wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Honeypot in cyber security

profile
Priya Pandey
Sep 15, 2023
0 Likes
0 Discussions
134 Reads

 

Honeypots are the devices or system that are deployed to trap attackers attempting to gain unauthorized access to the system or network as they are deployed in an isolated environment and being monitored. Typically, honeypots are deployed in DMZ (demilitarized zone)and configured identically to a server. Any probe, malware, infection, the injection will be immediately detected by this way as honeypots appear to be a legitimate part of the network.Honeypots are a type of deception technology that allows you to understand attacker behavior patterns. Security teams can use honeypots to investigate cybersecurity breaches to collect intel on how cybercriminals operate. They also reduce the risk of false positives, when compared to traditional cybersecurity measures, because they are unlikely to attract legitimate activity.

Honeypots vary based on design and deployment models, but they are all decoys intended to look like legitimate, vulnerable systems to attract cybercriminals.

Types of Honeypots

1. High-Interaction Honeypots

High-Interaction Honeypots are configured with a verity of services which is basically enabled to waste the time of an attacker and gain more information from this intrusion. Multiple honeypots can be deployed on a single physical machine to be restored if attacker even compromised the honeypot.

2. Low-Interaction Honeypots

Low-Interaction Honeypots are configured to entertain only the services that are commonly requested by the users. Response time, less complexity and few resources make Low-interaction honeypot deployment more easy as compared to High-interaction honeypots.

Detecting Honeypots

The basic logic of detecting a honeypot in a network is by probing the services. The attacker usually crafts a malicious packet to scan running services on the system and open and closed ports information. These services may be HTTPS, SMTPS or IMAPS or else. Once attacker extracts the information, it can attempt to build a connection, the actual server will complete the process of three-way handshaking but the deny of handshaking indicates the presence of a honeypot. Send-Safe Honeypot Hunter, Nessus,and Hping tools can be used to detect honeypots.

What is the difference between a firewall and a honeypot?

A firewall is designed to keep the attackers out of the network whereas honeypots are designed to entice the hackers to attack the system. This is done so that a security researcher can know how hackers operate and can know which systems and ports the hackers are most interested in.

Honeypot Limitations

Honeypot security has its limitations as the honeypot cannot detect security breaches in legitimate systems, and it does not always identify the attacker. There is also a risk that, having successfully exploited the honeypot, an attacker can move laterally to infiltrate the real production network. To prevent this, you need to ensure that the honeypot is adequately isolated.

To help scale your security operations, you can combine honeypots with other techniques. For example, the canary trap strategy helps find information leaks by selectively sharing different versions of sensitive information with suspected moles or whistleblowers.

There are many applications and use cases for honeypots, as they work to divert malicious traffic away from important systems, get an early warning of a current attack before critical systems are hit, and gather information about attackers and their methods.

Here are some Honeypot Tool:-

1)KFSensor

2)SPECTER

3)PatriotBox

4)HIHAT


Comments ()


Sign in

Read Next

The New Rules of UI/UX Design Every Website Must Follow in 2026

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Cyber Security Control

Blog banner

Remote Work in 2026

Blog banner

Fault Tolerance

Blog banner

K-means use cases

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

Education: Key to your Prosperity

Blog banner

Race Condition

Blog banner

Texting is actually better than talking in person

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Security in Cloud Computing

Blog banner

VIRTUAL MACHINES

Blog banner

Python as a tool for data analysis

Blog banner

Android Flashlight Application

Blog banner

Device driver

Blog banner

Kernel in Operating System

Blog banner

Brain wash of social media

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Excel records

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

(Input/Output) in os

Blog banner

Platonic Solids

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Social Media Marketing Trends 2022

Blog banner

Uniprocessor Scheduling

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

12 Principles of Animation

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

IP Address

Blog banner

This too shall pass

Blog banner

Paginng In OS

Blog banner

5 Common Faults In Construction Tenders

Blog banner

How Men and Women Process Pain Differently

Blog banner

Odoo

Blog banner