90 likes | 218 Vues
This seminar assignment delves into the concept of honeypots, emphasizing their architecture as a network intrusion detection tool, inspired by the Honeynet Project. Honeypots serve as decoy systems to detect unauthorized and illicit activities, helping organizations learn about hacker motivations while enhancing computer and network security. We discuss low and high interaction honeypots, their use cases, and the inherent risks involved, including limited information capture and potential complexity in deployment. Key references include works by Lance Spitzner and the HKSAR government.
E N D
Forensic Computing: Tools, Techniques and Investigations Assignment 1 Seminar
Honeypot research and decision By Group 1H Wang Chung NG, Rayson
Agenda • Introduction • Background • Concepts • Use cases • Risks • References
Introduction • Honeypot is a technique that • Same as decoy-based intrusions-detections • Used in many enterprises • No production value • Honeypot is a system architecture (network) that • Developed by Honeynet Project • “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.” by Lance Spitzner, 2003
Background • It was developed for learning hackers/crackers skills and motivations • It is used to trap the perpetrators. • Computer and Network security issues
Concepts • To detect and log traffics and activities happened in the system • Can be a countermeasure to some attacks • Types • Low-interaction (LI) / Virtual • High-interaction (HI) / Physical • Aims • Production • Research
Use cases • Façades (LI) • Behave as real system/application • Sacrificial Lambs (HI) • Uses existing system • Uses network sniffer to collect data
Risks • LI • Captures limited amounts of information • Can only detect known type attacks • HI • Can be complex to install or deploy • Increased risk, as attackers are provided real operating systems to interact with
References • http://www.spitzner.net/honeypots.html, Lance Spitzner, 2003 • http://www.infosec.gov.hk/tc_chi/technical/files/honeypots.pdf, HKSAR government, 2008 • http://articles.techrepublic.com.com/5100-10878_11-5195024.html, Brien M. Posey MCSE, 2004