What is Honeypot? Types of Honeypot!!

 

What is Honeypot?

 

  • A honeypot is a computer system on the Internet intended to attract and trap those who attempt unauthorized or illicit utilization of the host system to penetrate an organization's network
  • It is a fake proxy run to frame attackers by logging traffic through it and then sending complaints to the victims' ISPs
  • It has no authorized activity or production value, and any traffic to it is like a probe, attack, or compromise.
  • Whenever there is any interaction with a honeypot, it is most likely to be malicious
  • Honeypots are unique; they do not solve a specific problem
    • Instead, they are highly flexible tools with many different security applications
  • Honeypots help in preventing attacks, detecting attacks, and information gathering and research.
  • A honeypot can log port access attempts or monitor an attacker's keystroke
    • these could be early warnings of a more concerted attack.
  • It requires a considerable amount of effort to maintain a honeypot

 

Example of Honeypot :

Image 1

Types of Honeypot

 

Classification of honeypots based on their design criteria :

  • Low-Interaction Honeypots
    • These honeypots simulate only a limited number of services and applications of a target system or network
  • Medium-Interaction Honeypots
    • These honeypots simulate a real-life operating system, applications, and services of a target network
  • High-Interaction Honeypots
    • These honeypots simulate all services and applications of a target network
  • Pure Honeypots
    • These honeypots emulate the real production network of a target organization

Classification of honeypots based on their deployment strategy:

  • Production Honeypot
    • Deployed inside the production network of the organization along with other production servers.
    • effectively capture only a limited amount of information related to the adversaries
    • Fall under the low-interaction honeypot category
    • employed by large organizations and corporations
    • help to find internal flaws and attackers within an organization
  • Research Honeypot
    • high-interaction honeypots
    • deployed by research institutes, governments, or military organizations
      • to gain detailed knowledge about the actions of intruders.
    • security analysts can obtain in-depth information about how an attack is performed, vulnerabilities are exposed, and attack techniques and methods are used by the attacks
    • This analysis, help organization to improve attack prevention, detection, and security mechanism and develop a more secure network infrastructure
    • Drawback: do not contribute to the direct security of the company

Classification of honeypots based on their deception technology :

  • Malware Honeypots
    • to track malware campaigns or malware attempts over the network infrastructure
    • simulated with known vulnerabilities
      • such as outdated APIs, vulnerable SMBv1, protocols, etc
    • Also emulate different trojans, viruses, and backdoors
    • Lure attacker or malware into performing attacks, from which the attack pattern, malware signatures, and malware threat actors can be identified effectively
  • Spam Honeypots
    • Target spammers who abuse vulnerable resources such as ⇒
      • open mail relays and open proxies
    • consist of mail servers ⇒ that accept emails from any random source from the internet
  • Spider Honeypots
    • also called spider traps
    • trap web crawlers and spiders
  • Database Honeypots
    • employ fake databases that are vulnerable to perform database-related attacks such as SQL Injection and database enumeration
    • These fake databases trick the attackers by making them think that this database contains crucial sensitive information but in actual these details are fake
  • Email Honeypots
    • also called email traps
    • fake email addresses ⇒ used to attract fake and malicious emails from adversaries
    • fake email IDs will be distributed across the open internet and dark web to lure threat actors into performing
      • various malicious activities to exploit the organization
    • we constantly monitor the incoming mails
  • Honeynets
    • are a network of honeypots
    • very effective in determining the entire capabilities of the adversaries
    • mostly deployed in an isolated virtual environment along with a combination of vulnerable servers

Thanks for reading

To Your Success,

Aman yadav


#honeypots #technology #tech  #trending #cybersecurity


Post a Comment

0 Comments