You are on page 1of 5

Honeypots

Presented by:Sonika Mathur MCA Vth sem

INTRODUCTION
Honeypots are an exciting new technology with enormous potential for the security community. The concepts were first introduced by several icons in computer security, specifically Cliff Stoll in the book The Cuckoo's Egg", and Bill Cheswick's paper " An Evening with Berferd." Since then, honeypots have continued to evolve, developing into the powerful security tools they are today. A honeypot is primarily an instrument for information gathering and learning about the attacks and black hat community itself.

DEFINITION
A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.

TYPES OF HONEYPOT
Honeypots can be classified based on their deployment and based on their level of involvement. Based on the deployment, honeypots may be classified as:-

Production Honeypot Research Honeypot

Based on the deployment, honeypots may be classified as:-

Low-Involvement Honeypot
High-Involvement Honeypot
Involvement defines the level of activity a honeypot allows an attacker.

You might also like