Honey pot is a well designed system. It attracts the hackers and monitors the changes done by them to the system.Honeypot systems often use hardened operating systems and are usually configured so that they appear to offer attackers exploitable vulnerabilities. protocol requests used by the WannaCry ransomware attack, and may represent itself as an enterprise database server storing consumer information.A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. Honeypots can emulate the existence of the vulnerability, so the attackers, viruses and worms are attracted to this system which appears to be poorly secured.
Types Of Honeypots:-
*Research Honeypots. A honeypot that is used to gather information about attackers, attack patterns and techniques.
*Pure Honeypots. A full copy of a production system, typically stripped of sensitive data.
*High Interaction Honeypots.
*Low Interaction Honeypots.
The use non-emulated operating systems by with multiple services which can be abused by the attacker. This kind of honeypots requires quite a lot of capability to function, but we can lower the expense by using multiple virtual machines.
The part of the system and services is most generally used. They are consume relatively low resources, but the cost can be though be lowered by the use of virtual machines, because multiple VMs can easily be run on one physical computer.
How Honeypots secure Computer Systems:-
Honeypots are generally based on a real server, real operating system, along with data that looks like real. One of the leading differences is the location of the vehicle in relation to the actual servers.
There are a number of honeypot projects with offerings out there, most of them free and open source. One of the most large is Honeyd a virtual low-interaction honeypot. The introductory Honeynet Project has collect an extensive list of tools that provide not just honeypot performance but ways to analyze the data the honeypots collect.
Honeypots: Tracking Hackers:-
Through the book we are presented with a variety of real-life examples. This along with the numerous references and a CD-ROM packed with whitepapers source code and data captures of real attacks, makes this book really complete.