Honeypots
Sneha Ranganathan Srinayani Guntaka Sharath Chandra Sarangpur
Introduction
A honeypot is a trap set to detect, deflect, or in some manner counteract
attempts at unauthorized use of information systems
They are the highly flexible security tool with different applications for
security. They don't fix a single problem. Instead they have multiple uses, such
as prevention, detection, or information gathering
A honeypot is an information system resource whose value lies in
unauthorized or illicit use of that resource
What is a Honey Pot?
• A Honey Pot is an intrusion detection technique used to study hackers
movements
What is a Honey Pot?(cont.)
• Virtual machine that sits on a network or a client
• Goals
 Should look as real as possible!
 Should be monitored to see if its being used to launch a massive
attack on other systems
 Should include files that are of interest to the hacker
Classification
By level of interaction
• High
• Low
By Implementation
• Virtual
• Physical
By purpose
• Production
• Research
Interaction
Low interaction Honeypots
• They have limited interaction, they normally work by emulating services and operating
systems
• They simulate only services that cannot be exploited to get complete access to the
honeypot
• Attacker activity is limited to the level of emulation by the honeypot
• Examples of low-interaction honeypots include Specter, Honeyd, and KFsensor
Interaction
High interaction Honeypots
• They are usually complex solutions as they involve real operating systems and
applications
• Nothing is emulated, the attackers are given the real thing
• A high-interaction honeypot can be compromised completely, allowing an adversary to
gain full access to the system and use it to launch further network attacks
• Examples of high-interaction honeypots include Symantec Decoy Server and Honeynets
• Physical
• Real machines
• Own IP Addresses
• Often high-interactive
• Virtual
• Simulated by other machines that:
– Respond to the traffic sent to the honeypots
– May simulate a lot of (different) virtual honeypots at the
same time
Implementation
• Production honeypots are easy to use, capture only limited information, and
are used primarily by companies or corporations
• Prevention
• To keep the bad elements out
• There are no effective mechanisms
• Deception, Deterrence, Decoys do NOT work against automated
attacks: worms, auto-rooters, mass-rooters
• Detection
• Detecting the burglar when he breaks in
• Response
• Can easily be pulled offline
Production
• Research honeypots are complex to deploy and maintain, capture extensive
information, and are used primarily by research, military, or government
organizations.
• Collect compact amounts of high value information
• Discover new Tools and Tactics
• Understand Motives, Behavior, and Organization
• Develop Analysis and Forensic Skills
Research
Advantages
• Small data sets of high value.
• Easier and cheaper to analyze the data
• Designed to capture anything thrown at them, including tools or
tactics never used before
• Require minimal resources
• Work fine in encrypted or IPv6 environments
• Can collect in-depth information
• Conceptually very simple
Disadvantages
• Can only track and capture activity that directly interacts with
them
• All security technologies have risk
• Building, configuring, deploying and maintaining a high-
interaction honeypot is time consuming
• Difficult to analyze a compromised honeypot
• High interaction honeypot introduces a high level of risk
• Low interaction honeypots are easily detectable by skilled attackers
Working of Honeynet – High – interaction honeypot
• Honeynet has 3 components:
 Data control
 Data capture
 Data analysis
Working of Honeyd – Low – interaction honeypot
 Open Source and designed to run on
Unix systems
 Concept - Monitoring unused IP space
Conclusion
• Not a solution!
• Can collect in depth data which no other technology can
• Different from others – its value lies in being attacked, probed or
compromised
• Extremely useful in observing hacker movements and preparing
the systems for future attacks
References
http://www.authorstream.com/Presentation/juhi1988-111469-ppt-
honeypot-honeypotppt1-science-technology-powerpoint/
http://www.tracking-hackers.com/papers/honeypots.html
http://en.wikipedia.org/wiki/Honeypot_%28computing%29
Thank you
Questions

More Related Content

PPT
Description on Honeypots in Cyber Security
PPT
Honeypot
PPTX
Honey po tppt
PPT
Honeypot
PPT
Honeypot
PPT
Honey Pot
DOCX
Honeypots
PPTX
Honeypot ss
Description on Honeypots in Cyber Security
Honeypot
Honey po tppt
Honeypot
Honeypot
Honey Pot
Honeypots
Honeypot ss

Similar to Honeypots.ppt (20)

PPT
Honeypot honeynet
PDF
Honeypots
PDF
Honeypots for Network Security
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PPTX
Honey pots
PPT
All about Honeypots & Honeynets
PPTX
honey pots introduction and its types
PPTX
Honeypot ppt1
PDF
Olll
PPTX
Honey pots
PPTX
Honeypots (Ravindra Singh Rathore)
PDF
IRJET-Detecting Hacker Activities using Honeypot
PDF
Honeypot- An Overview
PPTX
Honeypot a trap to hackers
PDF
IRJET- A Review on Honeypots
PPTX
PDF
M0704071074
Honeypot honeynet
Honeypots
Honeypots for Network Security
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Honey pots
All about Honeypots & Honeynets
honey pots introduction and its types
Honeypot ppt1
Olll
Honey pots
Honeypots (Ravindra Singh Rathore)
IRJET-Detecting Hacker Activities using Honeypot
Honeypot- An Overview
Honeypot a trap to hackers
IRJET- A Review on Honeypots
M0704071074
Ad

Recently uploaded (20)

PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
PDF
Laparoscopic Colorectal Surgery at WLH Hospital
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PPTX
Module on health assessment of CHN. pptx
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Farming Based Livelihood Systems English Notes
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Environmental Education MCQ BD2EE - Share Source.pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
Laparoscopic Colorectal Surgery at WLH Hospital
Literature_Review_methods_ BRACU_MKT426 course material
What’s under the hood: Parsing standardized learning content for AI
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Module on health assessment of CHN. pptx
CRP102_SAGALASSOS_Final_Projects_2025.pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
UNIT_2-__LIPIDS[1].pptx.................
Disorder of Endocrine system (1).pdfyyhyyyy
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
Cambridge-Practice-Tests-for-IELTS-12.docx
Farming Based Livelihood Systems English Notes
Everyday Spelling and Grammar by Kathi Wyldeck
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Ad

Honeypots.ppt

  • 1. Honeypots Sneha Ranganathan Srinayani Guntaka Sharath Chandra Sarangpur
  • 2. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems They are the highly flexible security tool with different applications for security. They don't fix a single problem. Instead they have multiple uses, such as prevention, detection, or information gathering A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource
  • 3. What is a Honey Pot? • A Honey Pot is an intrusion detection technique used to study hackers movements
  • 4. What is a Honey Pot?(cont.) • Virtual machine that sits on a network or a client • Goals  Should look as real as possible!  Should be monitored to see if its being used to launch a massive attack on other systems  Should include files that are of interest to the hacker
  • 5. Classification By level of interaction • High • Low By Implementation • Virtual • Physical By purpose • Production • Research
  • 6. Interaction Low interaction Honeypots • They have limited interaction, they normally work by emulating services and operating systems • They simulate only services that cannot be exploited to get complete access to the honeypot • Attacker activity is limited to the level of emulation by the honeypot • Examples of low-interaction honeypots include Specter, Honeyd, and KFsensor
  • 7. Interaction High interaction Honeypots • They are usually complex solutions as they involve real operating systems and applications • Nothing is emulated, the attackers are given the real thing • A high-interaction honeypot can be compromised completely, allowing an adversary to gain full access to the system and use it to launch further network attacks • Examples of high-interaction honeypots include Symantec Decoy Server and Honeynets
  • 8. • Physical • Real machines • Own IP Addresses • Often high-interactive • Virtual • Simulated by other machines that: – Respond to the traffic sent to the honeypots – May simulate a lot of (different) virtual honeypots at the same time Implementation
  • 9. • Production honeypots are easy to use, capture only limited information, and are used primarily by companies or corporations • Prevention • To keep the bad elements out • There are no effective mechanisms • Deception, Deterrence, Decoys do NOT work against automated attacks: worms, auto-rooters, mass-rooters • Detection • Detecting the burglar when he breaks in • Response • Can easily be pulled offline Production
  • 10. • Research honeypots are complex to deploy and maintain, capture extensive information, and are used primarily by research, military, or government organizations. • Collect compact amounts of high value information • Discover new Tools and Tactics • Understand Motives, Behavior, and Organization • Develop Analysis and Forensic Skills Research
  • 11. Advantages • Small data sets of high value. • Easier and cheaper to analyze the data • Designed to capture anything thrown at them, including tools or tactics never used before • Require minimal resources • Work fine in encrypted or IPv6 environments • Can collect in-depth information • Conceptually very simple
  • 12. Disadvantages • Can only track and capture activity that directly interacts with them • All security technologies have risk • Building, configuring, deploying and maintaining a high- interaction honeypot is time consuming • Difficult to analyze a compromised honeypot • High interaction honeypot introduces a high level of risk • Low interaction honeypots are easily detectable by skilled attackers
  • 13. Working of Honeynet – High – interaction honeypot • Honeynet has 3 components:  Data control  Data capture  Data analysis
  • 14. Working of Honeyd – Low – interaction honeypot  Open Source and designed to run on Unix systems  Concept - Monitoring unused IP space
  • 15. Conclusion • Not a solution! • Can collect in depth data which no other technology can • Different from others – its value lies in being attacked, probed or compromised • Extremely useful in observing hacker movements and preparing the systems for future attacks