detection System. It uses a
    rule-based language combining
    signature, protocol and anomaly
    inspection methods.
   the most widely deployed
    intrusion detection and
    prevention technology and it has
    become the de facto standard
    technology worldwide in the
    industry.
   Only Snort is working on
    Windows environment System.
Working of Snort(IDS)
        IDS
                            Invisible SNORT Monitor

                              Promiscuous mode

                             Two SNORT Sessions


Session 1       Signature Analysis         Monitoring




Session 2        Packet Capture          DATA CAPTURE
Capturing Of Packet on Network
Practical Snort Working
• PLZ see the which included with it.
Level of Interaction
• Level of Interaction determines amount of
  functionality a honeypot provides.

• The greater the interaction, the more you can
  learn.
• The greater the interaction, the more complexity
  and risk.
• Chance that an attacker can use your honeypot to
  harm, attack, or infiltrate other systems or
  organizations
Low Interaction
• Provide Emulated Services
• No operating system for attacker to
  access.
• Information limited to transactional
  information and attackers activities with
  emulated services
• Some of low interaction tools are
  Honeyed ,spector.
High Interaction
•   Provide Actual Operating Systems
•   Learn extensive amounts of information.
•   Extensive risk.
•   Some of high level tools are Honeynets.
•   Honeynets is a kind of HoneyPot project which are
    developing and testing stage.
Some of Honey Pots Tools
• BackOfficer Friendly
  – http://www.nfr.com/products/bof/               Low Interaction


• SPECTER
  – http://www.specter.com
• Honeyd
  – http://www.citi.umich.edu/u/provos/honeyd/
• ManTrap
  – http://www.recourse.com
• Honeynets
  – http://project.honeynet.org/papers/honeynet/   High Interaction
Advantages

●   Fidelity – Information of high value
•   Encryption or IPv6
•   New tools and tactics
•   Simple concept
•   Not resource intensive
•   Return on Investment
Disadvantages

●   Labor/skill intensive
●   Risk
●   Limited field of view
●   Does not protect vulnerable systems
Today's honeypots

• Military, government
  organizations, security companies
  applying the technologies
• Primarily to identify threats and learn more
  about them
• Commercial application increasing
  everyday
Future of Honey Pots

•   Honeypots are now where firewalls were eight years
    ago
•   Beginning of the “hype curve”5
•   Enhanced policy enforcement capabilities
•   Advance development in Open Source solutions
•   Integrated firewall/IDS/honeypot appliances
Any Queries




Resources:-
Honeypots: Tracking Hackers
  http://www.tracking-hackers.com
THANK YOU
For your attention

More Related Content

What's hot

Honeypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTHoneypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTparthan t
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesamit kumar
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on HoneypotAmit Poonia
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)Emil Tan
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypottushar mandal
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its typesVishal Tandel
 

What's hot (20)

Honey pots
Honey potsHoney pots
Honey pots
 
Honeypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTHoneypot based intrusion detection system PPT
Honeypot based intrusion detection system PPT
 
Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honeypot
Honeypot Honeypot
Honeypot
 
Honeypot
HoneypotHoneypot
Honeypot
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honeypots
HoneypotsHoneypots
Honeypots
 

Viewers also liked

Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar reportInder NeGi
 
HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.Shantanu Kumar Das
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypotmmubashirkhan
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
Night Vision Technology
Night Vision TechnologyNight Vision Technology
Night Vision TechnologyKoushik Mekala
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network securitychella mani
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYMihika Shah
 
Creación de páginas de empresa en facebook
Creación de páginas de empresa en facebookCreación de páginas de empresa en facebook
Creación de páginas de empresa en facebookRK2 Social Media
 
Evaluacion del desarrollo curricular
Evaluacion del desarrollo curricularEvaluacion del desarrollo curricular
Evaluacion del desarrollo curricularWences Lao Quispe
 
Componentes del Sistema Computacional
Componentes del Sistema ComputacionalComponentes del Sistema Computacional
Componentes del Sistema Computacionalcarmen1campos
 
REDES WAN PROTOCOLO FRAME RELAY
REDES WAN  PROTOCOLO FRAME RELAYREDES WAN  PROTOCOLO FRAME RELAY
REDES WAN PROTOCOLO FRAME RELAYJosé Rodriguez
 
Overall Equipment Effectiveness, o Eficiencia General de los Equipos
Overall Equipment Effectiveness, o Eficiencia General de los EquiposOverall Equipment Effectiveness, o Eficiencia General de los Equipos
Overall Equipment Effectiveness, o Eficiencia General de los EquiposJeff Flores Ferrer
 

Viewers also liked (18)

Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honey pots
Honey potsHoney pots
Honey pots
 
HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.
 
Honeypot
HoneypotHoneypot
Honeypot
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Night Vision Technology
Night Vision TechnologyNight Vision Technology
Night Vision Technology
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network security
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Creación de páginas de empresa en facebook
Creación de páginas de empresa en facebookCreación de páginas de empresa en facebook
Creación de páginas de empresa en facebook
 
Reisgids Gardameer 2013
Reisgids Gardameer 2013Reisgids Gardameer 2013
Reisgids Gardameer 2013
 
Evaluacion del desarrollo curricular
Evaluacion del desarrollo curricularEvaluacion del desarrollo curricular
Evaluacion del desarrollo curricular
 
Componentes del Sistema Computacional
Componentes del Sistema ComputacionalComponentes del Sistema Computacional
Componentes del Sistema Computacional
 
REDES WAN PROTOCOLO FRAME RELAY
REDES WAN  PROTOCOLO FRAME RELAYREDES WAN  PROTOCOLO FRAME RELAY
REDES WAN PROTOCOLO FRAME RELAY
 
Overall Equipment Effectiveness, o Eficiencia General de los Equipos
Overall Equipment Effectiveness, o Eficiencia General de los EquiposOverall Equipment Effectiveness, o Eficiencia General de los Equipos
Overall Equipment Effectiveness, o Eficiencia General de los Equipos
 

Similar to Honey pots

honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.pptDetSersi
 
Honeypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionHoneypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionINFOGAIN PUBLICATION
 
Honeypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionHoneypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionINFOGAIN PUBLICATION
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An OverviewIRJET Journal
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applicationsijtsrd
 
Anti malware tools intrusion detection systems
Anti malware tools intrusion detection systemsAnti malware tools intrusion detection systems
Anti malware tools intrusion detection systemsUltraUploader
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynetsRasool Irfan
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.pptPoooi2
 
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidentsHoneypots for proactively detecting security incidents
Honeypots for proactively detecting security incidentsAPNIC
 

Similar to Honey pots (17)

honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Honeypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionHoneypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion Detection
 
Honeypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionHoneypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion Detection
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots.ppt
Honeypots.pptHoneypots.ppt
Honeypots.ppt
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honey pot day 1
Honey pot day 1Honey pot day 1
Honey pot day 1
 
Anti malware tools intrusion detection systems
Anti malware tools intrusion detection systemsAnti malware tools intrusion detection systems
Anti malware tools intrusion detection systems
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidentsHoneypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
 
honeypots ppt.pptx
honeypots ppt.pptxhoneypots ppt.pptx
honeypots ppt.pptx
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Honey pots

  • 1. Honey Pots (Intrusion Detection System) Presented By:- Professor:- Swati Pandey Alok Singh CS 3rd Year 0916510015
  • 2. Overview  Historical aspect  Evolution of Honey Pots  Concept Of Honey P0ts  Why we use Honey Pots.  Definition of Honey Pots  Types of Honey Pots  Working of Honey Pots(using Snort)  Level of Interaction  Some of Honey Pots Tools  Advantages  Disvantages  Todays Honey Pots  Future Honey Pots  Any Queries
  • 3. Historical aspect  1990/1991 The Cuckoo’s Egg and Evening with Berferd  1997 - Deception Toolkit  1998 - CyberCop Sting  1998 - NetFacade (and Snort)  1998 - BackOfficer Friendly  1999 - Formation of the Honeynet Project  2001 - Worms captured  2002 - dtspcd exploit capture
  • 4. Evolution of Honey Pots  Firewalls Early 90’s Must have – deployed before anything else  Intrusion Detection System (IDS) Mid to late 90’s We can’t guard everything, so let’s watch the network for suspicious traffic  Honeypots Early 2000 Not only do we want to know when the black hats are attacking, but also answer the question, Why? Let’s learn rather than just react
  • 5. Concept of Honeypots  A security resource who’s value lies in being probed, attacked or compromised  Has no production value; anything going to from a honeypot is likely a probe, attack or compromise  Used for monitoring, detecting and analyzing attacks  A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.(Sorce:-Tracking-Hackers Paper)
  • 6. Why we Use Honey Pots? An additional layer of security  Its is different security from Firewall.  Firewall only work upon system security.  This security work on the Network Layer.
  • 7. Honeypots • A server that is configured to detect an intruder by mirroring a real production system. • It appears as an ordinary server doing work, but all the data and transactions are phony. • Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine vulnerabilities in the real system. • Set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
  • 8. Types of Honeypots • Generally speaking there are two . different types of Honeypots: Production Honeypots and Research Honeypots • Production Honeypots are used primarily by companies or corporations to improve their overall state of security. • Research Honeypots are used primarily by non-profit research organizations or educational institutions to research the threats organizations face and learn how to better protect against those threats.
  • 9. Working of Honey Pots(using Snort) Snort Description  Open Source Network Intrusion Prevention and Detection System. It uses a rule-based language combining signature, protocol and anomaly inspection methods.  the most widely deployed intrusion detection and prevention technology and it has become the de facto standard technology worldwide in the industry.  Only Snort is working on Windows environment System.
  • 10. Working of Snort(IDS) IDS Invisible SNORT Monitor Promiscuous mode Two SNORT Sessions Session 1 Signature Analysis Monitoring Session 2 Packet Capture DATA CAPTURE
  • 11. Capturing Of Packet on Network
  • 12. Practical Snort Working • PLZ see the which included with it.
  • 13. Level of Interaction • Level of Interaction determines amount of functionality a honeypot provides. • The greater the interaction, the more you can learn. • The greater the interaction, the more complexity and risk. • Chance that an attacker can use your honeypot to harm, attack, or infiltrate other systems or organizations
  • 14. Low Interaction • Provide Emulated Services • No operating system for attacker to access. • Information limited to transactional information and attackers activities with emulated services • Some of low interaction tools are Honeyed ,spector.
  • 15. High Interaction • Provide Actual Operating Systems • Learn extensive amounts of information. • Extensive risk. • Some of high level tools are Honeynets. • Honeynets is a kind of HoneyPot project which are developing and testing stage.
  • 16. Some of Honey Pots Tools • BackOfficer Friendly – http://www.nfr.com/products/bof/ Low Interaction • SPECTER – http://www.specter.com • Honeyd – http://www.citi.umich.edu/u/provos/honeyd/ • ManTrap – http://www.recourse.com • Honeynets – http://project.honeynet.org/papers/honeynet/ High Interaction
  • 17. Advantages ● Fidelity – Information of high value • Encryption or IPv6 • New tools and tactics • Simple concept • Not resource intensive • Return on Investment
  • 18. Disadvantages ● Labor/skill intensive ● Risk ● Limited field of view ● Does not protect vulnerable systems
  • 19. Today's honeypots • Military, government organizations, security companies applying the technologies • Primarily to identify threats and learn more about them • Commercial application increasing everyday
  • 20. Future of Honey Pots • Honeypots are now where firewalls were eight years ago • Beginning of the “hype curve”5 • Enhanced policy enforcement capabilities • Advance development in Open Source solutions • Integrated firewall/IDS/honeypot appliances
  • 21. Any Queries Resources:- Honeypots: Tracking Hackers http://www.tracking-hackers.com
  • 22. THANK YOU For your attention