SlideShare a Scribd company logo
HONEYPOTS
PRESENTED BY,
SARANYA.S
S7 CSE
1
CONTENTS
 Introduction
 What are Honey pots?
 Classification
 Honeyd
 Honeynet
 Advantages of honeypot
 Disadvantages of honeypot
 Conclusion
2
INTRODUCTION
The internet is growing very fast.
 New attacks every day
The more you know about your enemy, the better you can protect
yourself.
The main goal of honeypot is to gather as much information as
possible.
3
WHAT ARE HONEYPOTS?
Honeypot is an exciting new technology with enormous
potential for the security community.
According to Lance Spitzner, founder of honeypot project: “A
honeypot is an information system resource whose value lies
in unauthorized or illicit use of that resource.”
Used for monitoring, detecting and analyzing attacks
4
CLASSIFICATION
By level of
interaction
High Low
By level of
interaction
By
implementation
Physical Virtual
By
purpose
Production Research
5
High interaction
Simulates all aspects of
the OS: real systems.
Can be compromised
completely, higher risk.
More Information
Eg:-Honeynet
Architecture of high interaction honeypots
6
Low interaction
Simulates some aspects
of the system
Easy to deploy, minimal
risk
 Limited Information
Eg:- Honeyd
7
Architecture of low interaction honeypots
Physical Honeypots
Real machines
Own IP Addresses
Often high-interactive
8
Virtual Honeypots
Simulated by other machines that:
• Respond to the network traffic sent to the honeypots
• May simulate a lot of (different) virtual honeypots at the same
time
9
Production Honeypots
Help to mitigate risk in your organizations
3 categories:
1.Prevention
• Keeping the bad guys out
• Mechanism such as encryption prevent attackers from
accessing critical information.
10
Contd…
2. Detection
• Detecting the attacker when he breaks in.
• Challenges: False positive, False negative
3.Response
• Can easily be pulled offline
11
Research Honeypots
Capture extensive information
Used primarily by research, military, government organization.
Used:
• To capture automated threats, such autorooters
• To capture unknown tools or techniques
• To better understand attackers motives
12
HONEYD
 Open source software released under GNU General Public
License.
Able to simulate big network on a single host.
 Provides simple functionality.
13
A Honeyd config file
create windows
set windows personality "Windows NT 4.0 Server SP5-SP6"
set windows default tcp action reset
set windows default udp action reset
add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl"
add windows tcp port 139 open
add windows tcp port 137 open
add windows udp port 137 open
add windows udp port 135 open
set windows uptime 3284460
bind 192.168.1.201 windows
14
How Honeyd Works?
15
Overview of honeyd
architecture
16
Routing
Personality
engine
Packet
dispatcher
ICMP TCP UDP
Services
Routing
Configuration
Personality
Network
Lookup
• Packet dispatcher
• Configuration database
• Protocol handlers
• Router
• Personality engine
HONEYNET
High interaction honeypots
Two or more honeypots on a network form a honeynet.
It is basically an architecture, an entire network of computers
designed to be attacked.
 The key to the honeynet architecture is “Honey wall”.
17
ARCHITECTURE OF
HONEYNET
18
Gen 1
19
Gen 2
20
Advantages of Honeypots
Collect small data sets of high value
Reduced false positive
Cost effective
Simplicity
Minimal resources
21
Disadvantages of Honeypots
Limited view
Risk
Finger Printing
22
CONCLUSION
 Effective tool for observing hacker movements as well as preparing
the system for future attacks.
Flexible tool with different applications to security
 Primary value in detection and information gathering.
23
REFERENCES
• R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,”
International Conference on Computer Communication and Networks CSI-COMNET-
2011, vol. 1, no. 1, pp. 4–27, 2011.
• Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html.
• http://www.tracking-hackers.com/papers/honeypots.html
• The Honeynet Project, “Know Your Enemy: Statistics,” available
online:http://honeynet.org/papers/stats
• http://www.honeynet.org
• http://project.honeypot.org
24
QUESTIONS…….
25
THANKYOU
26

More Related Content

Similar to honeypots-140921060716-phpapp01 (1).pdf

E0312834
E0312834E0312834
E0312834
iosrjournals
 
Honeypot
Honeypot Honeypot
Honeypot
Sushan Sharma
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
Education
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
KirtiGoyal25
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
DetSersi
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
Emil Tan
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G
 
Honeypot
HoneypotHoneypot
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
samrat saurabh
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
أحلام انصارى
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
IRJET Journal
 
Honey pots
Honey potsHoney pots
Honey pots
Alok Singh
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
icanhasfay
 
Honeypots
HoneypotsHoneypots
Honeypots
Gaurav Gupta
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Gregory Hanis
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 
Honeypot
HoneypotHoneypot
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
Rasool Irfan
 

Similar to honeypots-140921060716-phpapp01 (1).pdf (20)

E0312834
E0312834E0312834
E0312834
 
Honeypot
Honeypot Honeypot
Honeypot
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
 
Honeypots
HoneypotsHoneypots
Honeypots
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypot
HoneypotHoneypot
Honeypot
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 

More from Poooi2

eddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptxeddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptx
Poooi2
 
microgrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptxmicrogrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptx
Poooi2
 
schneider-electric-storage.pptx
schneider-electric-storage.pptxschneider-electric-storage.pptx
schneider-electric-storage.pptx
Poooi2
 
162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx
Poooi2
 
artificial intellegence.pptx
artificial intellegence.pptxartificial intellegence.pptx
artificial intellegence.pptx
Poooi2
 
Night-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptxNight-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptx
Poooi2
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
Poooi2
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
Poooi2
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
developementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptxdevelopementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptx
Poooi2
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
Poooi2
 
solartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptxsolartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptx
Poooi2
 
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptxa36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
Poooi2
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
Poooi2
 

More from Poooi2 (14)

eddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptxeddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptx
 
microgrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptxmicrogrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptx
 
schneider-electric-storage.pptx
schneider-electric-storage.pptxschneider-electric-storage.pptx
schneider-electric-storage.pptx
 
162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx
 
artificial intellegence.pptx
artificial intellegence.pptxartificial intellegence.pptx
artificial intellegence.pptx
 
Night-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptxNight-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptx
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
developementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptxdevelopementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptx
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
 
solartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptxsolartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptx
 
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptxa36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

honeypots-140921060716-phpapp01 (1).pdf

  • 2. CONTENTS  Introduction  What are Honey pots?  Classification  Honeyd  Honeynet  Advantages of honeypot  Disadvantages of honeypot  Conclusion 2
  • 3. INTRODUCTION The internet is growing very fast.  New attacks every day The more you know about your enemy, the better you can protect yourself. The main goal of honeypot is to gather as much information as possible. 3
  • 4. WHAT ARE HONEYPOTS? Honeypot is an exciting new technology with enormous potential for the security community. According to Lance Spitzner, founder of honeypot project: “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.” Used for monitoring, detecting and analyzing attacks 4
  • 5. CLASSIFICATION By level of interaction High Low By level of interaction By implementation Physical Virtual By purpose Production Research 5
  • 6. High interaction Simulates all aspects of the OS: real systems. Can be compromised completely, higher risk. More Information Eg:-Honeynet Architecture of high interaction honeypots 6
  • 7. Low interaction Simulates some aspects of the system Easy to deploy, minimal risk  Limited Information Eg:- Honeyd 7 Architecture of low interaction honeypots
  • 8. Physical Honeypots Real machines Own IP Addresses Often high-interactive 8
  • 9. Virtual Honeypots Simulated by other machines that: • Respond to the network traffic sent to the honeypots • May simulate a lot of (different) virtual honeypots at the same time 9
  • 10. Production Honeypots Help to mitigate risk in your organizations 3 categories: 1.Prevention • Keeping the bad guys out • Mechanism such as encryption prevent attackers from accessing critical information. 10
  • 11. Contd… 2. Detection • Detecting the attacker when he breaks in. • Challenges: False positive, False negative 3.Response • Can easily be pulled offline 11
  • 12. Research Honeypots Capture extensive information Used primarily by research, military, government organization. Used: • To capture automated threats, such autorooters • To capture unknown tools or techniques • To better understand attackers motives 12
  • 13. HONEYD  Open source software released under GNU General Public License. Able to simulate big network on a single host.  Provides simple functionality. 13
  • 14. A Honeyd config file create windows set windows personality "Windows NT 4.0 Server SP5-SP6" set windows default tcp action reset set windows default udp action reset add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl" add windows tcp port 139 open add windows tcp port 137 open add windows udp port 137 open add windows udp port 135 open set windows uptime 3284460 bind 192.168.1.201 windows 14
  • 16. Overview of honeyd architecture 16 Routing Personality engine Packet dispatcher ICMP TCP UDP Services Routing Configuration Personality Network Lookup • Packet dispatcher • Configuration database • Protocol handlers • Router • Personality engine
  • 17. HONEYNET High interaction honeypots Two or more honeypots on a network form a honeynet. It is basically an architecture, an entire network of computers designed to be attacked.  The key to the honeynet architecture is “Honey wall”. 17
  • 21. Advantages of Honeypots Collect small data sets of high value Reduced false positive Cost effective Simplicity Minimal resources 21
  • 22. Disadvantages of Honeypots Limited view Risk Finger Printing 22
  • 23. CONCLUSION  Effective tool for observing hacker movements as well as preparing the system for future attacks. Flexible tool with different applications to security  Primary value in detection and information gathering. 23
  • 24. REFERENCES • R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,” International Conference on Computer Communication and Networks CSI-COMNET- 2011, vol. 1, no. 1, pp. 4–27, 2011. • Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html. • http://www.tracking-hackers.com/papers/honeypots.html • The Honeynet Project, “Know Your Enemy: Statistics,” available online:http://honeynet.org/papers/stats • http://www.honeynet.org • http://project.honeypot.org 24