0 Comments
Should an attacker attempt an exploit or upload a rootkit or trojan to the server the honeypot environment can safely store these files on your computer for malware collection and analysis purposes. The honeypot safely captures all communications with the attacker and logs these results for future analysis. When an attacker connects to these services they are fooled into thinking they are attacking a real server. HoneyBOT works by opening a large range of listening sockets on your computer from which a selection of these sockets are designed to mimic vulnerable services. They could be hardware- and software-based, and are important tools created to gather information. Honeypots intentionally appear to attackers as real computer systems that are affected by vulnerabilities that could be exploited to compromise them. Honeypots are becoming one of the leading security tools used to monitor the latest tricks and exploits of hackers by recording their every move so that the security community can more quickly respond to new exploits. A honeypot is a security mechanism designed to lure attackers in a specially crafted virtual trap. The captured information is highly valuable as it contains only malicious traffic with little to no false positives. The logging capability of a honeypot is far greater than any other network security tool and captures raw packet level data even including the keystrokes and mistakes made by hackers. Tujuan diciptakannya honeypot adalah untuk membantu menyempurnakan Intrusion Detection System (IDS)software yang dapat mendeteksi jaringan keamananagar dapat mengatasi serangan dengan lebih baik lagi. A honeypot is a device placed on a computer network specifically designed to capture malicious network traffic. Perlu dipahami jika honeypot bukanlah bentuk cyber security yang dapat mencegah serangan hacker secara langsung. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |