- It is a decoy system designed to lure potential attackers away from the critical systems.
- They are designed to
- divert an attacker from accessing critical systems.
- collect information about the hackers activity.
- encourage the attacker to stay on the system long enough for administrators to document the event and perhaps respond.
- If this not properly controlled this is vulnerable to attacks from attackers.
- There are two types of honey pot
- production honey pot - for companies, not much information about attackers.
- research honey pot - research organizations use this to gather information about attackers.
- Now there are honey pot detection system. attackers use this to detect honey pots.
Friday, April 22, 2011
Honey pots
Subscribe to:
Posts (Atom)