Honeypots

S
HONEYPOTS 
PRESENTED BY, 
SARANYA.S 
S7 CSE 
1
CONTENTS 
 Introduction 
 What are Honey pots? 
 Classification 
 Honeyd 
 Honeynet 
 Advantages of honeypot 
 Disadvantages of honeypot 
 Conclusion 
2
INTRODUCTION 
The internet is growing very fast. 
 New attacks every day 
The more you know about your enemy, the better you can protect 
yourself. 
The main goal of honeypot is to gather as much information as 
possible. 
3
WHAT ARE HONEYPOTS? 
Honeypot is an exciting new technology with enormous 
potential for the security community. 
According to Lance Spitzner, founder of honeypot project: “A 
honeypot is an information system resource whose value lies 
in unauthorized or illicit use of that resource.” 
Used for monitoring, detecting and analyzing attacks 
4
CLASSIFICATION 
By level of 
interaction 
High Low 
By level of 
interaction 
By 
implementation 
Physical Virtual 
By 
purpose 
Production Research 
5
High interaction 
Simulates all aspects of 
the OS: real systems. 
Can be compromised 
completely, higher risk. 
More Information 
Eg:-Honeynet 
Architecture of high interaction honeypots 
6
Low interaction 
Simulates some aspects 
of the system 
Easy to deploy, minimal 
risk 
 Limited Information 
Eg:- Honeyd 
7 
Architecture of low interaction honeypots
Physical Honeypots 
Real machines 
Own IP Addresses 
Often high-interactive 
8
Virtual Honeypots 
Simulated by other machines that: 
• Respond to the network traffic sent to the honeypots 
• May simulate a lot of (different) virtual honeypots at the same 
time 
9
Production Honeypots 
Help to mitigate risk in your organizations 
3 categories: 
1.Prevention 
• Keeping the bad guys out 
• Mechanism such as encryption prevent attackers from 
accessing critical information. 
10
Contd… 
2. Detection 
• Detecting the attacker when he breaks in. 
• Challenges: False positive, False negative 
3.Response 
• Can easily be pulled offline 
11
Research Honeypots 
Capture extensive information 
Used primarily by research, military, government organization. 
Used: 
• To capture automated threats, such autorooters 
• To capture unknown tools or techniques 
• To better understand attackers motives 
12
HONEYD 
 Open source software released under GNU General Public 
License. 
Able to simulate big network on a single host. 
 Provides simple functionality. 
13
A Honeyd config file 
create windows 
set windows personality "Windows NT 4.0 Server SP5-SP6" 
set windows default tcp action reset 
set windows default udp action reset 
add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl" 
add windows tcp port 139 open 
add windows tcp port 137 open 
add windows udp port 137 open 
add windows udp port 135 open 
set windows uptime 3284460 
bind 192.168.1.201 windows 
14
How HoneydWorks? 
15
Overview of honeyd 
architecture 
16 
Routing 
Personality 
engine 
Packet 
dispatcher 
ICMP TCP UDP 
Services 
Routing 
Configuration 
Personality 
Network 
• Packet dispatcher Lookup 
• Configuration database 
• Protocol handlers 
• Router 
• Personality engine
HONEYNET 
High interaction honeypots 
Two or more honeypots on a network form a honeynet. 
It is basically an architecture, an entire network of computers 
designed to be attacked. 
 The key to the honeynet architecture is “Honey wall”. 
17
ARCHITECTURE OF 
HONEYNET 
18
Gen 1 
19
Gen 2 
20
Advantages of Honeypots 
Collect small data sets of high value 
Reduced false positive 
Cost effective 
Simplicity 
Minimal resources 
21
Disadvantages of Honeypots 
Limited view 
Risk 
Finger Printing 
22
CONCLUSION 
 Effective tool for observing hacker movements as well as preparing 
the system for future attacks. 
Flexible tool with different applications to security 
 Primary value in detection and information gathering. 
23
REFERENCES 
• R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,” 
International Conference on Computer Communication and Networks CSI-COMNET- 
2011, vol. 1, no. 1, pp. 4–27, 2011. 
• Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html. 
• http://www.tracking-hackers.com/papers/honeypots.html 
• The Honeynet Project, “Know Your Enemy: Statistics,” available 
online:http://honeynet.org/papers/stats 
• http://www.honeynet.org 
• http://project.honeypot.org 
24
QUESTIONS……. 
25
THANKYOU 
26
1 de 26

Recomendados

Honeypot ppt1 por
Honeypot ppt1Honeypot ppt1
Honeypot ppt1samrat saurabh
9.3K visualizações19 slides
Honeypots por
HoneypotsHoneypots
HoneypotsGaurav Gupta
2K visualizações22 slides
Honeypot por
HoneypotHoneypot
HoneypotShashwat Shriparv
2.9K visualizações24 slides
Intrusion detection system ppt por
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
84.7K visualizações18 slides
Honeypots por
HoneypotsHoneypots
HoneypotsJayant Gandhi
40.3K visualizações22 slides
Honeypot seminar report por
Honeypot seminar reportHoneypot seminar report
Honeypot seminar reportInder NeGi
20K visualizações28 slides

Mais conteúdo relacionado

Mais procurados

Honeypots por
HoneypotsHoneypots
HoneypotsPresentaionslive.blogspot.com
1.1K visualizações16 slides
Honey pots por
Honey potsHoney pots
Honey potsDivya korrapati
945 visualizações21 slides
Honeypots por
HoneypotsHoneypots
HoneypotsSARANYA S
1.6K visualizações26 slides
Honeypot Basics por
Honeypot BasicsHoneypot Basics
Honeypot BasicsManoj kumawat
2K visualizações19 slides
Wireless Sensor Networks ppt por
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks pptDevdutta Chakrabarti
89.3K visualizações22 slides
Manet por
ManetManet
ManetPushkar Dutt
11.8K visualizações12 slides

Mais procurados(20)

Honey pots por Divya korrapati
Honey potsHoney pots
Honey pots
Divya korrapati945 visualizações
Honeypots por SARANYA S
HoneypotsHoneypots
Honeypots
SARANYA S1.6K visualizações
Honeypot Basics por Manoj kumawat
Honeypot BasicsHoneypot Basics
Honeypot Basics
Manoj kumawat2K visualizações
Wireless Sensor Networks ppt por Devdutta Chakrabarti
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti89.3K visualizações
Manet por Pushkar Dutt
ManetManet
Manet
Pushkar Dutt11.8K visualizações
Honeypots (Ravindra Singh Rathore) por Ravindra Singh Rathore
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
Ravindra Singh Rathore2.9K visualizações
Basics of Denial of Service Attacks por Hansa Nidushan
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan17.3K visualizações
HONEYPOTS: Definition, working, advantages, disadvantages por amit kumar
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar5.2K visualizações
Seminar Report on Honeypot por Amit Poonia
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
Amit Poonia2.3K visualizações
Zigbee Presentation por Maathu Michael
Zigbee PresentationZigbee Presentation
Zigbee Presentation
Maathu Michael95.5K visualizações
honey pots introduction and its types por Vishal Tandel
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
Vishal Tandel4.2K visualizações
security in wireless sensor networks por Vishnu Kudumula
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula10.2K visualizações
Honeypot por Sushan Sharma
Honeypot Honeypot
Honeypot
Sushan Sharma8.9K visualizações
Honeypot por Sajan Sahu
HoneypotHoneypot
Honeypot
Sajan Sahu1.2K visualizações
Honeypot honeynet por Sina Manavi
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
Sina Manavi11.9K visualizações
Honeypot Presentation - Using Honeyd por icanhasfay
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
icanhasfay3.2K visualizações
Wireless LAN security por Rajan Kumar
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar28.9K visualizações
IOT Security por Sylvain Martinez
IOT SecurityIOT Security
IOT Security
Sylvain Martinez893 visualizações

Destaque

Honeypots por
HoneypotsHoneypots
HoneypotsJ. Scott Christianson
12.4K visualizações15 slides
All about Honeypots & Honeynets por
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & HoneynetsMehdi Poustchi Amin
14K visualizações40 slides
Honeypots por
HoneypotsHoneypots
HoneypotsPresentaionslive.blogspot.com
3.2K visualizações16 slides
Honeypot por
HoneypotHoneypot
HoneypotAkhil Sahajan
4.6K visualizações44 slides
Honeypot ss por
Honeypot ssHoneypot ss
Honeypot ssKajal Mittal
2.6K visualizações34 slides
Honeypot por
HoneypotHoneypot
HoneypotChandrak Trivedi
696 visualizações15 slides

Destaque(17)

All about Honeypots & Honeynets por Mehdi Poustchi Amin
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
Mehdi Poustchi Amin14K visualizações
Honeypot por Akhil Sahajan
HoneypotHoneypot
Honeypot
Akhil Sahajan4.6K visualizações
Honeypot ss por Kajal Mittal
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal2.6K visualizações
Honeypot por Chandrak Trivedi
HoneypotHoneypot
Honeypot
Chandrak Trivedi696 visualizações
Honeypot-A Brief Overview por SILPI ROSAN
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN5.6K visualizações
Honeypots.ppt1800363876 por Momita Sharma
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
Momita Sharma738 visualizações
Lecture 7 por Education
Lecture 7Lecture 7
Lecture 7
Education343 visualizações
Honey po tppt por Arya AR
Honey po tpptHoney po tppt
Honey po tppt
Arya AR1.5K visualizações
Honeypot Social Profiling por Bryan Conde
Honeypot Social ProfilingHoneypot Social Profiling
Honeypot Social Profiling
Bryan Conde213 visualizações
Honeypots - Tracking the Blackhat Community por amiable_indian
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
amiable_indian1.8K visualizações
Virtual honeypot por Elham Hormozi
Virtual honeypotVirtual honeypot
Virtual honeypot
Elham Hormozi3.1K visualizações
Hybrid honeypots for network security por chella mani
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network security
chella mani2.2K visualizações
Honey pots por Alok Singh
Honey potsHoney pots
Honey pots
Alok Singh2.9K visualizações
Ruby On Rails por iradarji
Ruby On RailsRuby On Rails
Ruby On Rails
iradarji1.2K visualizações

Similar a Honeypots

honeypotss.pptx por
honeypotss.pptxhoneypotss.pptx
honeypotss.pptxPoooi2
11 visualizações26 slides
honeypots-1409210990716-phpapp01 (2).pptx por
honeypots-1409210990716-phpapp01 (2).pptxhoneypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptxPoooi2
3 visualizações26 slides
honeypots-140921060716-phpapp01 (1).pdf por
honeypots-140921060716-phpapp01 (1).pdfhoneypots-140921060716-phpapp01 (1).pdf
honeypots-140921060716-phpapp01 (1).pdfPoooi2
6 visualizações26 slides
honeypots-140921060716-phpapp01 (1).pptx por
honeypots-140921060716-phpapp01 (1).pptxhoneypots-140921060716-phpapp01 (1).pptx
honeypots-140921060716-phpapp01 (1).pptxPoooi2
3 visualizações26 slides
Honeypot2 por
Honeypot2Honeypot2
Honeypot2KirtiGoyal25
152 visualizações23 slides
Honeypots and honeynets por
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynetsRasool Irfan
2.2K visualizações16 slides

Similar a Honeypots(20)

honeypotss.pptx por Poooi2
honeypotss.pptxhoneypotss.pptx
honeypotss.pptx
Poooi211 visualizações
honeypots-1409210990716-phpapp01 (2).pptx por Poooi2
honeypots-1409210990716-phpapp01 (2).pptxhoneypots-1409210990716-phpapp01 (2).pptx
honeypots-1409210990716-phpapp01 (2).pptx
Poooi23 visualizações
honeypots-140921060716-phpapp01 (1).pdf por Poooi2
honeypots-140921060716-phpapp01 (1).pdfhoneypots-140921060716-phpapp01 (1).pdf
honeypots-140921060716-phpapp01 (1).pdf
Poooi26 visualizações
honeypots-140921060716-phpapp01 (1).pptx por Poooi2
honeypots-140921060716-phpapp01 (1).pptxhoneypots-140921060716-phpapp01 (1).pptx
honeypots-140921060716-phpapp01 (1).pptx
Poooi23 visualizações
Honeypot2 por KirtiGoyal25
Honeypot2Honeypot2
Honeypot2
KirtiGoyal25152 visualizações
Honeypots and honeynets por Rasool Irfan
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
Rasool Irfan2.2K visualizações
honeypots.ppt por DetSersi
honeypots.ppthoneypots.ppt
honeypots.ppt
DetSersi12 visualizações
Honeypot- An Overview por IRJET Journal
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
IRJET Journal147 visualizações
Tushar mandal.honeypot por tushar mandal
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
tushar mandal695 visualizações
Honeypot Essentials por Anton Chuvakin
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
Anton Chuvakin2.4K visualizações
Basic Dynamic Analysis of Malware por Natraj G
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G1.9K visualizações
Honeypots por Bilal ZIANE
HoneypotsHoneypots
Honeypots
Bilal ZIANE3.7K visualizações
Honeypots por Jyoti Nagargoje
HoneypotsHoneypots
Honeypots
Jyoti Nagargoje202 visualizações
Honeypots for Network Security por Kirubaburi R
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
Kirubaburi R1.3K visualizações
M0704071074 por IJERD Editor
M0704071074M0704071074
M0704071074
IJERD Editor420 visualizações
Honeypot and deception por milad saber
Honeypot and deceptionHoneypot and deception
Honeypot and deception
milad saber204 visualizações
IDS+Honeypots Making Security Simple por Gregory Hanis
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Gregory Hanis2.8K visualizações
Honeypot a trap to hackers por Bhaskarasai Chitturi
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
Bhaskarasai Chitturi883 visualizações
Honeypot por umarani95
HoneypotHoneypot
Honeypot
umarani9511 visualizações

Último

Control Systems Feedback.pdf por
Control Systems Feedback.pdfControl Systems Feedback.pdf
Control Systems Feedback.pdfLGGaming5
6 visualizações39 slides
MK__Cert.pdf por
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdfHassan Khan
11 visualizações1 slide
Investor Presentation por
Investor PresentationInvestor Presentation
Investor Presentationeser sevinç
25 visualizações26 slides
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
83 visualizações19 slides
Generative AI Models & Their Applications por
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their ApplicationsSN
8 visualizações1 slide
Design_Discover_Develop_Campaign.pptx por
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptxShivanshSeth6
32 visualizações20 slides

Último(20)

Control Systems Feedback.pdf por LGGaming5
Control Systems Feedback.pdfControl Systems Feedback.pdf
Control Systems Feedback.pdf
LGGaming56 visualizações
MK__Cert.pdf por Hassan Khan
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdf
Hassan Khan11 visualizações
Investor Presentation por eser sevinç
Investor PresentationInvestor Presentation
Investor Presentation
eser sevinç25 visualizações
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang7883 visualizações
Generative AI Models & Their Applications por SN
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their Applications
SN8 visualizações
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth632 visualizações
Codes and Conventions.pptx por IsabellaGraceAnkers
Codes and Conventions.pptxCodes and Conventions.pptx
Codes and Conventions.pptx
IsabellaGraceAnkers9 visualizações
Searching in Data Structure por raghavbirla63
Searching in Data StructureSearching in Data Structure
Searching in Data Structure
raghavbirla637 visualizações
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome28 visualizações
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli12 visualizações
CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdf
AguedaGutirrez13 visualizações
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil53 visualizações
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli9 visualizações
Introduction to CAD-CAM.pptx por suyogpatil49
Introduction to CAD-CAM.pptxIntroduction to CAD-CAM.pptx
Introduction to CAD-CAM.pptx
suyogpatil495 visualizações
MSA Website Slideshow (16).pdf por msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla76 visualizações
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy19 visualizações
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra815 visualizações
START Newsletter 3 por Start Project
START Newsletter 3START Newsletter 3
START Newsletter 3
Start Project5 visualizações
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptx
keytonallamon42 visualizações

Honeypots

  • 1. HONEYPOTS PRESENTED BY, SARANYA.S S7 CSE 1
  • 2. CONTENTS  Introduction  What are Honey pots?  Classification  Honeyd  Honeynet  Advantages of honeypot  Disadvantages of honeypot  Conclusion 2
  • 3. INTRODUCTION The internet is growing very fast.  New attacks every day The more you know about your enemy, the better you can protect yourself. The main goal of honeypot is to gather as much information as possible. 3
  • 4. WHAT ARE HONEYPOTS? Honeypot is an exciting new technology with enormous potential for the security community. According to Lance Spitzner, founder of honeypot project: “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.” Used for monitoring, detecting and analyzing attacks 4
  • 5. CLASSIFICATION By level of interaction High Low By level of interaction By implementation Physical Virtual By purpose Production Research 5
  • 6. High interaction Simulates all aspects of the OS: real systems. Can be compromised completely, higher risk. More Information Eg:-Honeynet Architecture of high interaction honeypots 6
  • 7. Low interaction Simulates some aspects of the system Easy to deploy, minimal risk  Limited Information Eg:- Honeyd 7 Architecture of low interaction honeypots
  • 8. Physical Honeypots Real machines Own IP Addresses Often high-interactive 8
  • 9. Virtual Honeypots Simulated by other machines that: • Respond to the network traffic sent to the honeypots • May simulate a lot of (different) virtual honeypots at the same time 9
  • 10. Production Honeypots Help to mitigate risk in your organizations 3 categories: 1.Prevention • Keeping the bad guys out • Mechanism such as encryption prevent attackers from accessing critical information. 10
  • 11. Contd… 2. Detection • Detecting the attacker when he breaks in. • Challenges: False positive, False negative 3.Response • Can easily be pulled offline 11
  • 12. Research Honeypots Capture extensive information Used primarily by research, military, government organization. Used: • To capture automated threats, such autorooters • To capture unknown tools or techniques • To better understand attackers motives 12
  • 13. HONEYD  Open source software released under GNU General Public License. Able to simulate big network on a single host.  Provides simple functionality. 13
  • 14. A Honeyd config file create windows set windows personality "Windows NT 4.0 Server SP5-SP6" set windows default tcp action reset set windows default udp action reset add windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl" add windows tcp port 139 open add windows tcp port 137 open add windows udp port 137 open add windows udp port 135 open set windows uptime 3284460 bind 192.168.1.201 windows 14
  • 16. Overview of honeyd architecture 16 Routing Personality engine Packet dispatcher ICMP TCP UDP Services Routing Configuration Personality Network • Packet dispatcher Lookup • Configuration database • Protocol handlers • Router • Personality engine
  • 17. HONEYNET High interaction honeypots Two or more honeypots on a network form a honeynet. It is basically an architecture, an entire network of computers designed to be attacked.  The key to the honeynet architecture is “Honey wall”. 17
  • 21. Advantages of Honeypots Collect small data sets of high value Reduced false positive Cost effective Simplicity Minimal resources 21
  • 22. Disadvantages of Honeypots Limited view Risk Finger Printing 22
  • 23. CONCLUSION  Effective tool for observing hacker movements as well as preparing the system for future attacks. Flexible tool with different applications to security  Primary value in detection and information gathering. 23
  • 24. REFERENCES • R. R. Patel and C. S. Thaker, “Zero-day attack signatures detection using honey-pot,” International Conference on Computer Communication and Networks CSI-COMNET- 2011, vol. 1, no. 1, pp. 4–27, 2011. • Lance Spitzner. To build a honeypot. http://www.spitzner.net/honeypot.html. • http://www.tracking-hackers.com/papers/honeypots.html • The Honeynet Project, “Know Your Enemy: Statistics,” available online:http://honeynet.org/papers/stats • http://www.honeynet.org • http://project.honeypot.org 24