Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
9Activity
0 of .
Results for:
No results containing your search query
P. 1
abstract on honey pots

abstract on honey pots

Ratings: (0)|Views: 2,602 |Likes:
Published by sreerammuddu
Honey Pots For Network Security
Submitted by:M.sreeram Regno :Y09CS038

SUBMITTED TO: DEPARTMENT OF ENGLISH VRSEC

Date :26/9/2011

1

TABLE OF CONTENTS

1) Abstraction 2)Introduction 3)History of honey pots 4) Definition of a Honey pots 5) The idea of Honey pots 6) THE VALUE OF HONEYPOTS
7) BUILDING A HONEYPOT 8) How do HONEYPOTS work 9) TYPES OF HONEYPOTS 10) HONEYNETS

-

1 3 3 4 5
5 7 8 9

-

14
15 17 18

11) LEVEL OF INTERACTION
12) Conclusion 13) References

2

Abstract:
1. INTRODUCTION:
Honey Pots For Network Security
Submitted by:M.sreeram Regno :Y09CS038

SUBMITTED TO: DEPARTMENT OF ENGLISH VRSEC

Date :26/9/2011

1

TABLE OF CONTENTS

1) Abstraction 2)Introduction 3)History of honey pots 4) Definition of a Honey pots 5) The idea of Honey pots 6) THE VALUE OF HONEYPOTS
7) BUILDING A HONEYPOT 8) How do HONEYPOTS work 9) TYPES OF HONEYPOTS 10) HONEYNETS

-

1 3 3 4 5
5 7 8 9

-

14
15 17 18

11) LEVEL OF INTERACTION
12) Conclusion 13) References

2

Abstract:
1. INTRODUCTION:

More info:

Published by: sreerammuddu on Sep 27, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/29/2013

pdf

text

original

 
1
Honey Pots For Network Security
Submitted by:M.sreeramRegno :Y09CS038
SUBMITTED TO: DEPARTMENT OF ENGLISH VRSECDate :26/9/2011
 
2 
TABLE OF CONTENTS
1) Abstraction - 12)Introduction - 33)History of honey pots - 34)
 
Definition of a Honey pots - 45)
 
The idea of Honey pots - 56)
THE VALUE OF HONEYPOTS - 57) BUILDING A HONEYPOT - 8) How do HONEYPOTS work - 9) TYPES OF HONEYPOTS - 9
10)
 
HONEYNETS - 1411)
LEVEL OF INTERACTION - 1512) Conclusion - 17 13) References - 18 
 
3
 Abstract:
1. INTRODUCTION:
 
For every consumer and businessthat is on the Internet, viruses, worms, andcrackers are but a few security threats.Thesystems can only react to or preventattacks but they cannot give usinformation about the attacker, the toolsused or even the methods employed.Hence,
Honeypots
are a novel approach tonetwork security and security researchalike.Honeypots are closely monitoreddecoys that are employed in a network tostudy the trail of hackers and to alertnetwork administrators of a possibleintrusion. Honeypots provide a cost-effective solution to increase the security posture of an organization. Nowadays,they are also being extensively used by theresearch community to study issues innetwork security.
1.1 History of Honeypots:
The idea of honeypots began in 1991with two publications, “The CuckoosEgg” and “An Evening with Breford”.“The Cuckoos Egg” by Clifford Stollwas about his experience catching acomputer hacker that was in hiscorporation searching for secrets. Theother publication, “An Evening withBerferd” by Bill Chewick is about acomputer hacker’s moves through traps thathe and his colleagues used to catch him. In both of these writings were the beginningsof what became honeypots.
 
The first type of honeypot was released in1997 called the Deceptive Toolkit. The pointof this kit was to use deception to attack  back. In 1998 the first commercial honeypotcame out. This was called Cybercop Sting.In 2002 the honeypot could be shared andused all over the world. Since then honeypottechnology has improved greatly and manyhoneypot users feel that this is only the beginning. In the year, 2005, The PhilippineHoneypot Project was started to promotecomputer safety over in the Philippines.
1.2 Definition of a Honeypots:
What is a Honeypot?
 
A HONEYPOT is an informationsystem resource whose value lies inunauthorized or illicit use of that resource
 
It is defined as a computer system onthe Internet that is expressly set up to attractand "trap" people who attempt to penetrateother person’s computer systems. Honeypotis a trap; an electronic bait. It is a computer 

Activity (9)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Dharma Darling liked this
subhashree_643162943 added this note
pls send me this report
Arvy John liked this
madhuarora000 liked this
Sriram Nani liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->