Top Banner
HONEYPOTS HONEYPOTS BY:- Manoj Kumawat R. No. 13075029
19

Honeypot Basics

Apr 15, 2017

Download

Technology

Manoj kumawat
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Honeypot Basics

HONEYPOTS

HONEYPOTS

BY:-Manoj KumawatR. No. 13075029

Page 2: Honeypot Basics

HONEYPOTS

• What is honeypot ?

 A honeypot is a computer security mechanism set to detect, deflect or counteract attempts at unauthorized use of information system.

It’s simply a TRAP to attacker.

Page 3: Honeypot Basics

HONEYPOTS

• How it works ?

A honeypot consists of data that appears to be a legitimate part of the site but is actually isolated and monitored, and that seems to contain information or a resource of value to attackers, which are then blocked. 

Page 4: Honeypot Basics

HONEYPOTS

Page 5: Honeypot Basics

HONEYPOTS

Architecture:

•As a bait•Just some regular system•More attractive

Page 6: Honeypot Basics

HONEYPOTS

Page 7: Honeypot Basics

HONEYPOTS

• HONEYPOT CLASSIFICATION:By Implementation

• Virtual• Physical

By purpose• Production• Research

By level of interaction• High• Low• Middle?

Page 8: Honeypot Basics

HONEYPOTS

• IMPLEMENTATION OF HONEYPOT:Physical

• Real machines• Own IP Addresses• Often high-interactive

Virtual• Simulated by other machines that:

– Respond to the traffic sent to the honeypots– May simulate a lot of virtual honeypots at the

same time

Page 9: Honeypot Basics

HONEYPOTS

• PROPOSE OF HONEYPOT:Research

Complex to deploy and maintain.Captures extensive information.Run by a volunteer(non-profit).Used to research the threats organization face.

ProductionEasy to useCapture only limited informationUsed by companies or corporationsMitigates risks in organization

Page 10: Honeypot Basics

HONEYPOTS

• INTERACTION LEVEL:• Low Interaction

• High Interaction

Page 11: Honeypot Basics

HONEYPOTS• LOW INTERACTION VS. HIGH INTERACTION:

Page 12: Honeypot Basics

HONEYPOTS

• Placement of honeypot

In front of the firewall (Internet)DMZ (De-Militarized Zone)Behind the firewall (intranet)

Page 13: Honeypot Basics

HONEYPOTS

Page 14: Honeypot Basics

HONEYPOTS

Honeypot Values:

•Prevention•Detection•Response

Page 15: Honeypot Basics

HONEYPOTS

Prevention:

•Keeping the burglar out of your house.•Honeypots, in general are not effective prevention mechanisms.

Page 16: Honeypot Basics

HONEYPOTS

Detection:

•Detecting the burglar when he breaks in.

Page 17: Honeypot Basics

HONEYPOTS

Response:

•Honeypots can be used to help respond to an incident.

Page 18: Honeypot Basics

HONEYPOTS

Page 19: Honeypot Basics