Honey Pot
Honey Pot
Honey Pot
TRACKING HACKERS
By Nishesh
Bakshi
A WORD ON SECURITY
- Anonymous
Brief Background
• Who is a Hacker?
• Data Value
HoneyPots collect very little data, but they collect is
essentially of very high value.
HoneyNet project research group collects less than 1 MB
data per day !
• Resources
HoneyPots typically donot have problems of resource
exhaustion.
• Simplicity
No fancy algorithms to develop.
No signature databases to maintain.
No rule-bases to misconfigure !
DISADVANTAGES OF HONEYPOTS
• Fingerprinting
An incorrectly implemented HoneyPot can
identify itself and others of the same kind.
CLASSIFICATION OF HONEYPOTS
(1/2)
• WWW.SNORT.ORG
• WWW.HACKINGEXPOSED.COM
• WWW.INFOSECWRITERS.COM
• WWW.SECURITYFOCUS.COM
• WWW.SANS.ORG
• WWW.SPECTER.COM