computer science crazy|
Joined: Dec 2008
24-02-2009, 01:08 AM
A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource. A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating systems require specialized hardware and every honeypot requires its own physical system. Honeypots are a powerful, new technology with incredible potential. They can do everything from detecting new attacks never seen in the wild before, to tracking automated credit card fraud and identity theft. In the past several years the technology is rapidly developing, with new concepts such as honeypot farms, commercial and open source solutions, and documented findings released. A great deal of research has been focused on identifying, capturing, and researching external threats. While malicious and dangerous, these attacks are often random with attackers more interested in how many systems they can break into then which systems they break into. To date, limited research has been done on how honeypots can apply to a far more dangerous and devastating threat, the advanced insider. This trusted individual knows networks and organization. Often, these individuals are not after computers, but specific information. This is a risk that has proven far more dangerous, and far more difficult to mitigate.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
project report tiger|
Active In SP
Joined: Feb 2010
13-02-2010, 04:42 PM
please read topicideashow-to-honeypots-seminar and presentation-report for getting seminar and presentation report of honeypot
Active In SP
Joined: Feb 2012
03-04-2012, 11:52 AM
to get information about the topic "honeypots" full report ppt and related topic refer the link bellow
topicideashow-to-honeypots-seminar and presentation-report
topicideashow-to-honeypots-seminar and presentation-report?pid=37901
topicideashow-to-honeypots-seminar and presentation-report?page=6
topicideashow-to-honeypots-seminar and presentation-report?page=4
Joined: Apr 2012
04-07-2012, 04:06 PM
HONEYPOTS.ppt (Size: 445.5 KB / Downloads: 35)
Who is a Hacker?
A Hacker is a person who tries to gain unauthorized access to a network.
How a hacker affect a server?
Steals confidential data.
Imposes someone else.
Causes loss of resources.
Sometimes causes even hardware loss.
What are the security issues?
To provide secure connection between the client and the server.
E.g. email service provided by various web-sites.
How Hackers work
Gathers information about the server
Chooses the weakest link
Start exploiting that link
Definition of Honeypots
A honeypot is a security resource whose value is in being probed, attacked or compromised .
HoneyPots are not a single tool but a highly flexible technology.
HoneyPots come in variety of shapes and sizes.everything from a simple windows system emulating a few services to an entire network of production systems waiting to be hacked !!!
HoneyPots have a variety of values.everything from a burglar alarm that detects an intruder to a research tool that can be used to study the motives of the black hat community !!!
THEN WHY USE HONEYPOTS ?
At the end of year 2000, the life expectancy of a default installation of Red Hat 6.2 was less than 72 hrs !
One of the fastest recorded times a HoneyPot was compromised was 15 min. This means that within 15 min of being connected to the internet, the system was found, probed, attacked, and successfully exploited by the attacker! The record for capturing a worm was 90 sec !!
During an 11 month period (Apr 2000 – Mar 2001), there was a 100% increase in IDS alerts based on Snort.
In the beginning of 2002, a home network was scanned on an average by three different systems a day.
The year 2001 saw a 100% increase in reported incidents from 21,756 to 52,658 reported attacks.
Honeypots are good resources for tracing hackers.
The value of Honeypots is in being Hacked.
Honeypots have their own pros and cons and this technology is still developing.
Joined: Apr 2012
16-07-2012, 01:31 PM
honeypot.pptx (Size: 653.81 KB / Downloads: 23)
What is a Honeypot
A honeypot is a resource which pretends to be a real target. A honeypot is expected to be attacked or compromised. The main goals are the distraction of an attacker and the gain of information about an attack and the attacker.
A honeypot therefore is a system which is acting as a potential target for an attacker.
Concept of Honeypots
Has no production value; anything going to/from a honeypot is likely a probe, attack or compromise
All traffic is suspicious as there shouldn’t be any traffic because nobody knows of the system, no productive services are running and the system is not involved in “normal” activities.
Detecting new kind of attacks, retrieving new hacker tools or to get a better knowledge about the attackers, their background, activities and goals.
Developing new IDS signatures, analyze new attack tools or detect new ways of hidden communications or distributed denial of service (DDoS) tools.
Level of Involvement
They are listening on a certain port for incoming connections.
All packets are logged & no answer to the request is sent.
Low involvement honeypots have no interaction with the attacker. No traffic is ever leaving the honeypot – It’s a simple logging machine.
Mid involvement honeypots also listen on different ports. But in contradiction to low involvement they send information back to the attacker.
A request is answered and the attacker has the possibility to issue commands.
In most cases, the provided commands are
|Possibly Related Threads...|
|Honey pot||seminar projects crazy||3||3,082||
30-01-2012, 10:28 AM
Last Post: seminar addict
|Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks||seminar addict||0||463||
20-01-2012, 12:32 PM
Last Post: seminar addict