SlideShare a Scribd company logo
HONEYPO
TS
1
CONTENTS
2
 Introduction
 What are Honey pots?
 Classification
 Honeyd
 Honeynet
 Advantages of honeypot
 Disadvantages of honeypot
 Conclusion
INTRODUCTION
3
The internet is growing very fast.
 New attacks every day
The more you know about your enemy, the better you can protect
yourself.
The main goal of honeypot is to gather as much information as
possible.
WHAT ARE HONEYPOTS?
4
Honeypot is an exciting new technology with enormous
potential for the security community.
According to Lance Spitzner, founder of honeypot project: “A
honeypot is an information system resource whose value lies
in unauthorized or illicit use of that resource.”
Used for monitoring, detecting and analyzing attacks
CLASSIFICATION
By level of
interaction
High Low
By
implementation
Physical Virtual
By
purpose
Production Research
5
High interaction
Simulates all aspects of
the OS: real systems.
Can be compromised
completely, higher risk.
More Information
Eg:-Honeynet
Architecture of high interaction honeypots
6
Low interaction
Simulates some aspects
of the system
Easy to deploy, minimal
risk
 Limited Information
Eg:- Honeyd
Architecture of low interaction honeypots
7
Physical Honeypots
8
Real machines
Own IP Addresses
Often high-interactive
Virtual Honeypots
9
Simulated by other machines that:
• Respond to the network traffic sent to the honeypots
• May simulate a lot of (different) virtual honeypots at the same
time
Production Honeypots
10
Help to mitigate risk in your organizations
3 categories:
1.Prevention
• Keeping the bad guys out
• Mechanism such as encryption prevent attackers from
accessing critical information.
Contd…
11
2. Detection
• Detecting the attacker when he breaks in.
• Challenges: False positive, False negative
3.Response
• Can easily be pulled offline
Research Honeypots
12
Capture extensive information
Used primarily by research, military, government organization.
Used:
• To capture automated threats, such autorooters
• To capture unknown tools or techniques
• To better understand attackers motives
HONEYD
13
Open source software released under GNU General Public
License.
Able to simulate big network on a single host.
 Provides simple functionality.
A Honeyd config file
14
create windows
set windows personality "Windows NT 4.0 Server SP5-SP6"
set windows default tcp action reset
set windows default udp action reset
add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl"
add windows tcp port 139 open
add windows tcp port 137 open
add windows udp port 137 open
add windows udp port 135 open
set windows uptime 3284460
bind 192.168.1.201 windows
How Honeyd Works?
15
Overview of honeyd
architecture
Routing
Personality
engine
Packet
dispatcher
ICMP TCP UDP
Services
Routing
Configuration
Personality
Network
Lookup
• Packet dispatcher
• Configuration database
• Protocol handlers
• Router
• Personality engine
16
HONEYNET
17
High interaction honeypots
Two or more honeypots on a network form a honeynet.
It is basically an architecture, an entire network of computers
designed to be attacked.
 The key to the honeynet architecture is “Honey wall”.
ARCHITECTURE OF
HONEYNET
18
Gen 1
19
Gen2
20
Advantages of Honeypots
21
Collect small data sets of high value
Reduced false positive
Cost effective
Simplicity
Minimal resources
Disadvantages of Honeypots
22
Limited view
Risk
Finger Printing
CONCLUSION
23
Effective tool for observing hacker movements as well as preparing
the system for future attacks.
Flexible tool with different applications to security
 Primary value in detection and information gathering.
REFERENCES
24
• R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,”
International Conference on Computer Communication and Networks CSI-COMNET-
2011, vol. 1, no. 1, pp. 4–27, 2011.
• Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html.
• http://www.tracking-hackers.com/papers/honeypots.html
• The Honeynet Project, “Know Your Enemy: Statistics,” available
online:http://honeynet.org/papers/stats
• http://www.honeynet.org
• http://project.honeypot.org
QUESTIONS…….
25
THANKYOU
26

More Related Content

Similar to honeypotss.pptx

honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
DetSersi
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN
 
E0312834
E0312834E0312834
E0312834
iosrjournals
 
Honeypot
Honeypot Honeypot
Honeypot
Sushan Sharma
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
Emil Tan
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
أحلام انصارى
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
samrat saurabh
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
icanhasfay
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G
 
Honeypot
HoneypotHoneypot
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
IRJET Journal
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
Rasool Irfan
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
Honey pots
Honey potsHoney pots
Honey pots
Alok Singh
 
Honeypots
HoneypotsHoneypots
Honeypots
Gaurav Gupta
 
Honeypot
HoneypotHoneypot
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Honeypots
HoneypotsHoneypots
Honeypots
Jyoti Nagargoje
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
milad saber
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 

Similar to honeypotss.pptx (20)

honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
E0312834
E0312834E0312834
E0312834
 
Honeypot
Honeypot Honeypot
Honeypot
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 

More from Poooi2

eddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptxeddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptx
Poooi2
 
microgrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptxmicrogrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptx
Poooi2
 
schneider-electric-storage.pptx
schneider-electric-storage.pptxschneider-electric-storage.pptx
schneider-electric-storage.pptx
Poooi2
 
162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx
Poooi2
 
artificial intellegence.pptx
artificial intellegence.pptxartificial intellegence.pptx
artificial intellegence.pptx
Poooi2
 
Night-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptxNight-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptx
Poooi2
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
Poooi2
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
Poooi2
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
developementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptxdevelopementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptx
Poooi2
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
Poooi2
 
solartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptxsolartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptx
Poooi2
 
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptxa36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
Poooi2
 
honeypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptxhoneypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptx
Poooi2
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
Poooi2
 

More from Poooi2 (15)

eddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptxeddycurrentbreaking-131015080857-phpapp01.pptx
eddycurrentbreaking-131015080857-phpapp01.pptx
 
microgrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptxmicrogrid-presentation-090825235628-phpapp02.pptx
microgrid-presentation-090825235628-phpapp02.pptx
 
schneider-electric-storage.pptx
schneider-electric-storage.pptxschneider-electric-storage.pptx
schneider-electric-storage.pptx
 
162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx162579-builder-template-16x9.pptx
162579-builder-template-16x9.pptx
 
artificial intellegence.pptx
artificial intellegence.pptxartificial intellegence.pptx
artificial intellegence.pptx
 
Night-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptxNight-Vision-Technology-ppt (1).pptx
Night-Vision-Technology-ppt (1).pptx
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
 
technicalseminar-190411055638.pdf
technicalseminar-190411055638.pdftechnicalseminar-190411055638.pdf
technicalseminar-190411055638.pdf
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
developementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptxdevelopementofmobileapplication-160412025313 (1).pptx
developementofmobileapplication-160412025313 (1).pptx
 
temperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptxtemperresistante-190503164148 (1) (1).pptx
temperresistante-190503164148 (1) (1).pptx
 
solartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptxsolartree-140521004426-phpapp01 (1).pptx
solartree-140521004426-phpapp01 (1).pptx
 
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptxa36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
a36ba6f5-0090-444b-9a2c-19b38b65d5f5-150215005736-conversion-gate02.pptx
 
honeypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptxhoneypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptx
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

honeypotss.pptx

  • 2. CONTENTS 2  Introduction  What are Honey pots?  Classification  Honeyd  Honeynet  Advantages of honeypot  Disadvantages of honeypot  Conclusion
  • 3. INTRODUCTION 3 The internet is growing very fast.  New attacks every day The more you know about your enemy, the better you can protect yourself. The main goal of honeypot is to gather as much information as possible.
  • 4. WHAT ARE HONEYPOTS? 4 Honeypot is an exciting new technology with enormous potential for the security community. According to Lance Spitzner, founder of honeypot project: “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.” Used for monitoring, detecting and analyzing attacks
  • 5. CLASSIFICATION By level of interaction High Low By implementation Physical Virtual By purpose Production Research 5
  • 6. High interaction Simulates all aspects of the OS: real systems. Can be compromised completely, higher risk. More Information Eg:-Honeynet Architecture of high interaction honeypots 6
  • 7. Low interaction Simulates some aspects of the system Easy to deploy, minimal risk  Limited Information Eg:- Honeyd Architecture of low interaction honeypots 7
  • 8. Physical Honeypots 8 Real machines Own IP Addresses Often high-interactive
  • 9. Virtual Honeypots 9 Simulated by other machines that: • Respond to the network traffic sent to the honeypots • May simulate a lot of (different) virtual honeypots at the same time
  • 10. Production Honeypots 10 Help to mitigate risk in your organizations 3 categories: 1.Prevention • Keeping the bad guys out • Mechanism such as encryption prevent attackers from accessing critical information.
  • 11. Contd… 11 2. Detection • Detecting the attacker when he breaks in. • Challenges: False positive, False negative 3.Response • Can easily be pulled offline
  • 12. Research Honeypots 12 Capture extensive information Used primarily by research, military, government organization. Used: • To capture automated threats, such autorooters • To capture unknown tools or techniques • To better understand attackers motives
  • 13. HONEYD 13 Open source software released under GNU General Public License. Able to simulate big network on a single host.  Provides simple functionality.
  • 14. A Honeyd config file 14 create windows set windows personality "Windows NT 4.0 Server SP5-SP6" set windows default tcp action reset set windows default udp action reset add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl" add windows tcp port 139 open add windows tcp port 137 open add windows udp port 137 open add windows udp port 135 open set windows uptime 3284460 bind 192.168.1.201 windows
  • 16. Overview of honeyd architecture Routing Personality engine Packet dispatcher ICMP TCP UDP Services Routing Configuration Personality Network Lookup • Packet dispatcher • Configuration database • Protocol handlers • Router • Personality engine 16
  • 17. HONEYNET 17 High interaction honeypots Two or more honeypots on a network form a honeynet. It is basically an architecture, an entire network of computers designed to be attacked.  The key to the honeynet architecture is “Honey wall”.
  • 21. Advantages of Honeypots 21 Collect small data sets of high value Reduced false positive Cost effective Simplicity Minimal resources
  • 22. Disadvantages of Honeypots 22 Limited view Risk Finger Printing
  • 23. CONCLUSION 23 Effective tool for observing hacker movements as well as preparing the system for future attacks. Flexible tool with different applications to security  Primary value in detection and information gathering.
  • 24. REFERENCES 24 • R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,” International Conference on Computer Communication and Networks CSI-COMNET- 2011, vol. 1, no. 1, pp. 4–27, 2011. • Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html. • http://www.tracking-hackers.com/papers/honeypots.html • The Honeynet Project, “Know Your Enemy: Statistics,” available online:http://honeynet.org/papers/stats • http://www.honeynet.org • http://project.honeypot.org