Académique Documents
Professionnel Documents
Culture Documents
Honeypots are closely supporting tool which stops the danger which occurs through various things.
It is a resource, which is intended to be attacked and computerized to gain more information about the attacker and used tools.
DEFINITION:
Honeypots are an exiting new technology.they allow us to turn the tables on the bad dudes.
Low-involvement HoneyPot:
A low-level involvement honeypot typically only provides certain fake services. In a basic form, these services could be implemented by having a listener on specific port.
Low-involvement HoneyPot:
Mid-involvement HoneyPot:
A mid-involvement honeypot provides more to interact with but still does not provide a real underlying operating system.
Mid-involvement honeypot:
High-involvement honeypot:
High-involvement HoneyPot:
BACKGROUND:
The background of this can be described using 3 things
Awareness
we raise awareness of the threats and vulnerabilities that exist in the Internet today.
Information
information about attackers has been limited to the tools they use.
Tools
For organizations interested in continuing their own research about cyber threats, we provide the tools and techniques we have developed.
DESCRIPTION: Simply connecting to the Internet and doing nothing else exposes your PC to non-stop, automated break-in attempts by intruders looking to take control of your machine surreptitiously PC users must shore up defenses on three fronts :
Operating system vulnerabilities. Spyware
E-mail viruses.
Advantages: .
1.Small Data sets
CONCLUSION:
To conclude, it has been shown how important intrusion detection and prevention systems are in our increasingly changing technological world.
Honeypots can be arranged into honey nets more complicated networks of honey pots.
Legal issues arise, because of honey pots invasion of privacy and the information they collect.
THANK YOU