Honeypot
Honeypot
Honeypot
Deparment of Computer Science,Shaheed Bhagat Singh State Technical Capmus, Ferozepur, India- Department of
Computer Science ,Arya bhatta Institte of Engineering and Technology, Barnala, India
I. INTRODUCTION
In the era of information and technology network security
has become the core issue in every organizational network.
Honeypots are integrated in network with firewall and
Intrusion detection systems to provide solid secure platform
to an organization. Firewall provide the filtering and
generate logs to further analyze any malicious activity or
any violation policy of access control list ,firewall rules.
Different approaches like firewall demilitarized zone (DMZ)
have been used but they are not effective for todays
network security . Intrusion detection systems then
introduced to overcome the shortcomings of existing
network. Intrusion detection system silently monitor the
networks traffic and give the alerts to tell about any kind of
intruders based upon the database of signatures of existing
intrusions. A number of issues were with IDS too as facing
with an increasing number of false negatives and false
positives[7]. Honeypots then introduced in the network to
utilize the networks unused IPs and the attackers behavior
is analysed on these honeypots. Honeypots improve IDS
too by decreasing the numbers of false positives.
With the integration honeypots network security accuracy
increases than the only implementation of network
Intrusion detection system. These are the increasing trends
in information security mechanism. For instance, the wellknown company Amazon possessing the worlds largest
database use database honeypots to deceicve attackers to
reach their actual honeypots.
A. Honeypots
Honeypot is a unique security resource which is a part of
security mechanism deployed in an organisation. These are
the resources you want the black hat guys to interact with.
Basically, honeypot is an IT resource whose value lies in an
unauthorized or its illicit use [14]. It means the value of
www.ijcsit.com
6098
Navneet Kambow et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6098-6101
High
interaction
honeypots
Honeypots
High
x
On the basis of
interaction
High
All
x
High
High
Very High
Sr.
no
On the basis of
purpose
Types of
Honeypots
1)low
interaction
honeypots.
2) Medium
interaction
honeypots
3)High
Interaction
honeypots
1) Research
honeypots.
2) Production
honeypots.
Example
Honeyd, Kippo
Dionea, Napenthes
Specter
A standalone PC having
any operating System
installed like Linux.
kF sensor, specter,
Dioneae, Napenthes
IV. HONEYTOKENS
Honeytokens are the small sized honeypots . Unlike
honeypots the standalone machines, honeytoken are the
digital entities such as digital data created and solely
analyzed which are used to capture digital thefts. They can
be fake data sets which cant exist in real world, at least
within a specific enterprise. These are used to track
malicious outsiders and insiders engaging in unauthorized
activity. Honey tokens may be a url address, an excel sheet
or sometimes a fake record in the organizations database.
For instance, a number of companies use honeytokens like
fake email address, user account, database data and
sometime s executables or false programs. Fake email
accounts are used for early warning for spammers. The
basic idea is that the fake email address is never used and
thus would have no valid reason for receiving spams.
Receiving unrequested email to that specific email address
indicates that someone has accessed the companys internal
email list. Another approach is to insert fake data in the
companys data base thats unlikely to exist in the real
world into a real database[15]. For example companies can
insert celebrity names who have no direct connection to the
organization such as Paul Stanley, Peter Criss. Any kind of
unauthorized interaction with these fake names ensure us
about the malicious activity against the information
accessed from the database of organization.
6099
Navneet Kambow et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6098-6101
V. ADVANTAGES OF HONEYPOTS
Being a part of network security mechanism honeypots
have many advantages. Here we will highlight some
specialties of honeypots.
A. Small data sets :
Any connection made with the honeypot is considered as
malicious. So the thousands of alerts logged by
organizations can be reduced to hundreds of entries.
B. Reduced False Positives:
Honeypots help in reducing false positives. The larger the
probability that a security resource produce false positives
or false alerts the less likely the technology will be
deployed. Any activity with the honeypot is considered
dangerous and making it efficient in detecting attacks.
C. Catching False negatives:
Catching false negatives with the help of honeypots is quiet
easy because every connection made to honeypot is
considered unauthorized. Traditional attack detecting tools
becomes fail in detecting new attacks like signature based
detection tools. These tools detect only those attacks whose
signatures are already in their database. As per honeypots
approach, there is no need of predefined database.
D. Encryption:
Honeypots have the capability to capture the malicious
activity if it is in encrypted form. Encrypted probes and
attacks interact with the honeypots as end point where the
activity is decrypted by the honeypot.
E. Working with IPv6
Hoeypots work in any IP environment, including IPv6. IPv6
is the new version of IPv4 and actively used by the
countries like Japan and the department of defence. Many
current technologies like firewalls and Ids sensors do not
work on IPv6.
F. Flexible :
Honeypots are extremely adaptable in variety of
environments. From a social security number embedded
into a database, to an entire network of computers designed
to be broken into.
G. Minimal Resources:
Honeypot require minimal resources. A simple Pentium
computer can monitor millions of IP addresses.
VI. DISADVANTAGES OF HONEYPOTS
A. Single Data Point:
One huge drawback is generally faced by honeypots that
they are worthless if no one attacks them. Obviously, they
can accomplish wonderful things but if the attacker doesnt
send any packet to honeypots then it would blissfully
unaware of any unauthorized activity.
B. Risk:
Once compromised , honeypots can introduce risk to
organisations environment. Different kind of honeypots
possess different levels of risk. Low interaction honeypots
www.ijcsit.com
[4]
[5]
[6]
[7]
[8]
6100
Navneet Kambow et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6098-6101
[9]
[10]
[11]
[12]
[13]
[14]
[15]
www.ijcsit.com
6101