Honeypot Methods and Applications
Honeypot Methods and Applications
Honeypot Methods and Applications
Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD38045 | Volume – 5 | Issue – 1 | November-December 2020 Page 725
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
and resources, ultimately giving system/network admin to services the production network/system would run. This
assess and mitigate any vulnerability in their actual system. type of honeypot is given a real operating system to attack. It
Production honeypot is used to reduce the risk to provide a allows the organization to see hacker's behavior and
better and secure business environment. Hence, they are methods, the main aim is to get maximum information about
largely used in organizations the hackers by allowing access to the whole system. This
type of honeypot consumes a lot of resources and have to be
maintained constantly, but is worth the findings.
@ IJTSRD | Unique Paper ID – IJTSRD38045 | Volume – 5 | Issue – 1 | November-December 2020 Page 726
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Process and sends the data of the packet (less the headers) that necessities itemized information on every product work
over that connection. IDS check the data of the packet that should be kept. Oversimplified signatures will in general
against its database and returns the Boolean value of that to produce huge quantities of false positives, too explicit ones
load balancer through a similar TCP connection. In the wake reason false negatives. For a similar explanation, the idea of
of accepting the outcome, the load balancer shuts the TCP Honeycomb a system that generates a signature for
connection. On the off chance that the outcome from the IDS malicious traffic consequently is utilized. Here pattern
was valid (Indicating an attack) the packet is sent to the detection methods and packet header are utilized for
Honeypot. otherwise, a server is chosen from the dynamic conformance tests on traffic caught by honeypots. The
server pool in a cooperative design and the bundle is sent to reason examined the attack signatures is to clarify the
the server. trademark components of attacks. At this moment we don't
have any such norm for characterizing these signatures. As
an outcome, various systems offer signature languages of
changing expressiveness. A decent signature must be limited
enough to keep decisively the characteristic parts of
exploiting it attempts to address; simultaneously, it should
be adaptable enough to catch varieties of the attacks.
Disappointment in one manner or different prompts either a
lot of false positives or false negatives. In this manner, the
system underpins signatures just for the Snort NIDS. Snort's
signature language is right now not as open. So, we
incorporate Snort here due to its current standing and
Fig3 Flow of packets through IDS in Honeypot colossal signature stockroom. the system utilized here is an
augmentation of honey a popular low-level interaction open-
3.3. Network Security Through Hybrid Honeypot source honeypot. Honeyd mimics has with personage
A honeypot is a security asset whose worth lies in being networking characters. It interferes with traffic shipped off
examined, assaulted, or compromised. A honeypot is a non-existent has and utilizes the imitated frameworks to
framework that is made and set up to be hacked. It tends to react to this traffic. Each host's characteristics can be
be utilized in an alternate situation as an IDS, safeguard, or designed as far as OS type and running organization
response component. Moreover, it can be sent to devour the administrations.
assets of the attacker or divert them from the valuable
targets and moderate them down that they waste their 4. Conculsion
energy and time on the honeypot as opposed to assaulting We have additionally examined different sorts of honeypots
production frameworks or servers. Here again, we partition and their utilization with various usefulness perspectives.
the honeypots into two classifications as indicated by their our objective was to comprehend their technique and how
degree of interaction, low-level interaction, and high-level they are functioning to draw attackers towards the system.
interactions. The degree of interaction can be characterized We found their security flaws to support specialists and
as the greatest scope of assault prospects that a honeypot organizations. A few organizations are utilizing honeypot
permits an attacker to have. In high-level interaction frameworks to ensure the entire organization's security, and
honeypot, hacker associates with working operating analysts are making experiments on their home network. As
systems, all the programs and services and this sort of we know network security is exceptionally huge for all
connection can be utilized to notice the hacker's behavior, systems because any unprotected machine in an
their tools used, motive, and investigate vulnerability. This organization can be undermined at any time. We have
kind of high-level interaction honeypot can be set up in a additionally examined different sorts of honeypots and their
virtual machine utilizing different virtualization utilization with various usefulness perspectives.
programming, for example, VMware, Qemu, and Xen. An
example of this honeypot is honeynet. It is a network of 5. Reference
different frameworks. Honeynet can gather profound data [1] Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st
about hackers, for example, their keystrokes when they ed. Boston, MA, USA: Addison Wesley.
exploit the system, their interaction with other hackers, or [2] Mokube, I. & Adams M., 2007. Honeypots: Concepts,
the different tools they use to investigate and create a Approaches, and Challenges. ACMSE 2007, March 23-
defenseless system. On a low-level interaction honeypot, 24, 2007, Winston-Salem, North Carolina, USA, pp.321
there is no working operating system that an attacker can 325.
work on. All the tools are set up to mimic OS and different
services. Furthermore, they all work along with the attacker [3] Know Your Enemy: Honeywall CDROM Roo 3rd
and malicious code. This will decrease the danger drastically. Generation Technology, Honeynet Project & Research
This kind of honeypot has a couple of possibilities of being Alliance, http://www.honeynet.org
undermined. These are production honeypots. Regular [4] Ram Kumar Singh & Prof. T. Ramanujam. Intrusion
utilization of low-level interaction honeypot incorporates; Detection System Using Advanced Honeypots, 2009
port scan recognizable proof, age of assault signature,
pattern examination, and malware collection. [5] The Honeynet Project. Know Your Enemy: Honeynets
(May 2005)
3.4. Deployment of Intrusion Detection Signatures http://www.honeynet.org/papers/honeynet/.
using Honeycomb [6] Honeynet Research Alliance. Project Honeynet
This generally deals with the generation of signatures. As of Website. http://project.honey.org
now, generating signature is tedious work, a manual process
@ IJTSRD | Unique Paper ID – IJTSRD38045 | Volume – 5 | Issue – 1 | November-December 2020 Page 727
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
[7] The Honeynet Project, Know Your Enemy: Honeynets, [11] Honeynet project. Know your enemy: Honeynets.
April 2001. http;//www.Honeynet.org/papers/honeynet/index.h
tml
[8] The Honeypot Project, Know Your Enemy: Revealing
the Security tools, tactic, and motives of Blackhats [12] Research infrastructures action, Sixth framework
community.2002. programme, D1.1: Honeypot Node Architecture, page
7-24.
[9] Hybrid Honeypot System for Network Security by Kyi
Lin Lin Kyaw, 2008. [13] Honeycomb. Creating Intrusion Detection Signatures
Using Honeypots Christian Kreibich, Jon Crowcroft.
[10] Spitzer, Lance. Honeypots, Tracking Hackers. Pdf
version. Addison Wesely, 2002. [14] M. Roesch, Snort: Lightweight Intrusion Detection for
Networks. In Proceedings of the 13th Conference on
Systems Administration.
@ IJTSRD | Unique Paper ID – IJTSRD38045 | Volume – 5 | Issue – 1 | November-December 2020 Page 728