Honeypot is a trap set to detect or deflect or in some
matter counteract attempts at unauthorized use of information systems. Also it
is a security resource who’s values lies in being probed or attacked or
compromised. This maybe legal but Honeypoting can be manipulated to work for
the person in acquiring their personal details.
They are loads of
different honeypots just to name a few
Production honeypot-
are easy to use they capture only limited information and are used primarily by
companies or corporations. Production honeypots are placed inside the
production network with other production servers by an organization to improve
their overall state of security. Normally, production honeypots are
low-interaction honeypots, which are easier to deploy. They give less
information about the attacks or attackers than research honeypots do.
Pure honeypots- are
full-fledged production systems. The activities of the attacker are monitored
by using a casual tap that has been installed on the honeypot's link to the
network. No other software needs to be installed. Even though a pure honeypot
is useful, stealthiness of the defense mechanisms can be ensured by a more
controlled mechanism.
Research honeypots-
Are run to gather information about the motives and tactics of the black hat
community targeting different networks. These honeypots do not add direct value
to a specific organization instead they are used to research the threats that
organizations face to learn how to better protect themselves.
click the link below for real stories in Honeypoting.
No comments:
Post a Comment