SlideShare a Scribd company logo
1 of 19
HONEYPOT
INTRODUCTION
 The purposes of honeypot are to detected and
learn from attacks and use that information
provides network security.
 Honeypots are analyzed by their role of
application, which is meant it can be used for
production and research.
DEFINATION OF HONEYPOT:
 "A honeypot is security resource whose value lies
in being probed, attacked, or compromised”.
 A honeypot is a system that is built and set up in
order to be hacked.
HISTORY
1990-1991: first time , honeypot studies
released by Clifford Stoll and Bill Cheswick .
1997: Deception Toolkit version 0.1 was
introduced by Fred Cohen.
1998: First commercial honeypot was released
which is known as Cyber Cop Sting.
CONTINUED….
1998: Back Officer Friendly honeypot was
introduced. It was free and easy to configure. It
is working under Windows operating system.
1999: After Back Officer Friendly, people were
more into this new technology. Honeynet
project started at this year. people understood
the aim of the honeypots more.
ARCHITECTURE OF HONEYPOT
HONEYPOT VALUE
• Prevention
prevent automated attacks:(Warms and auto-
rooters)
• Detection
identify a failure or breakdown in prevention
• Response
TYPES OF HONEYPOT
Research
 Complex to deploy and maintain.
 Captures extensive information.
 Run by a volunteer(non-profit).
 Used to research the threats organization face.
Production
 Easy to use
 Capture only limited information
 Used by companies or corporations
 Mitigates risks in organization
LEVEL OF HONEYPOT
Level of interaction determines the amount of functionality a
honeypot provides
LOW INTERACTION HIGH INTERACTION
Low learning ,complexity & risk High learning ,complexity & risk
HIGH LEVEL INTERACTION
 Load of high-interaction honeypots are reduced
by preprocessing the traffic using low-interaction
honeypots as much as possible.
 A high-interaction honeypot can be compromised
completely, allowing an adversary to gain full
access to the system and use it to launch further
network attacks.
 In High Interaction Honeypots nothing is
emulated everything is real.
 High Interaction Honeypots provide a far
more detailed picture of how an attack or
intrusion progresses or how a particular malware
execute in real-time.
LOW LEVEL INTERACTION
 This kind of honeypot has a small chance of
being compromised.
 It is production honeypot.
 Typical use of low-interaction honeypot
includes:
 port scans identification,
 generation of attack signatures,
 trend analysis and malware collection.
LOW INTERACTION VS. HIGH INTERACTION
PLACEMENT OF HONEYPOT
 In front of the firewall (Internet)
 DMZ (De-Militarized Zone)
 Behind the firewall (intranet)
HONEYPOT TOPOLOGY
Mainly, There are two types of honeypot topologies:
 Honeynet
 Virtual Honeypot
Honeynet:
 Two or more honeypots on a network form a honeynet.
 Actual network of computers
 High-interaction honeypot
 Its an architecture, not a product
CONTINUED..
Honeynet work:
 Monitoring, capturing, and analyzing all the packets entering
or leaving through networks.
 All the traffic is entering or leaving through the Honeynet is
naturally suspect.
 Provides real systems, applications, and services for attackers to
interact with.
 Any traffic entering or leaving is suspect.
DATA CONTROL OF HONEYWALL
ADVANTAGES OF HONEYPOTS
 Honeypots are focused (small data sets)s
 Honeypots help to catch unknown attacks
 Honeypots can capture encrypted activity (cf. Sebek)
 Honeypots work with IPv6
 Honeypots are very flexible
(advantage/disadvantage?)
 Honeypots require minimal resources
DISADVANTAGES OF HONEYPOT
 Limited View: honeypots can only track and capture
activity that directly interacts with them.
 Specifically, honeypots have the risk of being taken over by
the bad guy and being used to harm other systems. This risk
various for different honeypots.
CONCLUSION
 The purpose of this topic was to define the what honeypots
are and their value to the security community. We
identified two different types of honeypots, low-
interaction and high-interaction honeypots.
 Honeypots are not a solution, they are a flexible tool with
different applications to security.
 Primary value in detection and information gathering.
 Just the beginning for honeypots.
“ The more you know about your enemy,
the better you can protect yourself”
Honeypot ppt1

More Related Content

What's hot (20)

Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 
Honeypot
HoneypotHoneypot
Honeypot
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 

Viewers also liked

Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar reportInder NeGi
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief OverviewSILPI ROSAN
 
Honeypot Social Profiling
Honeypot Social ProfilingHoneypot Social Profiling
Honeypot Social ProfilingBryan Conde
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network securitychella mani
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to HoneypotsEmil Tan
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and SteganographyPreeti Yadav
 
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...Jason Trost
 

Viewers also liked (14)

Honey Pot
Honey PotHoney Pot
Honey Pot
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Honeypot Social Profiling
Honeypot Social ProfilingHoneypot Social Profiling
Honeypot Social Profiling
 
Honey pot day 1
Honey pot day 1Honey pot day 1
Honey pot day 1
 
Honeypot
HoneypotHoneypot
Honeypot
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network security
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honey pots
Honey potsHoney pots
Honey pots
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 

Similar to Honeypot ppt1

Similar to Honeypot ppt1 (15)

Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Ananth3
Ananth3Ananth3
Ananth3
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
M0704071074
M0704071074M0704071074
M0704071074
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Honeypot ppt1

  • 2. INTRODUCTION  The purposes of honeypot are to detected and learn from attacks and use that information provides network security.  Honeypots are analyzed by their role of application, which is meant it can be used for production and research. DEFINATION OF HONEYPOT:  "A honeypot is security resource whose value lies in being probed, attacked, or compromised”.  A honeypot is a system that is built and set up in order to be hacked.
  • 3. HISTORY 1990-1991: first time , honeypot studies released by Clifford Stoll and Bill Cheswick . 1997: Deception Toolkit version 0.1 was introduced by Fred Cohen. 1998: First commercial honeypot was released which is known as Cyber Cop Sting.
  • 4. CONTINUED…. 1998: Back Officer Friendly honeypot was introduced. It was free and easy to configure. It is working under Windows operating system. 1999: After Back Officer Friendly, people were more into this new technology. Honeynet project started at this year. people understood the aim of the honeypots more.
  • 6. HONEYPOT VALUE • Prevention prevent automated attacks:(Warms and auto- rooters) • Detection identify a failure or breakdown in prevention • Response
  • 7. TYPES OF HONEYPOT Research  Complex to deploy and maintain.  Captures extensive information.  Run by a volunteer(non-profit).  Used to research the threats organization face. Production  Easy to use  Capture only limited information  Used by companies or corporations  Mitigates risks in organization
  • 8. LEVEL OF HONEYPOT Level of interaction determines the amount of functionality a honeypot provides LOW INTERACTION HIGH INTERACTION Low learning ,complexity & risk High learning ,complexity & risk
  • 9. HIGH LEVEL INTERACTION  Load of high-interaction honeypots are reduced by preprocessing the traffic using low-interaction honeypots as much as possible.  A high-interaction honeypot can be compromised completely, allowing an adversary to gain full access to the system and use it to launch further network attacks.  In High Interaction Honeypots nothing is emulated everything is real.  High Interaction Honeypots provide a far more detailed picture of how an attack or intrusion progresses or how a particular malware execute in real-time.
  • 10. LOW LEVEL INTERACTION  This kind of honeypot has a small chance of being compromised.  It is production honeypot.  Typical use of low-interaction honeypot includes:  port scans identification,  generation of attack signatures,  trend analysis and malware collection.
  • 11. LOW INTERACTION VS. HIGH INTERACTION
  • 12. PLACEMENT OF HONEYPOT  In front of the firewall (Internet)  DMZ (De-Militarized Zone)  Behind the firewall (intranet)
  • 13. HONEYPOT TOPOLOGY Mainly, There are two types of honeypot topologies:  Honeynet  Virtual Honeypot Honeynet:  Two or more honeypots on a network form a honeynet.  Actual network of computers  High-interaction honeypot  Its an architecture, not a product
  • 14. CONTINUED.. Honeynet work:  Monitoring, capturing, and analyzing all the packets entering or leaving through networks.  All the traffic is entering or leaving through the Honeynet is naturally suspect.  Provides real systems, applications, and services for attackers to interact with.  Any traffic entering or leaving is suspect.
  • 15. DATA CONTROL OF HONEYWALL
  • 16. ADVANTAGES OF HONEYPOTS  Honeypots are focused (small data sets)s  Honeypots help to catch unknown attacks  Honeypots can capture encrypted activity (cf. Sebek)  Honeypots work with IPv6  Honeypots are very flexible (advantage/disadvantage?)  Honeypots require minimal resources
  • 17. DISADVANTAGES OF HONEYPOT  Limited View: honeypots can only track and capture activity that directly interacts with them.  Specifically, honeypots have the risk of being taken over by the bad guy and being used to harm other systems. This risk various for different honeypots.
  • 18. CONCLUSION  The purpose of this topic was to define the what honeypots are and their value to the security community. We identified two different types of honeypots, low- interaction and high-interaction honeypots.  Honeypots are not a solution, they are a flexible tool with different applications to security.  Primary value in detection and information gathering.  Just the beginning for honeypots. “ The more you know about your enemy, the better you can protect yourself”