Forensic Computing: Tools, Techniques and Investigations Assignment 1 Seminar
Honeypot research and decision By Group 1H Wang Chung NG, Rayson
Agenda Introduction Background Concepts Use cases Risks References
Introduction Honeypot is a technique that Same as decoy-based intrusions-detections Used in many enterprises No production value Honeypot is a system architecture (network) that Developed by Honeynet Project “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.” by Lance Spitzner, 2003
Background It was developed for learning hackers/crackers skills and motivations It is used to trap the perpetrators. Computer and Network security issues
Concepts To detect and log traffics and activities happened in the system Can be a countermeasure to some attacks Types Low-interaction (LI) / Virtual High-interaction (HI) / Physical Aims Production Research
Use cases Façades (LI) Behave as real system/application Sacrificial Lambs (HI) Uses existing system Uses network sniffer to collect data
Risks LI Captures limited amounts of information Can only detect known type attacks HI Can be complex to install or deploy Increased risk, as attackers are provided real operating systems to interact with
References Lance Spitzner, files/honeypots.pdf, HKSAR government, files/honeypots.pdf _ html, Brien M. Posey MCSE, _ html