Types of Honeypot Classification of honeypots based on their design criteria : - Low-Interaction Honeypots
- These honeypots simulate only a limited number of services and applications of a target system or network
- Medium-Interaction Honeypots
- These honeypots simulate a real-life operating system, applications, and services of a target network
- High-Interaction Honeypots
- These honeypots simulate all services and applications of a target network
- Pure Honeypots
- These honeypots emulate the real production network of a target organization
Classification of honeypots based on their deployment strategy: - Production Honeypot
- Deployed inside the production network of the organization along with other production servers.
- effectively capture only a limited amount of information related to the adversaries
- Fall under the low-interaction honeypot category
- employed by large organizations and corporations
- help to find internal flaws and attackers within an organization
- Research Honeypot
- high-interaction honeypots
- deployed by research institutes, governments, or military organizations
- to gain detailed knowledge about the actions of intruders.
- security analysts can obtain in-depth information about how an attack is performed, vulnerabilities are exposed, and attack techniques and methods are used by the attacks
- This analysis, help organization to improve attack prevention, detection, and security mechanism and develop a more secure network infrastructure
- Drawback: do not contribute to the direct security of the company
Classification of honeypots based on their deception technology : - Malware Honeypots
- to track malware campaigns or malware attempts over the network infrastructure
- simulated with known vulnerabilities
- such as outdated APIs, vulnerable SMBv1, protocols, etc
- Also emulate different trojans, viruses, and backdoors
- Lure attacker or malware into performing attacks, from which the attack pattern, malware signatures, and malware threat actors can be identified effectively
- Spam Honeypots
- Target spammers who abuse vulnerable resources such as ⇒
- open mail relays and open proxies
- consist of mail servers ⇒ that accept emails from any random source from the internet
- Spider Honeypots
- also called spider traps
- trap web crawlers and spiders
- Database Honeypots
- employ fake databases that are vulnerable to perform database-related attacks such as SQL Injection and database enumeration
- These fake databases trick the attackers by making them think that this database contains crucial sensitive information but in actual these details are fake
- Email Honeypots
- also called email traps
- fake email addresses ⇒ used to attract fake and malicious emails from adversaries
- fake email IDs will be distributed across the open internet and dark web to lure threat actors into performing
- various malicious activities to exploit the organization
- we constantly monitor the incoming mails
- Honeynets
- are a network of honeypots
- very effective in determining the entire capabilities of the adversaries
- mostly deployed in an isolated virtual environment along with a combination of vulnerable servers
|
|
0 Comments