Vous êtes sur la page 1sur 18

HONEYPOTS FOR NETWORK SECURITY

Presented By A.Santhosh 08GE1A1242

Honeypots are closely supporting tool which stops the danger which occurs through various things.

Honeypots are an exciting new technology.

It is a resource, which is intended to be attacked and computerized to gain more information about the attacker and used tools.

DEFINITION:

Honeypots as a security resource whos value lies in being attacked or compromised

Honeypots are an exiting new technology.they allow us to turn the tables on the bad dudes.

There are two categories of honeypots: 1.Production HoneyPot


2.Research HoneyPot

Production HoneyPot: A production honeypot is used to help migrate risk in an organization


Research HoneyPot: Research HoneyPot is used to gather as much information as possible.

There are 3 concepts of HoneyPot 1. Low-involvement honey.

2. Mid-involvement honey. 3. High-involvement honey.

Low-involvement HoneyPot:
A low-level involvement honeypot typically only provides certain fake services. In a basic form, these services could be implemented by having a listener on specific port.

Low-involvement HoneyPot:

Mid-involvement HoneyPot:

A mid-involvement honeypot provides more to interact with but still does not provide a real underlying operating system.

Mid-involvement honeypot:

High-involvement honeypot:

A high-involvement honeypot is very time consuming.

A high-involvement honeypot has a real underlaying operating system.

High-involvement HoneyPot:

BACKGROUND:
The background of this can be described using 3 things

Awareness
we raise awareness of the threats and vulnerabilities that exist in the Internet today.

Information
information about attackers has been limited to the tools they use.
Tools

For organizations interested in continuing their own research about cyber threats, we provide the tools and techniques we have developed.

DESCRIPTION: Simply connecting to the Internet and doing nothing else exposes your PC to non-stop, automated break-in attempts by intruders looking to take control of your machine surreptitiously PC users must shore up defenses on three fronts :
Operating system vulnerabilities. Spyware

E-mail viruses.

Possible locations for honeypots are shown below

Advantages: .
1.Small Data sets

2. Reduced False Positives 3. Catching False Negatives


4. .Minimal Resources 5. Encryption

CONCLUSION:
To conclude, it has been shown how important intrusion detection and prevention systems are in our increasingly changing technological world.

Honeypots can be arranged into honey nets more complicated networks of honey pots.

Legal issues arise, because of honey pots invasion of privacy and the information they collect.

THANK YOU

Vous aimerez peut-être aussi