SlideShare a Scribd company logo
2
Most read
3
Most read
8
Most read
HONEYPOTS
HONEYPOTS
BY:-
Manoj Kumawat
R. No. 13075029
HONEYPOTS
• What is honeypot ?
A honeypot is a computer security mechanism
set to detect, deflect or counteract attempts at
unauthorized use of information system.
It’s simply a TRAP to attacker.
HONEYPOTS
• How it works ?
A honeypot consists of data that appears to be
a legitimate part of the site but is actually
isolated and monitored, and that seems to
contain information or a resource of value to
attackers, which are then blocked.
HONEYPOTS
HONEYPOTS
Architecture:
•As a bait
•Just some regular system
•More attractive
HONEYPOTS
HONEYPOTS
• HONEYPOT CLASSIFICATION:
By Implementation
• Virtual
• Physical
By purpose
• Production
• Research
By level of interaction
• High
• Low
• Middle?
HONEYPOTS
• IMPLEMENTATION OF HONEYPOT:
Physical
• Real machines
• Own IP Addresses
• Often high-interactive
Virtual
• Simulated by other machines that:
–Respond to the traffic sent to the honeypots
–May simulate a lot of virtual honeypots at the
same time
HONEYPOTS
• PROPOSE OF HONEYPOT:
Research
Complex to deploy and maintain.
Captures extensive information.
Run by a volunteer(non-profit).
Used to research the threats organization face.
Production
Easy to use
Capture only limited information
Used by companies or corporations
Mitigates risks in organization
HONEYPOTS
• INTERACTION LEVEL:
• Low Interaction
• High Interaction
HONEYPOTS
• LOW INTERACTION VS. HIGH INTERACTION:
HONEYPOTS
• Placement of honeypot
In front of the firewall (Internet)
DMZ (De-Militarized Zone)
Behind the firewall (intranet)
HONEYPOTS
HONEYPOTS
Honeypot Values:
•Prevention
•Detection
•Response
HONEYPOTS
Prevention:
•Keeping the burglar out of your house.
•Honeypots, in general are not effective
prevention mechanisms.
HONEYPOTS
Detection:
•Detecting the burglar when he breaks in.
HONEYPOTS
Response:
•Honeypots can be used to help respond to an
incident.
HONEYPOTS
Honeypot Basics

More Related Content

PPTX
Honeypots
PPTX
CAPSULE ENDOSCOPY
PPTX
E governance
PPTX
VAPT PRESENTATION full.pptx
PPTX
Chat Application
PPTX
AIRBAG SYSTEM FOR 2-WHEELER VEHICLE SYSTEM
PPTX
OWASP TOP 10 VULNERABILITIS
Honeypots
CAPSULE ENDOSCOPY
E governance
VAPT PRESENTATION full.pptx
Chat Application
AIRBAG SYSTEM FOR 2-WHEELER VEHICLE SYSTEM
OWASP TOP 10 VULNERABILITIS

What's hot (20)

PPTX
Honeypot ppt1
PPTX
Honeypots
PPTX
Honeypot a trap to hackers
PPTX
Honeypots
PPTX
PPT
Honey Pot
PPT
All about Honeypots & Honeynets
PDF
Honeypots for Network Security
PPTX
Honey po tppt
PPTX
Honeypot
PPTX
Cia security model
PPTX
Introduction To Exploitation & Metasploit
PPTX
Honey pots
PPTX
honey pots introduction and its types
PPTX
Packet sniffers
PPTX
Cyber security with ai
PPT
Browser Security
PPTX
Man in The Middle Attack
PPTX
cyber security presentation.pptx
PPTX
Man in the middle attack (mitm)
Honeypot ppt1
Honeypots
Honeypot a trap to hackers
Honeypots
Honey Pot
All about Honeypots & Honeynets
Honeypots for Network Security
Honey po tppt
Honeypot
Cia security model
Introduction To Exploitation & Metasploit
Honey pots
honey pots introduction and its types
Packet sniffers
Cyber security with ai
Browser Security
Man in The Middle Attack
cyber security presentation.pptx
Man in the middle attack (mitm)
Ad

Viewers also liked (20)

PPT
Honeypots
PPT
Honeypot honeynet
PPT
PPTX
PPT
Honeypot
PDF
Honeypot Social Profiling
PPT
Honeypots - Tracking the Blackhat Community
PPTX
Hybrid honeypots for network security
PPT
Honeypot-A Brief Overview
DOC
Honeypot seminar report
PPTX
Tushar mandal.honeypot
PPTX
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
PPTX
Modern Honey Network (MHN)
PPTX
Interactive presentation screen format 16-9 - minimal for slideshare
PDF
Honeypot - NOAH15 London
PDF
Honeypots
PPT
Lecture 7
PDF
CDE future sonar webinar
PPT
Honeypot Project
Honeypots
Honeypot honeynet
Honeypot
Honeypot Social Profiling
Honeypots - Tracking the Blackhat Community
Hybrid honeypots for network security
Honeypot-A Brief Overview
Honeypot seminar report
Tushar mandal.honeypot
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Modern Honey Network (MHN)
Interactive presentation screen format 16-9 - minimal for slideshare
Honeypot - NOAH15 London
Honeypots
Lecture 7
CDE future sonar webinar
Honeypot Project
Ad

Similar to Honeypot Basics (20)

PPT
Honeypot
PPT
Honeypots.ppt
PPT
Description on Honeypots in Cyber Security
PDF
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
PPTX
honeypot.pptx honeypot technology2020 report
PPTX
Honeypots (Ravindra Singh Rathore)
PPT
honeypots.ppt
PPSX
Honeypot and deception
PPTX
Honeypots and honeynets
PPT
Honeypot
PPTX
Honeypot
PPTX
Honey pots
PPTX
Honey pot day 1
PPTX
Honey pot in cloud computing
PPTX
Honeypot ss
PDF
Honeypots
PPTX
Honeypot2
PDF
Paper id 312201513
PDF
Honeypots for Active Defense
Honeypot
Honeypots.ppt
Description on Honeypots in Cyber Security
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
honeypot.pptx honeypot technology2020 report
Honeypots (Ravindra Singh Rathore)
honeypots.ppt
Honeypot and deception
Honeypots and honeynets
Honeypot
Honeypot
Honey pots
Honey pot day 1
Honey pot in cloud computing
Honeypot ss
Honeypots
Honeypot2
Paper id 312201513
Honeypots for Active Defense

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
The AUB Centre for AI in Media Proposal.docx
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
“AI and Expert System Decision Support & Business Intelligence Systems”
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf

Honeypot Basics