SlideShare a Scribd company logo
Honeypots Jayant Kumar Gandhi - www.jkg.in Himanshu Bhatnagar Sachin Gajjar Sameek Banerjee Shashwat Agrawal http://www.jkg.in/eel702/presentation.ppt
Agenda Motivation Definition Advantages/ Disadvantages Types
Motivation Key to effective intrusion detection is information Learn more about past attacks Detect currently occurring attacks Identify new types of attacks Do all this in real time
Definition “ Any security resource who’s value lies in being probed, attacked, or compromised” – L. Spitzner,  Honeypots: Tracking Hackers , ISBN 0-321-10895-7
How honeypots work A resource that expects no data, so any traffic to or from it is most likely unauthorized activity
Advantages Reduce false positives and false negatives Data value Resources Simplicity
Disadvantages Narrow Field of View Fingerprinting Risk
Types Production (Law enforcement) Research (Counter-intelligence)
Production Honeypots Prevention Detection Response
Research Honeypots Early warning and prediction Discover new tools and tactics Understanding motives, behavior and organization Develop analysis and forensic skills
Level of Interaction Level of interaction determines the amount of functionality a honeypot provides Low Interaction Less learning, complexity and risk High Interaction High learning, complexity and risk
Risk Attacker can compromise your honeypot to harm, attack or infiltrate other systems and organizations
Low Interaction Provide emulated services No operating system to access Information limited to transactional information and attackers activities with the emulated services
High Interaction Provides actual Operating Systems Learn extensive amount of information Extensive risk
Honeyd Low-interaction honeypot Runs on a single computer Simulates a group of virtual machines Simulates the physical network between them Simulates only the network stack of each machine Intended primarily to fool fingerprinting tools
Honeyd Fingerprinting Attackers often try to learn more about a system before attacking it Can determine a machine’s operating system by “testing” its network behavior How the initial TCP sequence number is created Response packets for open and closed ports Configuration of packet headers Common fingerprinting tools: Nmap, Xprobe
Honeynets High-interaction honeypots Network of real machines (honeypots) Honeywall – a gateway between honeypots and rest of the world
Legal issues Privacy Entrapment Liability
Legal Mumbo Jumbo Design template is Copyright © 2006 Jayant Kumar Gandhi (www.jkg.in) Clip art is Copyright © 2006 Microsoft Corporation All trademarks, registered trademarks are acknowledged and are property of their respective owners
Bibliography Robert Graham, Network intrusion detection systems, 2000. http://www.robertgraham.com/pubs/network-intrusion-detection.html David Klug, Honeypots and intrusion detection. http://www.sans.org./infosecFAQ/intrusion/honeypots.htm Christian Plattner Reto Baumann, White paper: Honeypots. http://www.rbaumann.net,http://www.christianplattner.net Lance Spitzner, Honeypots: Tracking hackers ISBN: 0-321-10895-7 Lance Spitzner, Intrusion detection, 2000. http://www.enteract.com/lspitz/ids.html Lance Spitzner, Know your enemy: I, ii and iii, 2000 http://www.project.honeynet.org/papers
Questions?
http://www.jkg.in/contact-me/ Uploaded on SlideShare.net for the public.

More Related Content

PPTX
Honeypots
PPTX
Honeypot ppt1
PPTX
Honeypot
PPT
PPT
All about Honeypots & Honeynets
PPTX
Honeypots (Ravindra Singh Rathore)
PPTX
Honeypots
PPTX
Honey po tppt
Honeypots
Honeypot ppt1
Honeypot
All about Honeypots & Honeynets
Honeypots (Ravindra Singh Rathore)
Honeypots
Honey po tppt

What's hot (20)

PDF
Honeypots for Network Security
PPTX
Honeypots and honeynets
PPTX
PPT
Honeypot
PDF
Virtual honeypot
PPTX
Honeypot a trap to hackers
PDF
Ch 5: Port Scanning
PPT
Honeypot honeynet
PPT
IoT security (Internet of Things)
PPTX
Honeypots
PPTX
Machine learning in Cyber Security
PPTX
Dos attack
PPTX
Understanding NMAP
PPTX
Honeypot ss
PPTX
honey pots introduction and its types
PPTX
Honeypot based intrusion detection system PPT
PPTX
Honey pots
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
PDF
Ransomware attacks
PDF
Threat Intelligence
Honeypots for Network Security
Honeypots and honeynets
Honeypot
Virtual honeypot
Honeypot a trap to hackers
Ch 5: Port Scanning
Honeypot honeynet
IoT security (Internet of Things)
Honeypots
Machine learning in Cyber Security
Dos attack
Understanding NMAP
Honeypot ss
honey pots introduction and its types
Honeypot based intrusion detection system PPT
Honey pots
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Ransomware attacks
Threat Intelligence
Ad

Similar to Honeypots (20)

PPT
Srikanth
PPTX
Honeypot2
PPTX
Honeypots.ppt1800363876
PPSX
Honeypot and deception
PPT
Honeypot-A Brief Overview
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Seminar Report on Honeypot
PPTX
Cyber warfare introduction
PDF
Honeypots
PPTX
Tushar mandal.honeypot
PDF
Honeypot 101 (slide share)
DOCX
Honeypots
PDF
Hunt down the evil of your infrastructure
DOC
Honeypot Essentials
PPT
Lecture 7
PPT
Honey Pot
PDF
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
PPTX
Network Security Chapter-2 Computer Science.pptx
PPT
TOTEM: Threat Observation, Tracking, and Evaluation Model
PPTX
Threat hunting for Beginners
Srikanth
Honeypot2
Honeypots.ppt1800363876
Honeypot and deception
Honeypot-A Brief Overview
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Seminar Report on Honeypot
Cyber warfare introduction
Honeypots
Tushar mandal.honeypot
Honeypot 101 (slide share)
Honeypots
Hunt down the evil of your infrastructure
Honeypot Essentials
Lecture 7
Honey Pot
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Network Security Chapter-2 Computer Science.pptx
TOTEM: Threat Observation, Tracking, and Evaluation Model
Threat hunting for Beginners
Ad

Recently uploaded (20)

PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
Lecture (1)-Introduction.pptx business communication
PPT
Chapter four Project-Preparation material
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Training And Development of Employee .pdf
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPTX
HR Introduction Slide (1).pptx on hr intro
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
A Brief Introduction About Julia Allison
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
Power and position in leadershipDOC-20250808-WA0011..pdf
Nidhal Samdaie CV - International Business Consultant
Lecture (1)-Introduction.pptx business communication
Chapter four Project-Preparation material
COST SHEET- Tender and Quotation unit 2.pdf
Training And Development of Employee .pdf
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
MSPs in 10 Words - Created by US MSP Network
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Unit 1 Cost Accounting - Cost sheet
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
HR Introduction Slide (1).pptx on hr intro
unit 1 COST ACCOUNTING AND COST SHEET
A Brief Introduction About Julia Allison
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
ICG2025_ICG 6th steering committee 30-8-24.pptx

Honeypots

  • 1. Honeypots Jayant Kumar Gandhi - www.jkg.in Himanshu Bhatnagar Sachin Gajjar Sameek Banerjee Shashwat Agrawal http://www.jkg.in/eel702/presentation.ppt
  • 2. Agenda Motivation Definition Advantages/ Disadvantages Types
  • 3. Motivation Key to effective intrusion detection is information Learn more about past attacks Detect currently occurring attacks Identify new types of attacks Do all this in real time
  • 4. Definition “ Any security resource who’s value lies in being probed, attacked, or compromised” – L. Spitzner, Honeypots: Tracking Hackers , ISBN 0-321-10895-7
  • 5. How honeypots work A resource that expects no data, so any traffic to or from it is most likely unauthorized activity
  • 6. Advantages Reduce false positives and false negatives Data value Resources Simplicity
  • 7. Disadvantages Narrow Field of View Fingerprinting Risk
  • 8. Types Production (Law enforcement) Research (Counter-intelligence)
  • 9. Production Honeypots Prevention Detection Response
  • 10. Research Honeypots Early warning and prediction Discover new tools and tactics Understanding motives, behavior and organization Develop analysis and forensic skills
  • 11. Level of Interaction Level of interaction determines the amount of functionality a honeypot provides Low Interaction Less learning, complexity and risk High Interaction High learning, complexity and risk
  • 12. Risk Attacker can compromise your honeypot to harm, attack or infiltrate other systems and organizations
  • 13. Low Interaction Provide emulated services No operating system to access Information limited to transactional information and attackers activities with the emulated services
  • 14. High Interaction Provides actual Operating Systems Learn extensive amount of information Extensive risk
  • 15. Honeyd Low-interaction honeypot Runs on a single computer Simulates a group of virtual machines Simulates the physical network between them Simulates only the network stack of each machine Intended primarily to fool fingerprinting tools
  • 16. Honeyd Fingerprinting Attackers often try to learn more about a system before attacking it Can determine a machine’s operating system by “testing” its network behavior How the initial TCP sequence number is created Response packets for open and closed ports Configuration of packet headers Common fingerprinting tools: Nmap, Xprobe
  • 17. Honeynets High-interaction honeypots Network of real machines (honeypots) Honeywall – a gateway between honeypots and rest of the world
  • 18. Legal issues Privacy Entrapment Liability
  • 19. Legal Mumbo Jumbo Design template is Copyright © 2006 Jayant Kumar Gandhi (www.jkg.in) Clip art is Copyright © 2006 Microsoft Corporation All trademarks, registered trademarks are acknowledged and are property of their respective owners
  • 20. Bibliography Robert Graham, Network intrusion detection systems, 2000. http://www.robertgraham.com/pubs/network-intrusion-detection.html David Klug, Honeypots and intrusion detection. http://www.sans.org./infosecFAQ/intrusion/honeypots.htm Christian Plattner Reto Baumann, White paper: Honeypots. http://www.rbaumann.net,http://www.christianplattner.net Lance Spitzner, Honeypots: Tracking hackers ISBN: 0-321-10895-7 Lance Spitzner, Intrusion detection, 2000. http://www.enteract.com/lspitz/ids.html Lance Spitzner, Know your enemy: I, ii and iii, 2000 http://www.project.honeynet.org/papers