Honeypots are traps set to detect attempts at any unauthorized use of information systems and to learn from the attacks to improve computer security further. Traditionally, sustaining network security has involved acting vigilantly, using network-based defense techniques like firewalls, intrusion detection systems, and encryption. However, the current situation demands more proactive techniques to detect, deflect, and counteract attempts at illegal use of information systems. In such a scenario, using honeypots is a promising approach to fighting off-network security threats.
What is a Honeypot
Considering the classical field of computer security, a computer needs to be secure, but in the domain of Honeypots, the security holes are set to open on purpose. Honeypots can be defined as a trap that is set to detect attempts at any unauthorized use of information systems. Honeypots essentially turn on the tables for Hackers and computer security experts. The main purpose of a Honeypot is to detect and learn from the attacks and further use the information to improve security. Honeypots have long been used to track attackers’ activity and defend against coming threats. There are two types of honeypots:
- Research Honeypot – A Research Honeypot is used to study the tactics and techniques of the intruders. It is used as a watch post to see how an attacker is working when compromising a system.
- Production Honeypot – These are primarily used for detection and to protect organizations. The main purpose of a production honeypot is to help mitigate risk in an organization.
Why set up Honeypots
The worth of a honeypot is weighed by the information that can be obtained from it. Monitoring the data that enters and leaves a honeypot lets the user gather the information that is not otherwise available. Generally, there are two popular reasons for setting up a Honeypot:
- Gain Understanding
Understand how hackers probe and attempt to gain access to your systems. The overall idea is that since a record of the culprit’s activities is kept, one can understand the attack methodologies to protect their real production systems better.
- Gather Information
Gather forensic information to aid in the apprehension or prosecution of hackers. This information is often needed to provide law enforcement officials with the details needed to prosecute.
How Honeypots secure Computer Systems
A Honeypot is a computer connected to a network. These can be used to examine the operating system’s or the network’s vulnerabilities. Depending on the kind of setup, one can study general or particular security holes. These can be used to observe the activities of an individual who gained access to the Honeypot.
Honeypots are generally based on a real server, a real operating system, along with data that looks real. One of the chief differences is the machine’s location in relation to the actual servers. The most vital activity of a honeypot is to capture the data, the ability to log, alert, and capture everything the intruder is doing. The gathered information can prove to be quite critical against the attacker.
High-Interaction vs. Low-Interaction Honeypots
High-interaction honeypots can be compromised entirely, permitting an enemy to gain full access to the system and use it to launch further network attacks. With the help of such honeypots, users can learn more about targeted attacks against their systems or even about insider attacks.
In contrast, the low-interaction honeypots put on only services that cannot be exploited to get complete access to the honeypot. These are more limited but are useful for gathering information at a higher level.
Advantages of using Honeypots
- Collect Real Data
While Honeypots collect a small volume of data but almost all of this data is a real attack or unauthorized activity.
- Reduced False Positive
With most detection technologies (IDS, IPS) a large fraction of alerts are false warnings, while with Honeypots this doesn’t hold true.
- Cost Effective
Honeypot just interacts with malicious activity and does not require high-performance resources.
- Encryption
With a honeypot, it doesn’t matter if an attacker is using encryption; the activity will still be captured.
- Simple
Honeypots are very simple to understand, deploy and maintain.
A Honeypot is a concept, not a tool, that can be simply deployed. One needs to know well in advance what they intend to learn, and then the honeypot can be customized based on their specific needs. If you need to read more on the subject, there is some useful information on sans.org.