Skip to main content

HoneyPot Technology :

A honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods. Honeypots are designed to purposely engage and deceive hackers and identify malicious activities performed over the Internet.

There are two different kinds of honeypots. They are classified based on their deployment method:
Production Honeypot:

Used by companies and corporations for the purpose of researching the motives of hackers as well as diverting and mitigating the risk of attacks on the overall network.

Research Honeypot:

Used by nonprofit organizations and educational institutions for the sole purpose of researching the motives and tactics of the hacker community for targeting different networks.
Based on design criteria, honeypots can be classified as:
  • pure honeypots
  • high-interaction honeypots
  • low-interaction honeypots

Honey nets


Two or more honeypots on a network form a honey net.
 Typically, a honey net is used for monitoring a larger and/or more diverse network in which one honeypot may not be sufficient.
 Honey nets and honeypots are usually implemented as parts of larger network intrusion detection systems.

honey farm is a centralized collection of honeypots and analysis tools.

The concept of the honey net first began in 1999 when Lance Spitzner, founder of the Honeynet Project, published the paper "To Build a Honeypot"

By luring a hacker into a system, a honeypot serves several purposes:

•The administrator can watch the hacker exploit the vulnerabilities of the system, thereby learning where the system has weaknesses that need to be redesigned.

•The hacker can be caught and stopped while trying to obtain root access to the system.

•By studying the activities of hackers, designers can better create more secure systems that are potentially invulnerable to future hackers.







  1. Thank You So Much................

Comments

Popular posts from this blog

Naming Convention

  Naming Convention : A naming convention is  a convention for naming things: Please find below the table for naming conventions: Naming Convention Format Example Camel Case camelCase 🐪aBcD Kebab Case kebab-case 🍢a-b-c-d Snake Case snake_case 🐍a_b_c_d Pascal Case PascalCase 🧑‍🦳AbCd Flat Case flatcase 📏abcd Upper Flat Case UPPERFLATCASE ABCD Screaming Snake Case SCREAMING_SNAKE_CASE 🐍A_B_C_D Camel Snake Case camel_Snake_Case 🐪🐍ab_Cd Pascal Snake Case Pascal_Snake_Case Ab_Cd Train Case Train-Case 🚃Ab-Cd Cobol Case COBOL-CASE 🍢AB-CD
How to run lex yacc programs on win 10 In short: For Lex steps to run: lex lex7.l gcc lex.yy.c a     For YACC steps to run: lex simple_compound.l yacc -d simple_compound.y gcc lex.yy.c y.tab.c a                          A.Lex 1. download flex for windows http://flex-windows-lex-and-yacc.software.informer.com/2.5/ 2. install it locatin:  C:\Flex Windows\ 3.open cmd 4.You need to change location as follows:  cd C:\Flex Windows\EditPlusPortable 5. Steps to run : lex lex7.l gcc lex.yy.c a Output : Word Count : 13 Char Count : 80 Line Count : 7 codes : lex7.l %{ /* *Program to count no of characters, words and lines */ #include<stdio.h> #include<string.h> int c=0,w=0,l=0; %} %% [\t ]+              /* ignore whitespace */ [a-zA-z]+  ...

Simple java code

  Simple java code class Main{ /*Every application in Java must contain the main method. The Java compiler starts executing the code from the main method*/      public static void main(String anyVar[]){      System.out.println("Simple java code");       } } Output: Simple java code Screenshot: Online compiler:https://www.onlinegdb.com/online_java_compiler #happyCoding💁👍