-
Honeypot
- A honeypot is a computer security mechanism set to counteract attempts at unauthorized use of information systems.
- Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site, but is actually isolated and monitored, and that seems to contain information or a resource of value to attackers, who are then blocked.
-
Classification:
-
Honeypots can be classified based on their deployment:
-
Production Honeypots
- Easy to use, capture only limited information, and are used primarily by corporations.
- Production honeypots are placed inside the production network with other production servers by an organization to improve their overall state of security.
- Normally, production honeypots are low-interaction honeypots, which are easier to deploy.
- They give less information about the attacks or attackers than research honeypots.
-
Research Honeypots
- Run to gather information about the motives and tactics of the black hat community targeting different networks.
- These honeypots do not add direct value to a specific organization; instead, they are used to research the threats that organizations face and to learn how to better protect against those threats.
- Research honeypots are complex to deploy and maintain, capture extensive information, and are used primarily by research, military, or government organizations.
-
Based on design criteria, honeypots can be classified as:
-
Pure Honeypots
- Pure honeypots are full-fledged production systems.
- The activities of the attacker are monitored by using a bug tap that has been installed on the honeypot's link to the network.
- No other software needs to be installed.
- Even though a pure honeypot is useful, stealthiness of the defense mechanisms can be ensured by a more controlled mechanism.
-
High-Interaction Honeypots
- High-interaction honeypots imitate the activities of the production systems that host a variety of services.
- An attacker may be allowed to use services to waste their time.
- By employing virtual machines, multiple honeypots can be hosted on a single physical machine.
- Therefore, even if the honeypot is compromised, it can be restored more quickly.
- In general, high-interaction honeypots provide more security by being difficult to detect, but they are expensive to maintain.
-
Example:
- Honeynet
-
Low-Interaction Honeypots
- Low-interaction honeypots simulate only the services frequently requested by attackers.
- Since they consume relatively few resources, multiple virtual machines can easily be hosted on one physical system, the virtual systems have a short response time, and less code is required, reducing the complexity of the virtual system's security.
-
Example:
- Honeyd