srikanth

13
Honeypots

Upload: kondalarao7

Post on 11-May-2015

368 views

Category:

Technology


6 download

TRANSCRIPT

Page 1: Srikanth

Honeypots

Page 2: Srikanth

Definition

Any security resource who’s value lies in being probed, attacked, or

compromisedHow honeypots work

• Simple concept• A resource that expects no data,

so any traffic to or from it is most likely unauthorized activity

Page 3: Srikanth

Types

• Production (Law Enforcment)• Research (Counter-Intelligence)

• What is the value of honeypots?• One of the greatest areas of confusion

concerning honeypot technologies.

Value

Page 4: Srikanth

Advantages

• Based on how honeypots conceptually work, they have several advantages.– Reduce False Positives and False

Negatives– Data Value– Resources– Simplicity

Page 5: Srikanth

Disadvantages• Based on the concept of

honeypots, they also have disadvantages:– Narrow Field of View– Risk

Production

• Prevention• Detection• Response

Page 6: Srikanth

Prevention

• Keeping the burglar out of your house.• Honeypots, in general are not effective

prevention mechanisms.• Deception, Deterence , Decoys, are

phsychological weapons. They do NOT work against automated attacks:– worms– auto-rooters– mass-rooters

Page 7: Srikanth

Detection

• Detecting the burglar when he breaks in.

• Honeypots excel at this capability, due to their advantages.

Page 8: Srikanth

Response

• Honeypots can be used to help respond to an incident.– Can easily be pulled offline (unlike

production systems.– Little to no data pollution.

Page 9: Srikanth

Research Honeypots

• Early Warning and Prediction• Discover new Tools and Tactics• Understand Motives, Behavior,

and Organization• Develop Analysis and Forensic

Skills

Page 10: Srikanth

Level of Interaction

• Level of Interaction determines amount of functionality a honeypot provides.

• The greater the interaction, the more you can learn.

• The greater the interaction, the more complexity and risk.

Page 11: Srikanth

Low Interaction

• Provide Emulated Services• No operating system for attacker

to access.• Information limited to

transactional information and attackers activities with emulated services.

Page 12: Srikanth

High Interaction

• Provide Actual Operating Systems• Learn extensive amounts of

information.• Extensive risk.

Page 13: Srikanth

Thank you for this opportunity