1 / 8

Honeypots

Honeypots. By Merkur Maclang and John Luzzi CMPT 495. What is a Honeypot?. A computer system open to attackers. Honeypot Positioning. Considerations. What do you want out of it? How should the network environment be established?. Legal Issues.

Download Presentation

Honeypots

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Honeypots By Merkur Maclang and John Luzzi CMPT 495

  2. What is a Honeypot? • A computer system open to attackers

  3. Honeypot Positioning

  4. Considerations • What do you want out of it? • How should the network environment be established?

  5. Legal Issues • U.S. state law adoption of the S-DMCA legislation, defining unlawful communication devices as “any communication device which is capable of facilitating the disruption of a communication service without the express consent of express authorization of the communication service provider.”

  6. Types of Honeypots • Diversionary ex. La Brea Tarpit: makes it look like there are more devices on the network than there really are • Confusion ex. Honeyd: OS deception tool that can obscure the true operating system and confuse attackers • Research ex. Tiny HoneyPot: similar to La Brea but includes IDS software Snort

  7. Correct Implementations • Not a toy! Know what you are doing • Keep up to date • Secure it

  8. References Know Your Enemy: Honeynets in Universities http://www.honeynet.org/papers/edu/ SecurityDocs http://www.securitydocs.com/Intrusion_Detection/Honeypots HONEYPOTS REVEALED http://www.astalavista.com/data/honeypots.pdf Computer Network Defense http://www.networkintrusion.co.uk/honeypots.htm The Honey Net Project http://www.honeynet.org/ “How to build a Honeypot”; SysAdmin Sept 2003 Volume 12 – 9 http://sysadminmag.com

More Related