honey pots 4 network security 1

Upload: phanikumar123456

Post on 05-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Honey Pots 4 Network Security 1

    1/18

    HONEYPOTS

    FOR

    NETWORK SECURITY

    Presented ByA.Santhosh08GE1A1242

  • 8/2/2019 Honey Pots 4 Network Security 1

    2/18

    Honeypots are closely supporting tool which stops the danger whichoccurs through various things.

    Honeypots are an exciting new technology.

    It is a resource, which is intended to be attacked and computerized to

    gain more information about the attacker and used tools.

  • 8/2/2019 Honey Pots 4 Network Security 1

    3/18

    Honeypots as a security resource whos value lies

    in being attacked or compromised

    Honeypots are an exiting new technology.they allow

    us to turn the tables on the bad dudes.

    DEFINITION:

  • 8/2/2019 Honey Pots 4 Network Security 1

    4/18

    There are two categories of honeypots:

    1.Production HoneyPot

    2.Research HoneyPot

  • 8/2/2019 Honey Pots 4 Network Security 1

    5/18

    Production HoneyPot:A production honeypot is used to help

    migrate risk in an organization

    Research HoneyPot:

    Research HoneyPot is used to gather as

    much information as possible.

  • 8/2/2019 Honey Pots 4 Network Security 1

    6/18

    There are 3 concepts of HoneyPot

    1. Low-involvement honey.

    2. Mid-involvement honey.

    3. High-involvement honey.

  • 8/2/2019 Honey Pots 4 Network Security 1

    7/18

    Low-involvement HoneyPot:

    A low-level involvement honeypot

    typically only provides certain fake

    services. In a basic form, these services

    could be implemented by having a listener

    on specific port.

  • 8/2/2019 Honey Pots 4 Network Security 1

    8/18

    Low-involvement HoneyPot:

  • 8/2/2019 Honey Pots 4 Network Security 1

    9/18

    Mid-involvement HoneyPot:

    A mid-involvement honeypotprovides more to interact with but still

    does not provide a real underlying

    operating system.

  • 8/2/2019 Honey Pots 4 Network Security 1

    10/18

    Mid-involvement honeypot:

  • 8/2/2019 Honey Pots 4 Network Security 1

    11/18

    High-involvement honeypot:

    A high-involvement honeypot is

    very time consuming.

    A high-involvement honeypot has

    a real underlaying operating system.

  • 8/2/2019 Honey Pots 4 Network Security 1

    12/18

    High-involvement HoneyPot:

  • 8/2/2019 Honey Pots 4 Network Security 1

    13/18

    BACKGROUND:

    The background of this can be described using 3 things

    Awareness

    we raise awareness of the threats and vulnerabilities that exist in theInternet today.

    Informationinformation about attackers has been limited to the tools they use.

    ToolsFor organizations interested in continuing their own research about

    cyber threats, we provide the tools and techniques we have developed.

  • 8/2/2019 Honey Pots 4 Network Security 1

    14/18

    DESCRIPTION:

    Simply connecting to the Internet and doingnothing else exposes your PC to non-stop,automated break-in attempts by intruders lookingto take control of your machine surreptitiously

    PC users must shore up defenses on three fronts :

    Operating system vulnerabilities.

    Spyware

    E-mail viruses.

  • 8/2/2019 Honey Pots 4 Network Security 1

    15/18

    Possible locations for honeypots are shown below

  • 8/2/2019 Honey Pots 4 Network Security 1

    16/18

    .Advantages:

    1.Small Data sets

    2. Reduced False Positives

    3. Catching False Negatives

    4. .Minimal Resources

    5. Encryption

  • 8/2/2019 Honey Pots 4 Network Security 1

    17/18

    CONCLUSION:

    To conclude, it has been shown how important intrusion detection

    and prevention systems are in our increasingly changing technologicalworld.

    Honeypots can be arranged into honey netsmore complicated networks of honey pots.

    Legal issues arise, because of honey potsinvasion of privacy and the information theycollect.

  • 8/2/2019 Honey Pots 4 Network Security 1

    18/18

    THANK YOU