SlideShare a Scribd company logo
Honeypots
Sneha Ranganathan Srinayani Guntaka Sharath Chandra Sarangpur
Introduction
A honeypot is a trap set to detect, deflect, or in some manner counteract
attempts at unauthorized use of information systems
They are the highly flexible security tool with different applications for
security. They don't fix a single problem. Instead they have multiple uses, such
as prevention, detection, or information gathering
A honeypot is an information system resource whose value lies in
unauthorized or illicit use of that resource
What is a Honey Pot?
• A Honey Pot is an intrusion detection technique used to study hackers
movements
What is a Honey Pot?(cont.)
• Virtual machine that sits on a network or a client
• Goals
 Should look as real as possible!
 Should be monitored to see if its being used to launch a massive
attack on other systems
 Should include files that are of interest to the hacker
Classification
By level of interaction
• High
• Low
By Implementation
• Virtual
• Physical
By purpose
• Production
• Research
Interaction
Low interaction Honeypots
•They have limited interaction, they normally work by emulating services and operating
systems
•They simulate only services that cannot be exploited to get complete access to the honeypot
•Attacker activity is limited to the level of emulation by the honeypot
•Examples of low-interaction honeypots include Specter, Honeyd, and KFsensor
Interaction
High interaction Honeypots
• They are usually complex solutions as they involve real operating systems and applications
•Nothing is emulated, the attackers are given the real thing
•A high-interaction honeypot can be compromised completely, allowing an adversary to gain
full access to the system and use it to launch further network attacks
•Examples of high-interaction honeypots include Symantec Decoy Server and Honeynets
• Physical
• Real machines
• Own IP Addresses
• Often high-interactive
• Virtual
• Simulated by other machines that:
– Respond to the traffic sent to the honeypots
– May simulate a lot of (different) virtual honeypots at the
same time
Implementation
• Production honeypots are easy to use, capture only limited information, and
are used primarily by companies or corporations
• Prevention
• To keep the bad elements out
• There are no effective mechanisms
• Deception, Deterrence, Decoys do NOT work against automated attacks:
worms, auto-rooters, mass-rooters
• Detection
• Detecting the burglar when he breaks in
• Response
• Can easily be pulled offline
Production
• Research honeypots are complex to deploy and maintain, capture extensive
information, and are used primarily by research, military, or government
organizations.
• Collect compact amounts of high value information
• Discover new Tools and Tactics
• Understand Motives, Behavior, and Organization
• Develop Analysis and Forensic Skills
Research
Advantages
• Small data sets of high value.
• Easier and cheaper to analyze the data
• Designed to capture anything thrown at them, including tools or
tactics never used before
• Require minimal resources
• Work fine in encrypted or IPv6 environments
• Can collect in-depth information
• Conceptually very simple
Disadvantages
• Can only track and capture activity that directly interacts with them
• All security technologies have risk
• Building, configuring, deploying and maintaining a high-interaction
honeypot is time consuming
• Difficult to analyze a compromised honeypot
• High interaction honeypot introduces a high level of risk
• Low interaction honeypots are easily detectable by skilled attackers
Working of Honeynet – High – interaction honeypot
• Honeynet has 3 components:
 Data control
 Data capture
 Data analysis
Working of Honeyd – Low – interaction honeypot
 Open Source and designed to run on
Unix systems
 Concept - Monitoring unused IP space
Conclusion
• Not a solution!
• Can collect in depth data which no other technology can
• Different from others – its value lies in being attacked, probed or
compromised
• Extremely useful in observing hacker movements and preparing
the systems for future attacks
References
http://www.authorstream.com/Presentation/juhi1988-111469-ppt-h
oneypot-honeypotppt1-science-technology-powerpoint/
http://www.tracking-hackers.com/papers/honeypots.html
http://en.wikipedia.org/wiki/Honeypot_%28computing%29
Thank you
Questions

More Related Content

PPT
Honeypot
PPTX
Honey po tppt
PPT
Honeypot
PPT
Honeypot
PPTX
Incubation of ICS Malware (English)
PPT
honeypots.ppt
PPTX
Honey pots
PPTX
Honeypots (Ravindra Singh Rathore)
Honeypot
Honey po tppt
Honeypot
Honeypot
Incubation of ICS Malware (English)
honeypots.ppt
Honey pots
Honeypots (Ravindra Singh Rathore)

Similar to Description on Honeypots in Cyber Security (20)

PPT
Honeypot honeynet
PDF
Identify and Stop Insider Threats
PPTX
Honeypot
PPTX
Honeypot a trap to hackers
PDF
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
PPT
Honeypot Basics
PPTX
honeypot.pptx honeypot technology2020 report
PPTX
Honeypots and honeynets
PDF
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
PPTX
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
PPTX
Honey pot day 1
PPTX
Lecture 10 intruders
PPT
Honey pots
PPTX
PPT
ch08.ppt
PPT
unit 2. cyber offences_how criminals plan them.ppt
PDF
Ch11 NetSec5e_Intruders and intruderssss
Honeypot honeynet
Identify and Stop Insider Threats
Honeypot
Honeypot a trap to hackers
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
Honeypot Basics
honeypot.pptx honeypot technology2020 report
Honeypots and honeynets
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Honey pot day 1
Lecture 10 intruders
Honey pots
ch08.ppt
unit 2. cyber offences_how criminals plan them.ppt
Ch11 NetSec5e_Intruders and intruderssss
Ad

Recently uploaded (20)

PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
web development for engineering and engineering
PPT
Project quality management in manufacturing
PPTX
Geodesy 1.pptx...............................................
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
PPT on Performance Review to get promotions
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Welding lecture in detail for understanding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Well-logging-methods_new................
Operating System & Kernel Study Guide-1 - converted.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
bas. eng. economics group 4 presentation 1.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
web development for engineering and engineering
Project quality management in manufacturing
Geodesy 1.pptx...............................................
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT on Performance Review to get promotions
Foundation to blockchain - A guide to Blockchain Tech
Welding lecture in detail for understanding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
CH1 Production IntroductoryConcepts.pptx
Well-logging-methods_new................
Ad

Description on Honeypots in Cyber Security

  • 1. Honeypots Sneha Ranganathan Srinayani Guntaka Sharath Chandra Sarangpur
  • 2. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems They are the highly flexible security tool with different applications for security. They don't fix a single problem. Instead they have multiple uses, such as prevention, detection, or information gathering A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource
  • 3. What is a Honey Pot? • A Honey Pot is an intrusion detection technique used to study hackers movements
  • 4. What is a Honey Pot?(cont.) • Virtual machine that sits on a network or a client • Goals  Should look as real as possible!  Should be monitored to see if its being used to launch a massive attack on other systems  Should include files that are of interest to the hacker
  • 5. Classification By level of interaction • High • Low By Implementation • Virtual • Physical By purpose • Production • Research
  • 6. Interaction Low interaction Honeypots •They have limited interaction, they normally work by emulating services and operating systems •They simulate only services that cannot be exploited to get complete access to the honeypot •Attacker activity is limited to the level of emulation by the honeypot •Examples of low-interaction honeypots include Specter, Honeyd, and KFsensor
  • 7. Interaction High interaction Honeypots • They are usually complex solutions as they involve real operating systems and applications •Nothing is emulated, the attackers are given the real thing •A high-interaction honeypot can be compromised completely, allowing an adversary to gain full access to the system and use it to launch further network attacks •Examples of high-interaction honeypots include Symantec Decoy Server and Honeynets
  • 8. • Physical • Real machines • Own IP Addresses • Often high-interactive • Virtual • Simulated by other machines that: – Respond to the traffic sent to the honeypots – May simulate a lot of (different) virtual honeypots at the same time Implementation
  • 9. • Production honeypots are easy to use, capture only limited information, and are used primarily by companies or corporations • Prevention • To keep the bad elements out • There are no effective mechanisms • Deception, Deterrence, Decoys do NOT work against automated attacks: worms, auto-rooters, mass-rooters • Detection • Detecting the burglar when he breaks in • Response • Can easily be pulled offline Production
  • 10. • Research honeypots are complex to deploy and maintain, capture extensive information, and are used primarily by research, military, or government organizations. • Collect compact amounts of high value information • Discover new Tools and Tactics • Understand Motives, Behavior, and Organization • Develop Analysis and Forensic Skills Research
  • 11. Advantages • Small data sets of high value. • Easier and cheaper to analyze the data • Designed to capture anything thrown at them, including tools or tactics never used before • Require minimal resources • Work fine in encrypted or IPv6 environments • Can collect in-depth information • Conceptually very simple
  • 12. Disadvantages • Can only track and capture activity that directly interacts with them • All security technologies have risk • Building, configuring, deploying and maintaining a high-interaction honeypot is time consuming • Difficult to analyze a compromised honeypot • High interaction honeypot introduces a high level of risk • Low interaction honeypots are easily detectable by skilled attackers
  • 13. Working of Honeynet – High – interaction honeypot • Honeynet has 3 components:  Data control  Data capture  Data analysis
  • 14. Working of Honeyd – Low – interaction honeypot  Open Source and designed to run on Unix systems  Concept - Monitoring unused IP space
  • 15. Conclusion • Not a solution! • Can collect in depth data which no other technology can • Different from others – its value lies in being attacked, probed or compromised • Extremely useful in observing hacker movements and preparing the systems for future attacks