Data Security Using Honey Pot System
#4
presented by:
M.AMULYA

[attachment=9014]
NETWORK SECURITY USING HONEYPOTS
ABSTRACT

Honeypots are an exciting new technology. They allow us to turn the tables on the bad guys. In the past several years there has been growing interest in exactly what this technology is and how it works.
A honeypot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and computerized to gain more information about the attacker, and used tools. One goal of this paper is to show the possibilities of honeypots and their use in research as well as productive environment.
Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as each observed traffic is suspicious, because no productive components are running in the system.
INTRODUCTION:
Global communication is getting more important everyday. At the same time, computer crimes increasing. countermeasures are developed to detect or prevent attacks-most of these measurers are based on known facts, known attack patterns. As in the military, it is important to know, who your enemy is, what kind of strategy he uses, what tools he utilizes and what he is aiming for. Gathering this kind of information is not easy but important. By knowing attack strategies, countermeasures can be improved and vulnerabilities can be fixed. To gather as much information as possible is one main goal of honeypot.
A honeypot is primarily an instrument for the information gathering and learning. Its primary purpose is not to be ambush for the blackhat community to catch them in action and to press charges against them. The lies on silent collection of as much information as possible about their attack patterns, used programs, purpose of attack and blackhat community itself. All this information is used to learn more about the blackhat proceedings and motives as well as their technical knowledge and abilities. This is just primary purpose if honeypot. There are a lot of other possibilities for a honeypot-divert hackers form productive systems for catch a hacker while conducting an attack are just two possible examples.
Honeypots are not the perfect solution for solving or preventing computer crimes. Honeypots are hard to maintain and they need the good knowledge about the operating systems and network security. In the right hands honeypot is effective tool for the information gathering. In the wrong, unexperienced hands, a honeypot can become another infiltrated machine and an instrument for the black hat community.
HONEYPOT BASICS:
A honeypot is a resource whose value is being in attacked and compromised. This means, that a honeypot is expected to get probed, attacked and potentially exploited.
Honeypot do not fix anything. They provide us additional, valuable information.
A honeypot is a resource, which pretends to be real target. A honeypot is expected to be attacked or compromised. The main goals are the distraction of an attacker and the gain of the information about the attack and the attacker.
Value of honeypots:
There are two categories of honeypots.
 Production honeypots
 Research honeypots
A production honeypot is used to help migrate risk in an organization while the second category, is meant to gather as much information as possible. These honeypots do not add any security value to an oraganition, but they can help to understand the blackhat community and their attacks as well as to build some better defenses against security threats. A properly constructed honeypot is put on a network, which closely monitors the traffic to and from the honeypot. This data can be used for a variety of purposes.
 Forensicsanalyzing new attacks and exploits
 Trend analysislook for changes over time of types of attacks,techniques,etc
 Identificationtrack the bad guys back to their home machines to figure out who they are.
 Sociologylearn about the bad guys as a group by snooping on email,IRC traffic,etc which happens to traverse the honeypot.
In general every traffic from and to a honeypot is unauthorized activity. All the data that is collected by a honeypot is therefore interested data. Data collected by the honeypot is of high value, and can lead to better understanding and knowledge which in turn can help to increase overall network security. One can also argue that a honeypot can be used for prevention because it can deter attackers from attacking other systems by occupying them long enough and bind their resources.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: introduction to data security using honey pot system, data security using honey pot system,
Popular Searches: honey pots ppt, data security in honey pot system source code in c, seminar honey pots, honey pot computer, honey computers, honey pot club, top 10 song of honey,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Data Security Using Honey Pot System - by seminar class - 23-02-2011, 12:43 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,086 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 831 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Exploiting the Functional and Taxonomic Structure of Genomic Data by Probabilistic To 1 768 14-02-2017, 04:15 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,853 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,672 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,836 06-11-2015, 02:27 PM
Last Post: seminar report asees
  DATA LEAKAGE DETECTION project topics 16 13,124 31-07-2015, 02:59 PM
Last Post: seminar report asees
  INTELLECTUAL INFORMATION SYSTEM USING GPS+GSM smart paper boy 3 2,005 10-04-2015, 09:52 AM
Last Post: seminar report asees
  Security system using IP camera mechanical engineering crazy 5 4,377 16-03-2015, 02:52 PM
Last Post: seminar report asees

Forum Jump: