honey pots 4 network security 1
TRANSCRIPT
-
8/2/2019 Honey Pots 4 Network Security 1
1/18
HONEYPOTS
FOR
NETWORK SECURITY
Presented ByA.Santhosh08GE1A1242
-
8/2/2019 Honey Pots 4 Network Security 1
2/18
Honeypots are closely supporting tool which stops the danger whichoccurs through various things.
Honeypots are an exciting new technology.
It is a resource, which is intended to be attacked and computerized to
gain more information about the attacker and used tools.
-
8/2/2019 Honey Pots 4 Network Security 1
3/18
Honeypots as a security resource whos value lies
in being attacked or compromised
Honeypots are an exiting new technology.they allow
us to turn the tables on the bad dudes.
DEFINITION:
-
8/2/2019 Honey Pots 4 Network Security 1
4/18
There are two categories of honeypots:
1.Production HoneyPot
2.Research HoneyPot
-
8/2/2019 Honey Pots 4 Network Security 1
5/18
Production HoneyPot:A production honeypot is used to help
migrate risk in an organization
Research HoneyPot:
Research HoneyPot is used to gather as
much information as possible.
-
8/2/2019 Honey Pots 4 Network Security 1
6/18
There are 3 concepts of HoneyPot
1. Low-involvement honey.
2. Mid-involvement honey.
3. High-involvement honey.
-
8/2/2019 Honey Pots 4 Network Security 1
7/18
Low-involvement HoneyPot:
A low-level involvement honeypot
typically only provides certain fake
services. In a basic form, these services
could be implemented by having a listener
on specific port.
-
8/2/2019 Honey Pots 4 Network Security 1
8/18
Low-involvement HoneyPot:
-
8/2/2019 Honey Pots 4 Network Security 1
9/18
Mid-involvement HoneyPot:
A mid-involvement honeypotprovides more to interact with but still
does not provide a real underlying
operating system.
-
8/2/2019 Honey Pots 4 Network Security 1
10/18
Mid-involvement honeypot:
-
8/2/2019 Honey Pots 4 Network Security 1
11/18
High-involvement honeypot:
A high-involvement honeypot is
very time consuming.
A high-involvement honeypot has
a real underlaying operating system.
-
8/2/2019 Honey Pots 4 Network Security 1
12/18
High-involvement HoneyPot:
-
8/2/2019 Honey Pots 4 Network Security 1
13/18
BACKGROUND:
The background of this can be described using 3 things
Awareness
we raise awareness of the threats and vulnerabilities that exist in theInternet today.
Informationinformation about attackers has been limited to the tools they use.
ToolsFor organizations interested in continuing their own research about
cyber threats, we provide the tools and techniques we have developed.
-
8/2/2019 Honey Pots 4 Network Security 1
14/18
DESCRIPTION:
Simply connecting to the Internet and doingnothing else exposes your PC to non-stop,automated break-in attempts by intruders lookingto take control of your machine surreptitiously
PC users must shore up defenses on three fronts :
Operating system vulnerabilities.
Spyware
E-mail viruses.
-
8/2/2019 Honey Pots 4 Network Security 1
15/18
Possible locations for honeypots are shown below
-
8/2/2019 Honey Pots 4 Network Security 1
16/18
.Advantages:
1.Small Data sets
2. Reduced False Positives
3. Catching False Negatives
4. .Minimal Resources
5. Encryption
-
8/2/2019 Honey Pots 4 Network Security 1
17/18
CONCLUSION:
To conclude, it has been shown how important intrusion detection
and prevention systems are in our increasingly changing technologicalworld.
Honeypots can be arranged into honey netsmore complicated networks of honey pots.
Legal issues arise, because of honey potsinvasion of privacy and the information theycollect.
-
8/2/2019 Honey Pots 4 Network Security 1
18/18
THANK YOU