0% found this document useful (0 votes)
245 views5 pages

Firewall and Intrusion Detection System: Honeypots

Honeypots are fake systems designed to attract hackers away from real systems. They divert attackers' time and attention so the attackers spend their time trying to access the vulnerable honeypot instead of targeting important files and devices on the actual network. Honeypots are used to identify malicious activities, engage attackers for a long period of time to keep them away from the main systems, and minimize risks to the real network. There are two main types: production honeypots used by companies, and research honeypots used for education or research.

Uploaded by

shruti gaware
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
245 views5 pages

Firewall and Intrusion Detection System: Honeypots

Honeypots are fake systems designed to attract hackers away from real systems. They divert attackers' time and attention so the attackers spend their time trying to access the vulnerable honeypot instead of targeting important files and devices on the actual network. Honeypots are used to identify malicious activities, engage attackers for a long period of time to keep them away from the main systems, and minimize risks to the real network. There are two main types: production honeypots used by companies, and research honeypots used for education or research.

Uploaded by

shruti gaware
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

FIREWALL AND INTRUSION

DETECTION SYSTEM

Honeypots
Honeypots
• Honeypot is a system specially set to attract and
‘Trap’ attackers who are try to attack systems or
try to penetrate into system.
• a honeypot is a fake target that is deliberately
placed on your PC or network to distract hackers
and keep them away from your confidential files.
• The attacker will then spend their time trying to
access this vulnerable PC rather than target the
real devices on your network.
Cont…
Why ?
• Honeypots are used to divert hackers from main
system where important information/ critical
system is set.
• To identify malicious activities performed by
hackers, so that we can take measures to secure
main system.
• To engage attacker for long time, so he will stay
away from main system.
Cont..
Types of honeypots
1) Production Honeypots: Used by companies
to know aim of attacker to attack on system,
also try to divert attacker from main system
and minimize risk of attack.
2) Research Honeypot: Used by organizations
for educational or research purpose only.
Cont..

You might also like