What is honeypot

Learn about Honeypot

In this article we will talk about honeypot techniques. You may ask why I should know honeypot techniques because it is simply one of the most important techniques that greatly help protect your network.
Learn about Honeypot In this article we will talk about honeypot techniques. You may ask why I should know honeypot techniques because it is simply one of the most important techniques that greatly help protect your network.  Learn about Honeypot Honeybee technologies are one of the most important technologies in the level of network security as I mentioned earlier.   What is Honeynet?  Honey Pot is a trap to detect unauthorized attempts to access the network system. This technique is placed in several places within the network in order to know how the hacker spy and exploit vulnerability in computer systems.    What is Honeypot?  The HoneyBot in general is a fake computer or mock devices designed to simulate real devices that are placed inside the network clearly to be the target part of the network, but in fact is isolated and monitored recorded all movements of hackers, and seems to contain information and sources of value to the hacker, while its role Luring the penetrator naturally it breaks into the trap.    Honeypot technology divisions?  There are several divisions of these systems, some of them classified according to the nature of use and some of them classified according to the way network design.  According to the first classification (nature of use) it is divided into two parts:  Production Honeypot: those that are used to protect networks and systems in organizations, institutions and companies to increase the security and protection of this institution. This type is easy to use but provides little information about any attack.  Research Honeypot: which is used in research by governments, organizations and military bodies to detect any malicious programs and analysis of attacks that may be exposed to them. This type is complex but provides a lot of information about the attack.  As for the second classification (which depends on the method of network design), these systems are divided into three types:  Pure Honeypot: It is a complete systems that use effective networks and do not need any other systems or programs to be installed with it.  High-interactive Honeypot: This type is by imitating systems with similar systems with the same number of services and for the penetrator to examine all services to waste time and is more secure so that it is difficult to detect easily, but cost is high.  Low-interaction Honeypot: It is a simulation of the services most requested by hackers (or those who try to penetrate) because they use few sources of the system, so that it can benefit from the work of more than a virtual machine on the same real machine and take advantage of them together.  Also, according to the above mentioned categories can be classified according to the service to which the purpose of attracting hackers, it can be there  Malware Honeypot   Database Honeypot  Spam Honeypot And others ...

Learn about Honeypot

Honeybee technologies are one of the most important technologies in the level of network security as I mentioned earlier.

 What is Honeynet?


Honey Pot is a trap to detect unauthorized attempts to access the network system. This technique is placed in several places within the network in order to know how the hacker spy and exploit vulnerability in computer systems.



What is Honeypot?

The HoneyBot in general is a fake computer or mock devices designed to simulate real devices that are placed inside the network clearly to be the target part of the network, but in fact is isolated and monitored recorded all movements of hackers, and seems to contain information and sources of value to the hacker, while its role Luring the penetrator naturally it breaks into the trap.


Honeypot technology divisions?


There are several divisions of these systems, some of them classified according to the nature of use and some of them classified according to the way network design.

According to the first classification (nature of use) it is divided into two parts:

Production Honeypot: those that are used to protect networks and systems in organizations, institutions and companies to increase the security and protection of this institution. This type is easy to use but provides little information about any attack.

Research Honeypot: which is used in research by governments, organizations and military bodies to detect any malicious programs and analysis of attacks that may be exposed to them. This type is complex but provides a lot of information about the attack.

As for the second classification (which depends on the method of network design), these systems are divided into three types:

Pure Honeypot: It is a complete systems that use effective networks and do not need any other systems or programs to be installed with it.

High-interactive Honeypot: This type is by imitating systems with similar systems with the same number of services and for the penetrator to examine all services to waste time and is more secure so that it is difficult to detect easily, but cost is high.

Low-interaction Honeypot: It is a simulation of the services most requested by hackers (or those who try to penetrate) because they use few sources of the system, so that it can benefit from the work of more than a virtual machine on the same real machine and take advantage of them together.

Also, according to the above mentioned categories can be classified according to the service to which the purpose of attracting hackers, it can be there

Malware Honeypot
  Database Honeypot
 Spam Honeypot
And others ...

Post a Comment

0 Comments