SlideShare a Scribd company logo
1 of 22
HONEYPOT
PRESENTED BY -
TUSHAR KANTI MANDAL
B.TECH(CSE) 6TH SEM
DATE – 6th MARCH, 2017
CONTENTS
HISTORY OF HONEYPOT ?
THE PROBLEM ?
INTRODUCTION OF HONEYPOT ?
OBJECTIVES OR PURPOSE OF HONEYPOT ?
FUNCTIONS OF HONEYPOT ?
WHY WE USE HONEYPOT ?
WORKING OF HONEYPOT ?
CLASSIFICATION OF HONEYPOT ?
IMPLEMENTATION OF HONEYPOT ?
ADVANTAGES AND DISADVANTAGES OF HONEYPOT ?
LEGAL ISSUES ?
CONCLUSION ?
HISTORY
The idea of honeypots began with two publications, “The
cuckoos egg” & “ An evening with Bredford ”.
“The cuckoos egg “ was about catching a computer hacker
that was searching for secrets in authors corporation.
“An evening with Berdferd” is about a hackers moves
through traps that the author used to catch him.
THE PROBLEM
The Internet security is hard
New attacks every day
Our Websites are static targets
What should we do?
The more you know about your enemy, the
better you can protect yourself
Fake target?
INTRODUCTION OF HONEYPOT
A honeypot can be almost any type of server or application that
is meant as a tool to catch or trap an attacker.
A HoneyPot is an intrusion (unwanted) detection technique
used to study hacker movement and interested to help better
system defences against later attacks usually made up of a
virtual machine that sits on a network or single client.
OBJECTIVES OF HONEYPOT
The virtual system should look as real as possible, it
should attract unwanted intruders to connect to the
virtual machine for study.
The virtual system should be watched to see that it
isn’t used for a massive attack on other systems.
The virtual system should look and feel just like a
regular system, meaning it must include files,
directories and information that will catch the eye of
the hacker
FUNCTIONS OF HONEYPOT
To divert the attention of the attacker from the real network, in
a way that the main information resources are not compromised .
To build attacker profiles in order to identify their preferred
attack methods, like criminal profile .
To capture new viruses or worms for future study .
A group of Honeypots becomes a Honeynet .
WHY WE USE HONEYPOT ?
 Its Different security from Firewall.
 Firewall only works on System Security.
 This security works on network layer .
 Helps to learn systems weakness .
 Hacker can be caught and stopped .
PLACEMENT OF HONEYPOT
 In front of the firewall (Internet)
 DMZ (De-Militarized Zone)
 Behind the firewall (intranet)
WORKING OF HONEYPOT
 Honeypots are, in their most basic form, fake information
severs strategically-positioned in a test network, which are
fed with false information made unrecognizable as files of
classified nature.
 In turn, these servers are initially configured in a way that
is difficult, but not impossible, to break into them by an
attacker; exposing them deliberately and making them
highly attractive for a hacker in search of a target.
 Finally, the server is loaded with monitoring and tracking
tools so every step and trace of activity left by a hacker
can be recorded in a log, indicating those traces of activity
in a detailed way.
HOW HONEYPOT WORKS :
CLASSIFICATION OF HONEYPOT
 (a) PRODUCTION HONEYPOT
 Used to protect organizations in real production operating
environments.
 Production honeypots are used to protect your network,
they directly help secure your organization.
 Specifically the three layers of prevention, detection, and
response. Honeypots can apply to all three layers. For
prevention, honeypots can be used to slow down or stop
automated attacks.
CLASSIFICATON OF HONEYPOT
 RESEARCH HONEYPOT
They represent educational resources of demonstrative and
research nature whose objective is centered towards studying all
sorts of attack patterns and threats.
 A great deal of current attention is focused on Research
Honeypots, which are used to gather information about the
intruders’ actions.
IMPLEMENTATION OF HONEYPOT
 Two types
 Physical
 Real machines
 Own IPAddresses
 Often high-interactive
 Virtual
 Simulated by other machines that:
 Respond to the traffic sent to the honeypots
 May simulate a lot of (different) virtual honeypots
at the same time
PHYSICAL IMPLEMENTATION
OF HONEYPOT
VIRTUAL IMPLEMENTATION
OF HONEYPOT
ADVANTAGES OF HONEYPOT
 Honeypots are focused (small data sets) .
 Honeypots help to catch unknown attacks .
 Honeypots can capture encrypted activity .
 Honeypots work with IPv6 .
 Honeypots are very flexible .
 Honeypots require minimal resources .
DISADVANTAGES OF HONEYPOT
 Limited View: honeypots can only track and capture activity
that directly interacts with them.
 Specifically, honeypots have the risk of being taken over by
the bad guy and being used to harm other systems. This risk
various for different honeypots.
 Easily detectable by a skilled attacker .
LEGAL ISSUES
 Privacy
 - No single statue concerning privacy
 - Electronic Communication Privacy Act
 Entrapment
 - Used only to defendant to avoid conviction
 - Applies only to law enforcement?
 Liability
 - If a Honeynet system is used to attack or damage
other non-honeynet system?
CONCLUSION
 The purpose of this topic was to define the what honeypots are
and their value to the security community. We identified two
different types of honeypots, low-interaction and high-
interaction honeypots.
 Honeypots are not a solution, they are a flexible tool with
different applications to security.
 Primary value in detection and information gathering.
 Just the beginning for honeypots.
“ The more you know about your enemy,
the better you can protect yourself”
Tushar mandal.honeypot
Tushar mandal.honeypot

More Related Content

What's hot

What's hot (20)

Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architecture
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network security
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 

Viewers also liked

Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief OverviewSILPI ROSAN
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar reportInder NeGi
 
Honeypot - NOAH15 London
Honeypot - NOAH15 LondonHoneypot - NOAH15 London
Honeypot - NOAH15 LondonNOAH Advisors
 
ZomBee Watch Tutorial
ZomBee Watch TutorialZomBee Watch Tutorial
ZomBee Watch Tutorialasimsfsu
 
Development, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot TechnologyDevelopment, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot TechnologyAntiy Labs
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Setting local domain di virtual host
Setting local domain di virtual hostSetting local domain di virtual host
Setting local domain di virtual hostFgroupIndonesia
 
Virtual host and certificate authority
Virtual host and certificate authorityVirtual host and certificate authority
Virtual host and certificate authorityAhmad Sayuti
 
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik osModul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik osEen Pahlefi
 

Viewers also liked (15)

Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
Honey pot day 1
Honey pot day 1Honey pot day 1
Honey pot day 1
 
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypot - NOAH15 London
Honeypot - NOAH15 LondonHoneypot - NOAH15 London
Honeypot - NOAH15 London
 
ZomBee Watch Tutorial
ZomBee Watch TutorialZomBee Watch Tutorial
ZomBee Watch Tutorial
 
Development, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot TechnologyDevelopment, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot Technology
 
Client Side Honeypots
Client Side HoneypotsClient Side Honeypots
Client Side Honeypots
 
Ppt
PptPpt
Ppt
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Networking recap
Networking recapNetworking recap
Networking recap
 
Setting local domain di virtual host
Setting local domain di virtual hostSetting local domain di virtual host
Setting local domain di virtual host
 
Virtual host and certificate authority
Virtual host and certificate authorityVirtual host and certificate authority
Virtual host and certificate authority
 
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik osModul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
 

Similar to Tushar mandal.honeypot

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applicationsijtsrd
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An OverviewIRJET Journal
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deceptionmilad saber
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513IJRAT
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Yuval Sinay, CISSP, C|CISO
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)Emil Tan
 
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot NetworkA Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Networkijtsrd
 

Similar to Tushar mandal.honeypot (20)

Honeypots
HoneypotsHoneypots
Honeypots
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 
Honeypots
HoneypotsHoneypots
Honeypots
 
HoneyPots.pptx
HoneyPots.pptxHoneyPots.pptx
HoneyPots.pptx
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honey pots
Honey potsHoney pots
Honey pots
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
Ananth3
Ananth3Ananth3
Ananth3
 
Honeypot
HoneypotHoneypot
Honeypot
 
Integrated honeypot
Integrated honeypotIntegrated honeypot
Integrated honeypot
 
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot NetworkA Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Tushar mandal.honeypot

  • 1. HONEYPOT PRESENTED BY - TUSHAR KANTI MANDAL B.TECH(CSE) 6TH SEM DATE – 6th MARCH, 2017
  • 2. CONTENTS HISTORY OF HONEYPOT ? THE PROBLEM ? INTRODUCTION OF HONEYPOT ? OBJECTIVES OR PURPOSE OF HONEYPOT ? FUNCTIONS OF HONEYPOT ? WHY WE USE HONEYPOT ? WORKING OF HONEYPOT ? CLASSIFICATION OF HONEYPOT ? IMPLEMENTATION OF HONEYPOT ? ADVANTAGES AND DISADVANTAGES OF HONEYPOT ? LEGAL ISSUES ? CONCLUSION ?
  • 3. HISTORY The idea of honeypots began with two publications, “The cuckoos egg” & “ An evening with Bredford ”. “The cuckoos egg “ was about catching a computer hacker that was searching for secrets in authors corporation. “An evening with Berdferd” is about a hackers moves through traps that the author used to catch him.
  • 4. THE PROBLEM The Internet security is hard New attacks every day Our Websites are static targets What should we do? The more you know about your enemy, the better you can protect yourself Fake target?
  • 5. INTRODUCTION OF HONEYPOT A honeypot can be almost any type of server or application that is meant as a tool to catch or trap an attacker. A HoneyPot is an intrusion (unwanted) detection technique used to study hacker movement and interested to help better system defences against later attacks usually made up of a virtual machine that sits on a network or single client.
  • 6. OBJECTIVES OF HONEYPOT The virtual system should look as real as possible, it should attract unwanted intruders to connect to the virtual machine for study. The virtual system should be watched to see that it isn’t used for a massive attack on other systems. The virtual system should look and feel just like a regular system, meaning it must include files, directories and information that will catch the eye of the hacker
  • 7. FUNCTIONS OF HONEYPOT To divert the attention of the attacker from the real network, in a way that the main information resources are not compromised . To build attacker profiles in order to identify their preferred attack methods, like criminal profile . To capture new viruses or worms for future study . A group of Honeypots becomes a Honeynet .
  • 8. WHY WE USE HONEYPOT ?  Its Different security from Firewall.  Firewall only works on System Security.  This security works on network layer .  Helps to learn systems weakness .  Hacker can be caught and stopped .
  • 9. PLACEMENT OF HONEYPOT  In front of the firewall (Internet)  DMZ (De-Militarized Zone)  Behind the firewall (intranet)
  • 10. WORKING OF HONEYPOT  Honeypots are, in their most basic form, fake information severs strategically-positioned in a test network, which are fed with false information made unrecognizable as files of classified nature.  In turn, these servers are initially configured in a way that is difficult, but not impossible, to break into them by an attacker; exposing them deliberately and making them highly attractive for a hacker in search of a target.  Finally, the server is loaded with monitoring and tracking tools so every step and trace of activity left by a hacker can be recorded in a log, indicating those traces of activity in a detailed way.
  • 12. CLASSIFICATION OF HONEYPOT  (a) PRODUCTION HONEYPOT  Used to protect organizations in real production operating environments.  Production honeypots are used to protect your network, they directly help secure your organization.  Specifically the three layers of prevention, detection, and response. Honeypots can apply to all three layers. For prevention, honeypots can be used to slow down or stop automated attacks.
  • 13. CLASSIFICATON OF HONEYPOT  RESEARCH HONEYPOT They represent educational resources of demonstrative and research nature whose objective is centered towards studying all sorts of attack patterns and threats.  A great deal of current attention is focused on Research Honeypots, which are used to gather information about the intruders’ actions.
  • 14. IMPLEMENTATION OF HONEYPOT  Two types  Physical  Real machines  Own IPAddresses  Often high-interactive  Virtual  Simulated by other machines that:  Respond to the traffic sent to the honeypots  May simulate a lot of (different) virtual honeypots at the same time
  • 17. ADVANTAGES OF HONEYPOT  Honeypots are focused (small data sets) .  Honeypots help to catch unknown attacks .  Honeypots can capture encrypted activity .  Honeypots work with IPv6 .  Honeypots are very flexible .  Honeypots require minimal resources .
  • 18. DISADVANTAGES OF HONEYPOT  Limited View: honeypots can only track and capture activity that directly interacts with them.  Specifically, honeypots have the risk of being taken over by the bad guy and being used to harm other systems. This risk various for different honeypots.  Easily detectable by a skilled attacker .
  • 19. LEGAL ISSUES  Privacy  - No single statue concerning privacy  - Electronic Communication Privacy Act  Entrapment  - Used only to defendant to avoid conviction  - Applies only to law enforcement?  Liability  - If a Honeynet system is used to attack or damage other non-honeynet system?
  • 20. CONCLUSION  The purpose of this topic was to define the what honeypots are and their value to the security community. We identified two different types of honeypots, low-interaction and high- interaction honeypots.  Honeypots are not a solution, they are a flexible tool with different applications to security.  Primary value in detection and information gathering.  Just the beginning for honeypots. “ The more you know about your enemy, the better you can protect yourself”