Honey Pot
Honey Pot
Intro .
Honeypot is a very flexible within the computer system on the Internet that acts as a security tool. And to attract and trap people who wish to penetrate other computers through the scans and attacks are explored and used. This section includes the hackers, crackers and script programmer that are not clear their location in the world. Honeypots do not fix a security issue. It is interesting that this tool for detecting and preventingmisleading information through close and caref ul monitoring in order for hackers to hack something that is not being used.
copy right@2012
Why honeypot?
Honeypot remotes attackers from the most valuable network resources and protect your resources easier. Honey pot too early to attempt new attacks warns. IDS error may be wrong, while those who are hurting just achieve to honeypot because it is non-productive. Perhaps the most interesting advantage of honey is the CYA or hide the equipment. These systems can show that the design of your network security is effective . Enemy rcognition is another reason for the existing of the honeypot. (Techniques and rules)
copy right@2012
TYPES OF HONEYPOTS Interaction defines the level of activity a honeypot allows an attacker. Low-interaction honeypots It have limited interaction, they normally work by emulating services and operating systems. Examples of low-interaction honeypots include Specter, Honeyd, and KFSensor. High-interaction honeypots High-interaction honeypots are different; they are usually complex solutions as they involve real operating systems and applications. Nothing is emulated, the attackers are given the real thing. If one wants a Linux honeypot running an FTP. Examples of high-interaction honeypots include Symantec Decoy Server and Honeynets.
After a quick installation procedure, BOF presents you with a small configuration and viewing screen
Honeyd monitors unused IP space (1). When an attacker(2) probes an unused IP, Honeyd detects the probe, takes over that IP via ARP spoofing, then creates a virtual honeypot(3) for the attacker to interact with (Honeyd can create multiple virtual honeypots to fool attackers on all unused addresses). The attacker is fooled into thinking he is interacting wit a successful hacked system(4). In addition, Honeyd automatically updates its list of unused IPs as systems are added or removed from the network
VALUE OF HONEY POT We will take a more in-depth look athow a honeypot can work in all three.
1. Prevention : Honeypots can help prevent attacks in several ways. The first is against automated attacks, such as worms or auto-rooters. These attacks are based on tools that randomly scan entire networks looking for vulnerable systems. Honeypots can also be used to protect the organization from human attackers
Implementation
Honeypot Location A honeypot does not need a certain surrounding environment as it is a standard server with no special needs. A honeypot can be placed anywhere a server could be placed. But certainly, some places are better for certain approaches as others. . Placing a honeypot on the intranet can be useful if the detection of some bad guys inside a private network is wished If the main concern is the Internet, a honeypot can be placed at two locations: -In front of the firewall (Internet) -DMZ -Behind the firewall (intranet) The best solution would be to run a honeypot in its own DMZ, therefore with a preliminary firewall. The firewall could be connected directly to the Internet or intranet, depending on the goal. This attempt enables tight control as well as a flexible environment with maximal security.
FUTURE OF HONEYPOTS
Government projects: Currently honeypots are mainly used by organizations, to detect intruders within the organization as well as against external threats and to protect the organization. In future, honeypots will play a major role in the government projects, especially by the military, to gain information about the enemy, and those trying to get the government secrets. Ease of use: In future honeypots will most probably appear in prepackaged solutions, which will be easier to administer and maintain. People will be able to install and develop honeypots at home and without difficulty. Closer integration: Currently honeypots are used along with other technologies such as firewall, tripwire, IDS etc. As technologies are developing, in future honeypots will be used in closer integration with them. For example honeypots are being developed for WI-FI or wireless computers. However the development is still under research. Specific purpose: Already certain features such as honeytokens are under development to target honeypots only for a specific purpose. Eg: catching only those attempting credit card fraud etc
CONCLUSION
This paper has given an in depth knowledge about honeypots and their contributions to the security community. A honeypot is just a tool. How one uses this tool is upto them. Honeypots are in their infancy and new ideas and technologies will surface in the next time. At the same time as honeypots are getting more advanced, hackers will also develop methods to detect such systems. A regular arms race could start between the good guys and the blackhat community. Let s hope that such a technology will be used to restore the peace and prosperity of the world and not to give the world a devastating end.
Thank you all very much for taking the time to listen to this presentation
By AbdolMajid Shahgholi RN: 10031D6404 M.TECH, CNIS (SIT department ), JNTU HYDERABAD , INDIA [email protected] copy right@2012
24