Friday, October 19, 2018

Honey Pot





A Honeypot  is a computer system that is set up to act as a decoy to lure cyber attackers, and to study deflect or detect attempts to gain unauthorized access to information systems. It is an additional security protection that can be used alongside a firewall and other security solutions to help protect a network from hackers. The basic intention of it is to track unconventional methods of accessing the data. They are designed to purposely engage and deceive hackers and identify malicious activities performed over the internet. Multiple Honeypots can be set on a network to form a Honeynet.

USES
1. Can detect and prevent cyber attacks.
2. Simulate multiple virtual hosts simultaneously
3. Simulate numerous TCP/IP stacks and network topology.  

TYPES
1. Production honeypots.
2. Research honeypots.

LEVELS
1. Low involvement Honeypot 
2. High involvement Honeypot  

Involvement defines the level of activity a Honeypot  allows an attacker.

ADVANTAGES
1. It’s simplicity and minimal risk.
2. Easier to deploy and maintain.

APPLICATIONS
1. In network security.
2. In enterprise level security operations.

Like all technologies, honeypots have their drawbacks too, the greatest one being their limited field of view. Honeypots capture only activity that's directed against them and will miss attacks against other systems. For that reason, security experts don't recommend that these systems replace existing security technologies. Instead, they see honeypots as a complementary technology to network- and host-based intrusion protection.

1 comment: