What are Honeypots and Honeynets?

In the world of computer security, honeypots are called traps designed to detect or neutralize any unauthorized access to computer networks.

Honeypots can exist on individual computers, clusters , or areas of the network that appear valuable or worth exploring by uninvited visitors, but are actually designed to trap or even track the attacker.honeypots

In general, a honeypot consists of (for example, in a network location) that appears to be a normal site location, but is actually isolated and monitored. So it may appear to contain information valuable to attackers, but it is designed to block them.

Honeypots are usually divided into two main categories: Production honeypots and research honeypots.

Production honeypots are the traps of real entities that seek to protect valuable data from a public organization or a company, and research honeypots are designed to track and study hackers who fall into the trap.

Two or more honeypots in a network constitute a Honeynet. Typically, a Honeynet is used to monitor a larger or more diverse network in which a single honeypot is not sufficient. Honeynets and honeypots are usually implemented as parts of larger network intrusion detection systems. A honeyfarm is one με honeypοts και analysis.

The concept of Honeynet first started in 1999, when Lance Spitzner, founder of the Honeynet project, published "Build and Honeypot. "

"A Honeynet is a highly interactive honeypots network that simulates a production network and is designed so that all activity is monitored, recorded and to some extent, discreetly regulated."

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).