Friday, April 22, 2011

Honey pots

  • It is a decoy system designed to lure potential attackers away from the critical systems.
  • They are designed to
    • divert an attacker from accessing critical systems.
    • collect information about the hackers activity.
    • encourage the attacker to stay on the system long enough for administrators to document the event and perhaps respond.
  • If this not properly controlled this is vulnerable to attacks from attackers.
  • There are two types of honey pot
    1. production honey pot - for companies, not much information about attackers.
    2. research honey pot - research organizations use this to gather information about attackers.
  • Now there are honey pot detection system. attackers use this to detect honey pots.