SlideShare a Scribd company logo
HONEYPOTS-TRACKING HACKERSFor Documentation and Downloads Visit
AbstractIt deals with and explores the fascinating world of Honey pots.
It describes a security tool and concept known as a Honey pot and Honeynet.
Honey Pots and Honeynets are digital network bait, and through  deception, they are designed to actually attract intruders.OUTLINEHONEYPOT
DESIGN CONCEPT
NETWORK WIRING MECHANISMS
ADVANTAGES
LIMITATIONSHONEYPOTSA honey pot is a computer system on the internet that   is expressively set up to attract and trap people who attempt to penetrate other people’s computer Systems.
This includes the hacker, cracker, and script.
They have multiple uses, such as prevention, detection, or information gathering. DESIGN CONCEPT
Classification of Honeypots1.Production Honeypots            Those used to protect organizations in real production           operating environments.2.Research Honeypots.           They represent educational resources of demonstrative and research nature whose objective is centered towards studying all sorts of attack patterns and threats.
 NETWORK WIRING MECHANISMSFigure 1Figure 1 - Honey net with one honey pot and management host using a shared networkAll cables shown as green are standard twisted pair cables.
2 Hubs or switches are used to connect interfaces together, along with 5 cables.
The management host only needs to have one network interface.Figure 2 Figure 2 - Honey net with two honeypots and management host using a shared networkThe above figure extends the design to include multiple honeypots off the internal interface of the honey wall.
This design, while simple and easy to understand, also has some serious security implications on the outside of the honey wall.  Figure 3           Figure 3 - Honey net with one honey pot and management host and direct connectionsAll cables shown in green are standard twisted pair cables.
All cables shown in red are cross-over twisted pair cables.

More Related Content

PPT
Honeypot honeynet
Sina Manavi
 
PPT
Honeypot
Akhil Sahajan
 
PPTX
Honey pots
Alok Singh
 
PPTX
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar
 
PPTX
Honeypot based intrusion detection system PPT
parthan t
 
PPTX
Honeypots.ppt1800363876
Momita Sharma
 
PPTX
Honey po tppt
Arya AR
 
PPTX
Honeypot
Sushan Sharma
 
Honeypot honeynet
Sina Manavi
 
Honeypot
Akhil Sahajan
 
Honey pots
Alok Singh
 
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar
 
Honeypot based intrusion detection system PPT
parthan t
 
Honeypots.ppt1800363876
Momita Sharma
 
Honey po tppt
Arya AR
 
Honeypot
Sushan Sharma
 

What's hot (20)

PPT
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 
PDF
Virtual honeypot
Elham Hormozi
 
PPT
Honey Pot
iradarji
 
PPTX
Honeypot ppt1
samrat saurabh
 
PPT
Honeypots
J. Scott Christianson
 
PPTX
Honeypot
Shashwat Shriparv
 
PPT
Lecture 7
Education
 
PPT
Honeypot-A Brief Overview
SILPI ROSAN
 
PPT
Honeypot
Sajan Sahu
 
PPTX
Honeypot a trap to hackers
Bhaskarasai Chitturi
 
PPTX
Honeypots
SARANYA S
 
PPTX
Honeypot ss
Kajal Mittal
 
PPTX
Honeypots
Rushikesh Kulkarni
 
PPTX
Honeypots
Gaurav Gupta
 
PPTX
Honeypots (Ravindra Singh Rathore)
Ravindra Singh Rathore
 
PPTX
Honey pot in cloud computing
أحلام انصارى
 
PDF
Seminar Report on Honeypot
Amit Poonia
 
PDF
Honeypot 101 (slide share)
Emil Tan
 
PPT
Honey pots
Dhaivat Zala
 
PPTX
Honey pots
Divya korrapati
 
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 
Virtual honeypot
Elham Hormozi
 
Honey Pot
iradarji
 
Honeypot ppt1
samrat saurabh
 
Honeypot
Shashwat Shriparv
 
Lecture 7
Education
 
Honeypot-A Brief Overview
SILPI ROSAN
 
Honeypot
Sajan Sahu
 
Honeypot a trap to hackers
Bhaskarasai Chitturi
 
Honeypots
SARANYA S
 
Honeypot ss
Kajal Mittal
 
Honeypots
Rushikesh Kulkarni
 
Honeypots
Gaurav Gupta
 
Honeypots (Ravindra Singh Rathore)
Ravindra Singh Rathore
 
Seminar Report on Honeypot
Amit Poonia
 
Honeypot 101 (slide share)
Emil Tan
 
Honey pots
Dhaivat Zala
 
Honey pots
Divya korrapati
 
Ad

Viewers also liked (14)

PPT
Honeypots
Jayant Gandhi
 
PPTX
Honeypots
SARANYA S
 
DOC
Honeypot seminar report
Inder NeGi
 
PPTX
honey pots introduction and its types
Vishal Tandel
 
PPT
Honeypot
Akhil Sahajan
 
PPTX
Honeypot
Chandrak Trivedi
 
PPT
Ruby On Rails
iradarji
 
PPTX
Firewall dan honeypot
Agus Mungkinkah
 
PDF
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Hackfest Communication
 
PPTX
Honey Potz - BSides SLC 2015
Ethan Dodge
 
PPTX
Computing (cloude & grid) & honey pots
Varun Sharma
 
PPTX
Honeypots - November 8th Misec presentation
Tazdrumm3r
 
PDF
Intrusion detection and prevention system for network using Honey pots and Ho...
Eng. Mohammed Ahmed Siddiqui
 
Honeypots
Jayant Gandhi
 
Honeypots
SARANYA S
 
Honeypot seminar report
Inder NeGi
 
honey pots introduction and its types
Vishal Tandel
 
Honeypot
Akhil Sahajan
 
Honeypot
Chandrak Trivedi
 
Ruby On Rails
iradarji
 
Firewall dan honeypot
Agus Mungkinkah
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Hackfest Communication
 
Honey Potz - BSides SLC 2015
Ethan Dodge
 
Computing (cloude & grid) & honey pots
Varun Sharma
 
Honeypots - November 8th Misec presentation
Tazdrumm3r
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Eng. Mohammed Ahmed Siddiqui
 
Ad

Similar to Honeypots (20)

PPTX
Honeypot2
KirtiGoyal25
 
PDF
honeypots-140921060716-phpapp01 (1).pdf
Poooi2
 
PDF
Honeypots for Network Security
Kirubaburi R
 
PPT
Honeypot
KirtiGoyal25
 
PDF
Honeypot- An Overview
IRJET Journal
 
PDF
IRJET- A Review on Honeypots
IRJET Journal
 
PPT
Honeypots.ppt
BhanuriBharathkumar
 
PPT
Description on Honeypots in Cyber Security
SumaiyaSk
 
PPTX
Honeypots and honeynets
Rasool Irfan
 
PPTX
honeypots-140921060716-phpapp01 (1).pptx
Poooi2
 
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
PDF
Olll
nannukaur
 
DOC
Honeypot Essentials
Anton Chuvakin
 
DOCX
Honeypots
Jyoti Nagargoje
 
PPTX
honeypotss.pptx
Poooi2
 
PPTX
Tushar mandal.honeypot
tushar mandal
 
PDF
M0704071074
IJERD Editor
 
PDF
Honeypots
Bilal ZIANE
 
PPTX
honeypots-1409210990716-phpapp01 (2).pptx
Poooi2
 
Honeypot2
KirtiGoyal25
 
honeypots-140921060716-phpapp01 (1).pdf
Poooi2
 
Honeypots for Network Security
Kirubaburi R
 
Honeypot
KirtiGoyal25
 
Honeypot- An Overview
IRJET Journal
 
IRJET- A Review on Honeypots
IRJET Journal
 
Honeypots.ppt
BhanuriBharathkumar
 
Description on Honeypots in Cyber Security
SumaiyaSk
 
Honeypots and honeynets
Rasool Irfan
 
honeypots-140921060716-phpapp01 (1).pptx
Poooi2
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Olll
nannukaur
 
Honeypot Essentials
Anton Chuvakin
 
Honeypots
Jyoti Nagargoje
 
honeypotss.pptx
Poooi2
 
Tushar mandal.honeypot
tushar mandal
 
M0704071074
IJERD Editor
 
Honeypots
Bilal ZIANE
 
honeypots-1409210990716-phpapp01 (2).pptx
Poooi2
 

More from Presentaionslive.blogspot.com (20)

PPSX
Cloud Computing Introduction
Presentaionslive.blogspot.com
 
PPT
Network security
Presentaionslive.blogspot.com
 
PPT
Mobile computing
Presentaionslive.blogspot.com
 
PPT
Grid computing
Presentaionslive.blogspot.com
 
PPT
Networksecurity&cryptography
Presentaionslive.blogspot.com
 
PPT
Brain computer interface
Presentaionslive.blogspot.com
 
PPT
Information Security
Presentaionslive.blogspot.com
 
DOC
4g magic communication
Presentaionslive.blogspot.com
 
PPT
Steganography
Presentaionslive.blogspot.com
 
PPT
Spattern matching using biometric techniques
Presentaionslive.blogspot.com
 
PPT
Novel architecture
Presentaionslive.blogspot.com
 
PPT
Neural networks
Presentaionslive.blogspot.com
 
PPT
Multimedia and gaming
Presentaionslive.blogspot.com
 
PPTX
Ethical hacking
Presentaionslive.blogspot.com
 
PPT
A multimodal interaction framework for pervasive game applications
Presentaionslive.blogspot.com
 
PPT
1 spattern matching using biometric techniques
Presentaionslive.blogspot.com
 
PPT
Unique p mail-addressing 97-03
Presentaionslive.blogspot.com
 
PPT
Brain Computer Interface
Presentaionslive.blogspot.com
 
Cloud Computing Introduction
Presentaionslive.blogspot.com
 
Network security
Presentaionslive.blogspot.com
 
Mobile computing
Presentaionslive.blogspot.com
 
Networksecurity&cryptography
Presentaionslive.blogspot.com
 
Brain computer interface
Presentaionslive.blogspot.com
 
Information Security
Presentaionslive.blogspot.com
 
4g magic communication
Presentaionslive.blogspot.com
 
Spattern matching using biometric techniques
Presentaionslive.blogspot.com
 
Novel architecture
Presentaionslive.blogspot.com
 
Multimedia and gaming
Presentaionslive.blogspot.com
 
A multimodal interaction framework for pervasive game applications
Presentaionslive.blogspot.com
 
1 spattern matching using biometric techniques
Presentaionslive.blogspot.com
 
Unique p mail-addressing 97-03
Presentaionslive.blogspot.com
 
Brain Computer Interface
Presentaionslive.blogspot.com
 

Recently uploaded (20)

PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
CDH. pptx
AneetaSharma15
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 

Honeypots

  • 2. AbstractIt deals with and explores the fascinating world of Honey pots.
  • 3. It describes a security tool and concept known as a Honey pot and Honeynet.
  • 4. Honey Pots and Honeynets are digital network bait, and through deception, they are designed to actually attract intruders.OUTLINEHONEYPOT
  • 8. LIMITATIONSHONEYPOTSA honey pot is a computer system on the internet that is expressively set up to attract and trap people who attempt to penetrate other people’s computer Systems.
  • 9. This includes the hacker, cracker, and script.
  • 10. They have multiple uses, such as prevention, detection, or information gathering. DESIGN CONCEPT
  • 11. Classification of Honeypots1.Production Honeypots Those used to protect organizations in real production operating environments.2.Research Honeypots. They represent educational resources of demonstrative and research nature whose objective is centered towards studying all sorts of attack patterns and threats.
  • 12. NETWORK WIRING MECHANISMSFigure 1Figure 1 - Honey net with one honey pot and management host using a shared networkAll cables shown as green are standard twisted pair cables.
  • 13. 2 Hubs or switches are used to connect interfaces together, along with 5 cables.
  • 14. The management host only needs to have one network interface.Figure 2 Figure 2 - Honey net with two honeypots and management host using a shared networkThe above figure extends the design to include multiple honeypots off the internal interface of the honey wall.
  • 15. This design, while simple and easy to understand, also has some serious security implications on the outside of the honey wall. Figure 3 Figure 3 - Honey net with one honey pot and management host and direct connectionsAll cables shown in green are standard twisted pair cables.
  • 16. All cables shown in red are cross-over twisted pair cables.
  • 17. Cross-over cables eliminate the need to use hubs or switches to connect two 10 Base- t interfaces together. Figure 4Fig: Honey net with two honeypots on a shared network and management host using a direct connectionThe main benefit to these last two configurations is that communication between the honey wall and the management host is entirely segregated (and thus hidden) from the shared network on the left.ADVANTAGESThey are designed to capture anything that interacts with them, including tools or tactics never seen before.
  • 18. This means that resources can be minimum and still enough to operate a powerful platform to operate at full scale.
  • 19. A computer running with a Pentium Processor with 128 Mb of RAM can easily handle an entire network. LIMITATIONSThey can only scan and capture activity destined to interact directly with them.
  • 20. They do not capture information related to attacks destined towards neighboring systems
  • 21. Inherently, the use of any security technology implies a potential risk. Honeypots are no different because they are also subject to risks. FUTURE PLANSThe future plans are to make the Honey net deployment and management easy.
  • 22. In next phase the Honey net Project would be releasing a bootable CDROM that will boot into a Honey net gateway or Honey wall.
  • 23. The bootable gateway would have all the Data Control and Data Capture mechanisms as defined above. CONCLUSIONHoneypots have tremendous potential for the security community, and they can accomplish goals few other technologies can.
  • 24. Like any new technology, they have some challenges to overcome.
  • 25. Most likely none of these problems will ever be completely solved or eliminated.
  • 26. However, expect to see in the next 12 to 18 months many new developments that help address these, and other issues.ANY QUIRIES…?For Documentation and Downloads Visit