Basically, honeypots are a tool to get information about the attacker. Furthermore, network administrators can learn about activities that can harm and look at the trends of these activities. Honeypots is a system designed for inspection and diserang.Ada two categories of honeypots:
Production honeypot, is used to reduce the risk of attacks on network security system of information within an organization.
Reasearch honeypots, used to obtain as much information as possible about the attacker so that an administrator can learn that information.
Some have debated whether it was true honeypots add value to a system of information network security. One of the ways to try is to see how long of honeypots give the administrator time to react since the time of the attack came in, so that an administrator can protect the productive network. If within 15-20 minutes, then honeypots will have added value. Information attacker was learned also will provide added value to the network security system, because a proper counterattack will be made for defense against these new attacks. Defined by Marty Roesch, Snort creator
Honeypots do not require a specific placement on the network because she is a standard server with no special needs. Honeypots can be placed anywhere, such as a server will be placed. But it would be better if left in place, easily accessible by certain people. Honeypots can be used on the internet or intranet depending on services needed. Placement honeypots on an intranet can be useful for detecting a penyreang residing in the internal network. If the main focus on the internet, honeypots can be placed at two locations:
¥ In front of the firewall (internet)
¥ DMZ8¥ On the back of the firewall (internet) Each placement has its advantages and kekurangnnya. Sometimes not mungkinuntuk a server in front of the firewall.
Honeypot that are distributed on a network (Honeynet) can form an accurate detector except the price factor (mainly hardware and admistration costs) to be implemented Honeynet barrier factor
Production honeypot, is used to reduce the risk of attacks on network security system of information within an organization.
Reasearch honeypots, used to obtain as much information as possible about the attacker so that an administrator can learn that information.
Some have debated whether it was true honeypots add value to a system of information network security. One of the ways to try is to see how long of honeypots give the administrator time to react since the time of the attack came in, so that an administrator can protect the productive network. If within 15-20 minutes, then honeypots will have added value. Information attacker was learned also will provide added value to the network security system, because a proper counterattack will be made for defense against these new attacks. Defined by Marty Roesch, Snort creator
Honeypots do not require a specific placement on the network because she is a standard server with no special needs. Honeypots can be placed anywhere, such as a server will be placed. But it would be better if left in place, easily accessible by certain people. Honeypots can be used on the internet or intranet depending on services needed. Placement honeypots on an intranet can be useful for detecting a penyreang residing in the internal network. If the main focus on the internet, honeypots can be placed at two locations:
¥ In front of the firewall (internet)
¥ DMZ8¥ On the back of the firewall (internet) Each placement has its advantages and kekurangnnya. Sometimes not mungkinuntuk a server in front of the firewall.
Honeypot that are distributed on a network (Honeynet) can form an accurate detector except the price factor (mainly hardware and admistration costs) to be implemented Honeynet barrier factor