honeypots
John Doe
Heaven University
Faculty of Informatics
1 Motivation
2 Theory background
Active network defense
Honeypots and dynamic honeypots
4 Data analysis
Data mining
No formal definition.
Known definition is based on the implementation reason, where
honeypots are purposely implemented to be vulnerable.
Flexible tool used to detect or suppress an attack on network.
Low overhead, no production value - local communication from/to
honeypot is suspicious.
Definition
Security resource whose value is in revealing itself in order to give an
attacker a possibility to inspect and attack. (L. Spitzner)
Images with OS and needed tools were prepared for each node of the
simulation.
Router node is represented by a router within sandbox in order to
save space.
Target Honeypot Attacker Router
fail2ban honeyd nmap rfw
curl farpd hydra iptables
openSSH cron
scan