SlideShare a Scribd company logo
1 of 22
HONEYPOT
PRESENTED BY -
TUSHAR KANTI MANDAL
B.TECH(CSE) 6TH SEM
DATE – 6th MARCH, 2017
CONTENTS
HISTORY OF HONEYPOT ?
THE PROBLEM ?
INTRODUCTION OF HONEYPOT ?
OBJECTIVES OR PURPOSE OF HONEYPOT ?
FUNCTIONS OF HONEYPOT ?
WHY WE USE HONEYPOT ?
WORKING OF HONEYPOT ?
CLASSIFICATION OF HONEYPOT ?
IMPLEMENTATION OF HONEYPOT ?
ADVANTAGES AND DISADVANTAGES OF HONEYPOT ?
LEGAL ISSUES ?
CONCLUSION ?
HISTORY
The idea of honeypots began with two publications, “The
cuckoos egg” & “ An evening with Bredford ”.
“The cuckoos egg “ was about catching a computer hacker
that was searching for secrets in authors corporation.
“An evening with Berdferd” is about a hackers moves
through traps that the author used to catch him.
THE PROBLEM
The Internet security is hard
New attacks every day
Our Websites are static targets
What should we do?
The more you know about your enemy, the
better you can protect yourself
Fake target?
INTRODUCTION OF HONEYPOT
A honeypot can be almost any type of server or application that
is meant as a tool to catch or trap an attacker.
A HoneyPot is an intrusion (unwanted) detection technique
used to study hacker movement and interested to help better
system defences against later attacks usually made up of a
virtual machine that sits on a network or single client.
OBJECTIVES OF HONEYPOT
The virtual system should look as real as possible, it
should attract unwanted intruders to connect to the
virtual machine for study.
The virtual system should be watched to see that it
isn’t used for a massive attack on other systems.
The virtual system should look and feel just like a
regular system, meaning it must include files,
directories and information that will catch the eye of
the hacker
FUNCTIONS OF HONEYPOT
To divert the attention of the attacker from the real network, in
a way that the main information resources are not compromised .
To build attacker profiles in order to identify their preferred
attack methods, like criminal profile .
To capture new viruses or worms for future study .
A group of Honeypots becomes a Honeynet .
WHY WE USE HONEYPOT ?
 Its Different security from Firewall.
 Firewall only works on System Security.
 This security works on network layer .
 Helps to learn systems weakness .
 Hacker can be caught and stopped .
PLACEMENT OF HONEYPOT
 In front of the firewall (Internet)
 DMZ (De-Militarized Zone)
 Behind the firewall (intranet)
WORKING OF HONEYPOT
 Honeypots are, in their most basic form, fake information
severs strategically-positioned in a test network, which are
fed with false information made unrecognizable as files of
classified nature.
 In turn, these servers are initially configured in a way that
is difficult, but not impossible, to break into them by an
attacker; exposing them deliberately and making them
highly attractive for a hacker in search of a target.
 Finally, the server is loaded with monitoring and tracking
tools so every step and trace of activity left by a hacker
can be recorded in a log, indicating those traces of activity
in a detailed way.
HOW HONEYPOT WORKS :
CLASSIFICATION OF HONEYPOT
 (a) PRODUCTION HONEYPOT
 Used to protect organizations in real production operating
environments.
 Production honeypots are used to protect your network,
they directly help secure your organization.
 Specifically the three layers of prevention, detection, and
response. Honeypots can apply to all three layers. For
prevention, honeypots can be used to slow down or stop
automated attacks.
CLASSIFICATON OF HONEYPOT
 RESEARCH HONEYPOT
They represent educational resources of demonstrative and
research nature whose objective is centered towards studying all
sorts of attack patterns and threats.
 A great deal of current attention is focused on Research
Honeypots, which are used to gather information about the
intruders’ actions.
IMPLEMENTATION OF HONEYPOT
 Two types
 Physical
 Real machines
 Own IPAddresses
 Often high-interactive
 Virtual
 Simulated by other machines that:
 Respond to the traffic sent to the honeypots
 May simulate a lot of (different) virtual honeypots
at the same time
PHYSICAL IMPLEMENTATION
OF HONEYPOT
VIRTUAL IMPLEMENTATION
OF HONEYPOT
ADVANTAGES OF HONEYPOT
 Honeypots are focused (small data sets) .
 Honeypots help to catch unknown attacks .
 Honeypots can capture encrypted activity .
 Honeypots work with IPv6 .
 Honeypots are very flexible .
 Honeypots require minimal resources .
DISADVANTAGES OF HONEYPOT
 Limited View: honeypots can only track and capture activity
that directly interacts with them.
 Specifically, honeypots have the risk of being taken over by
the bad guy and being used to harm other systems. This risk
various for different honeypots.
 Easily detectable by a skilled attacker .
LEGAL ISSUES
 Privacy
 - No single statue concerning privacy
 - Electronic Communication Privacy Act
 Entrapment
 - Used only to defendant to avoid conviction
 - Applies only to law enforcement?
 Liability
 - If a Honeynet system is used to attack or damage
other non-honeynet system?
CONCLUSION
 The purpose of this topic was to define the what honeypots are
and their value to the security community. We identified two
different types of honeypots, low-interaction and high-
interaction honeypots.
 Honeypots are not a solution, they are a flexible tool with
different applications to security.
 Primary value in detection and information gathering.
 Just the beginning for honeypots.
“ The more you know about your enemy,
the better you can protect yourself”
Tushar mandal.honeypot
Tushar mandal.honeypot

More Related Content

What's hot

What's hot (20)

Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot
Honeypot Honeypot
Honeypot
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Honeypots
HoneypotsHoneypots
Honeypots
 
All About Snort
All About SnortAll About Snort
All About Snort
 
Honeypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTHoneypot based intrusion detection system PPT
Honeypot based intrusion detection system PPT
 

Viewers also liked

Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief OverviewSILPI ROSAN
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar reportInder NeGi
 
Honeypot - NOAH15 London
Honeypot - NOAH15 LondonHoneypot - NOAH15 London
Honeypot - NOAH15 LondonNOAH Advisors
 
ZomBee Watch Tutorial
ZomBee Watch TutorialZomBee Watch Tutorial
ZomBee Watch Tutorialasimsfsu
 
Development, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot TechnologyDevelopment, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot TechnologyAntiy Labs
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Setting local domain di virtual host
Setting local domain di virtual hostSetting local domain di virtual host
Setting local domain di virtual hostFgroupIndonesia
 
Virtual host and certificate authority
Virtual host and certificate authorityVirtual host and certificate authority
Virtual host and certificate authorityAhmad Sayuti
 
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik osModul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik osEen Pahlefi
 

Viewers also liked (17)

Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honey pot day 1
Honey pot day 1Honey pot day 1
Honey pot day 1
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypot - NOAH15 London
Honeypot - NOAH15 LondonHoneypot - NOAH15 London
Honeypot - NOAH15 London
 
ZomBee Watch Tutorial
ZomBee Watch TutorialZomBee Watch Tutorial
ZomBee Watch Tutorial
 
Development, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot TechnologyDevelopment, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot Technology
 
Client Side Honeypots
Client Side HoneypotsClient Side Honeypots
Client Side Honeypots
 
Honey pots
Honey potsHoney pots
Honey pots
 
Ppt
PptPpt
Ppt
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Networking recap
Networking recapNetworking recap
Networking recap
 
Setting local domain di virtual host
Setting local domain di virtual hostSetting local domain di virtual host
Setting local domain di virtual host
 
Virtual host and certificate authority
Virtual host and certificate authorityVirtual host and certificate authority
Virtual host and certificate authority
 
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik osModul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
 

Similar to Tushar mandal.honeypot

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applicationsijtsrd
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An OverviewIRJET Journal
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513IJRAT
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Yuval Sinay, CISSP, C|CISO
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)Emil Tan
 
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot NetworkA Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Networkijtsrd
 

Similar to Tushar mandal.honeypot (17)

Honeypots
HoneypotsHoneypots
Honeypots
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 
HoneyPots.pptx
HoneyPots.pptxHoneyPots.pptx
HoneyPots.pptx
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honey pots
Honey potsHoney pots
Honey pots
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
Ananth3
Ananth3Ananth3
Ananth3
 
Honeypot
HoneypotHoneypot
Honeypot
 
Integrated honeypot
Integrated honeypotIntegrated honeypot
Integrated honeypot
 
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot NetworkA Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Tushar mandal.honeypot

  • 1. HONEYPOT PRESENTED BY - TUSHAR KANTI MANDAL B.TECH(CSE) 6TH SEM DATE – 6th MARCH, 2017
  • 2. CONTENTS HISTORY OF HONEYPOT ? THE PROBLEM ? INTRODUCTION OF HONEYPOT ? OBJECTIVES OR PURPOSE OF HONEYPOT ? FUNCTIONS OF HONEYPOT ? WHY WE USE HONEYPOT ? WORKING OF HONEYPOT ? CLASSIFICATION OF HONEYPOT ? IMPLEMENTATION OF HONEYPOT ? ADVANTAGES AND DISADVANTAGES OF HONEYPOT ? LEGAL ISSUES ? CONCLUSION ?
  • 3. HISTORY The idea of honeypots began with two publications, “The cuckoos egg” & “ An evening with Bredford ”. “The cuckoos egg “ was about catching a computer hacker that was searching for secrets in authors corporation. “An evening with Berdferd” is about a hackers moves through traps that the author used to catch him.
  • 4. THE PROBLEM The Internet security is hard New attacks every day Our Websites are static targets What should we do? The more you know about your enemy, the better you can protect yourself Fake target?
  • 5. INTRODUCTION OF HONEYPOT A honeypot can be almost any type of server or application that is meant as a tool to catch or trap an attacker. A HoneyPot is an intrusion (unwanted) detection technique used to study hacker movement and interested to help better system defences against later attacks usually made up of a virtual machine that sits on a network or single client.
  • 6. OBJECTIVES OF HONEYPOT The virtual system should look as real as possible, it should attract unwanted intruders to connect to the virtual machine for study. The virtual system should be watched to see that it isn’t used for a massive attack on other systems. The virtual system should look and feel just like a regular system, meaning it must include files, directories and information that will catch the eye of the hacker
  • 7. FUNCTIONS OF HONEYPOT To divert the attention of the attacker from the real network, in a way that the main information resources are not compromised . To build attacker profiles in order to identify their preferred attack methods, like criminal profile . To capture new viruses or worms for future study . A group of Honeypots becomes a Honeynet .
  • 8. WHY WE USE HONEYPOT ?  Its Different security from Firewall.  Firewall only works on System Security.  This security works on network layer .  Helps to learn systems weakness .  Hacker can be caught and stopped .
  • 9. PLACEMENT OF HONEYPOT  In front of the firewall (Internet)  DMZ (De-Militarized Zone)  Behind the firewall (intranet)
  • 10. WORKING OF HONEYPOT  Honeypots are, in their most basic form, fake information severs strategically-positioned in a test network, which are fed with false information made unrecognizable as files of classified nature.  In turn, these servers are initially configured in a way that is difficult, but not impossible, to break into them by an attacker; exposing them deliberately and making them highly attractive for a hacker in search of a target.  Finally, the server is loaded with monitoring and tracking tools so every step and trace of activity left by a hacker can be recorded in a log, indicating those traces of activity in a detailed way.
  • 12. CLASSIFICATION OF HONEYPOT  (a) PRODUCTION HONEYPOT  Used to protect organizations in real production operating environments.  Production honeypots are used to protect your network, they directly help secure your organization.  Specifically the three layers of prevention, detection, and response. Honeypots can apply to all three layers. For prevention, honeypots can be used to slow down or stop automated attacks.
  • 13. CLASSIFICATON OF HONEYPOT  RESEARCH HONEYPOT They represent educational resources of demonstrative and research nature whose objective is centered towards studying all sorts of attack patterns and threats.  A great deal of current attention is focused on Research Honeypots, which are used to gather information about the intruders’ actions.
  • 14. IMPLEMENTATION OF HONEYPOT  Two types  Physical  Real machines  Own IPAddresses  Often high-interactive  Virtual  Simulated by other machines that:  Respond to the traffic sent to the honeypots  May simulate a lot of (different) virtual honeypots at the same time
  • 17. ADVANTAGES OF HONEYPOT  Honeypots are focused (small data sets) .  Honeypots help to catch unknown attacks .  Honeypots can capture encrypted activity .  Honeypots work with IPv6 .  Honeypots are very flexible .  Honeypots require minimal resources .
  • 18. DISADVANTAGES OF HONEYPOT  Limited View: honeypots can only track and capture activity that directly interacts with them.  Specifically, honeypots have the risk of being taken over by the bad guy and being used to harm other systems. This risk various for different honeypots.  Easily detectable by a skilled attacker .
  • 19. LEGAL ISSUES  Privacy  - No single statue concerning privacy  - Electronic Communication Privacy Act  Entrapment  - Used only to defendant to avoid conviction  - Applies only to law enforcement?  Liability  - If a Honeynet system is used to attack or damage other non-honeynet system?
  • 20. CONCLUSION  The purpose of this topic was to define the what honeypots are and their value to the security community. We identified two different types of honeypots, low-interaction and high- interaction honeypots.  Honeypots are not a solution, they are a flexible tool with different applications to security.  Primary value in detection and information gathering.  Just the beginning for honeypots. “ The more you know about your enemy, the better you can protect yourself”