8
Honeypots By Merkur Maclang and John Luzzi CMPT 495

Honeypots

Embed Size (px)

DESCRIPTION

Honeypots. By Merkur Maclang and John Luzzi CMPT 495. What is a Honeypot?. A computer system open to attackers. Honeypot Positioning. Considerations. What do you want out of it? How should the network environment be established?. Legal Issues. - PowerPoint PPT Presentation

Citation preview

Page 1: Honeypots

Honeypots

By Merkur Maclang and John Luzzi

CMPT 495

Page 2: Honeypots

What is a Honeypot?

A computer system open to attackers

Page 3: Honeypots

Honeypot Positioning

Page 4: Honeypots

Considerations

What do you want out of it? How should the network environment be

established?

Page 5: Honeypots

Legal Issues

U.S. state law adoption of the S-DMCA legislation, defining unlawful communication devices as “any communication device which is capable of facilitating the disruption of a communication service without the express consent of express authorization of the communication service provider.”

Page 6: Honeypots

Types of Honeypots

Diversionaryex. La Brea Tarpit: makes it look like there are more devices on the network than there really are

Confusionex. Honeyd: OS deception tool that can obscure the true operating system and confuse attackers

Researchex. Tiny HoneyPot: similar to La Brea but includes IDS software Snort

Page 7: Honeypots

Correct Implementations

Not a toy! Know what you are doing Keep up to date Secure it

Page 8: Honeypots

References

Know Your Enemy: Honeynets in Universities http://www.honeynet.org/papers/edu/

SecurityDocs

http://www.securitydocs.com/Intrusion_Detection/Honeypots

HONEYPOTS REVEALED

http://www.astalavista.com/data/honeypots.pdf

Computer Network Defense

http://www.networkintrusion.co.uk/honeypots.htm

The Honey Net Project

http://www.honeynet.org/

“How to build a Honeypot”; SysAdmin Sept 2003 Volume 12 – 9

http://sysadminmag.com