0% found this document useful (0 votes)
40 views10 pages

Understanding Honeypots in Cybersecurity

Uploaded by

mittupathuri83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views10 pages

Understanding Honeypots in Cybersecurity

Uploaded by

mittupathuri83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Honey Pots

Definition
A honeypot is a security mechanism that creates a virtual trap
to lure attackers. An intentionally compromised computer
system allows attackers to exploit vulnerabilities so you can
study them to improve your security policies. You can apply
a honeypot to any computing resource from software and
networks to file servers and routers.
Types of Honeypot Deployments

Pure honeypots—complete production systems


1. that monitor attacks through bug taps on the
link that connects the honeypot to the network.

Low-interaction honeypots—imitate services


2. and systems that frequently attract criminal
attention.

High-interaction honeypots—complex
3. setups that behave like real production
infrastructure.
Benefits of Honeypots:
 Early detection of attacks: Honeypots can provide early warning of new or previously
unknown cyberattacks, allowing IT security teams to respond more quickly and
effectively.

 Improved security posture: They can significantly improve an organization’s security posture
by providing increased visibility and allowing IT security teams to defend against attacks the
firewall fails to prevent.

 Distraction for attackers: Honeypots are a valuable distraction for attackers. More time and
effort consumed with honeypots means less effort devoted to legitimate targets.

 Testing incident response processes: A honeypot helps organizations test their incident
response processes and identify areas for improvement.
Previous Records of Honeypots

State/Year 2019 2020 2021 2022

Andhra 30 75 100 420


Pradesh

Telangana 55 75 42 65

Maharashtra 75 80 95 115

Karnataka 109 85 92 132


Challenges and Limitations of
Honeypots:
Limited Scope: Honeypots only capture threats that interact with them. If attackers
target other parts of the network and avoid the honeypot, the threat may go undetected.

Maintenance: Honeypots require continuous updates to mimic real systems


convincingly.
Experienced attackers might easily recognize an outdated honeypot.

Potential misuse: If not properly isolated or secured, attackers can exploit honeypots as
a launch point for further network attacks.

False sense of security: Relying solely on honeypots might lead organizations to


overlook other essential security measures, leading to potential vulnerabilities.

Resource intensive: Setting up, managing, and analyzing data from honeypots can
be resource-intensive, requiring both time and expertise.

Risk of detection: Sophisticated attackers might recognize and avoid honeypots, making
them ineffective against advanced threats.
Honeypot Records Reported in Various states of India

reports recordered
1600

1439
1400 1342

1204
1200
1103
1023
996
1000

800

600

400

200

0
Andhra Pradesh Maharashtra Bihar Goa Telagana Uttar Pradesh
Conclusion

 While several companies have developed products to build deception


technology, including honeypots, researchers at the University of Texas at Dallas
have been researching where deception technology is going next.

 UT Dallas has developed the DeepDig (DEcEPtion DIGging) technique that


plants traps and decoys onto real systems before applying machine learning
techniques to better understand a malware attacker’s behavior.

 The technique is designed to use cyber-attacks as free sources of live training


data for machine learning-based intrusion detection systems (IDS).
References:

https://www.proofpoint.com/us/threat-reference/honeypot

https://www.imperva.com/learn/application-security/honeypot- ho
neynet/#:~:text=A%20honeypot%20is%20a%20security,to%20i
mprove%20your%20security%20policies.

https://www.geeksforgeeks.org/what-is-honeypot/

You might also like