Latest posts

10/recent/ticker-posts

Honey-Pot Trap For Hackers

Honey-Pot Trap For Hackers

Introduction

A honeypot is a security mechanism that creates a virtual trap for attackers. They are used to study attacker behavior patterns.
You can apply a honeypot to any computing resourse from software and network to file servers and routers.


Honeypot Are Divided Into Two Parts

  • Production Honeypots:-

It's a low interaction honeypot by which we can collect limited information about the hacker.

  • Research Honeypots:-
Those are advance honeypot which is set up to retrieve the information of the Black Hat Hacker.
It is mainly used by the Govt. Organizations.

Types Of Honeypot Deployments

  • Pure Honeypots:-
Complete production system that monitor attacks through bug taps on the link that connects the honeypot to the network
  • Low-Interaction Honeypots:-
They offer a method for collecting data from blind attacks such a botnets and worms malware.
  • High-Interaction Honeypots:-
Complex Setups that behave like real production infrastructure. they don't restrict the activity of cybercriminal, providing extensive cybersecurrity insights.

Several Types Of Specialized Honeypot Technologies

  • Malware Honeypot
These are honeypot that mimic malware attack vectors.
  • Spam Honeypoy
These can detect the methods of spammers, monitor their activity and block spam.
  • Database Honeypot
These create decoy database to mislead attackers using method that are somtimes missed by firewalls.
  • Client Honeypot
These activity seek out malicious servers behind client attacks instead of passively waiting for connections.

Honeypot Limitations

  • The honeypot cannot detect security breaches in legitimate system and it does not always identify the attacker.
  • There is also a risk that, having successfully exploited the honeypot, an attacker can move laterally to infiltrate the real production network.
  • To help scale your security operations, you can combine honeypots with other techniquies.


Honeypot: A Network Of Honeypot


A honey-net is a decoy network that contains one or more honeypots.

Advantages Of Honey Net


  • It looks like a real network and contains multiple systems but is hosted on one or only few servers, each representing one environment.
  • Any system on the honeynet may serve as a point of entry for attackers.
  • The honey-net gathers intelligence on the attackers and diverts them from the real network.
  • The advantage of a honey-net over a simple honeypot is that it feels more like a real network.




Also Visit