What are Honeypots and Honeynets?

In the world of computer security, , ονομάζονται οι παγίδες που έχουν σαν στόχο να ανιχνεύσουν ή να εξουδετερώσουν κάθε μη εξουσιοδοτημένη in computer networks.

Honeypots can exist on individual computers, data sets, or areas of the network that are valuable or worth exploring by uninvited visitors but which are actually designed to trap or even watch the attacker.honeypots

In general, a honeypot consists of data (for example, at a network location) that appears to be a normal site location, but is actually isolated and monitored. So it may appear that it contains valuable to attackers, but designed to block them.

Honeypots are usually divided into two main categories: Honeypots paraand research honeypots.

Production honeypots are the traps of real entities that seek to protect valuable data from a public organization or a company, and research honeypots are designed to track and study hackers who fall into the trap.

Δύο ή περισσότερα honeypots σε ένα δίκτυο αποτελούν ένα Honeynet. Τυπικά, ένα Honeynet χρησιμοποιείται για την παρακολούθηση ενός μεγαλύτερου ή ενός πιο ποικιλόμορφου δικτύου στο οποίο ένα μόνο honeypot δεν είναι επαρκές. Τα honeynets και τα honeypots συνήθως υλοποιούνται σαν τμήματα μεγαλύτερων συστημάτων ανίχνευσης εισβολής στο δίκτυο. Ένα honeyfarm είναι μια συλλογή με honeypοts και analysis.

The concept of Honeynet first started in 1999, when Lance Spitzner, founder of the Honeynet project, published "Build and Honeypot. "

"A Honeynet is a highly interactive honeypots network that simulates a production network and is designed so that all activity is monitored, recorded and to some extent, discreetly regulated."

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).