Honeypot

Dejan Golja, PINA



Organiser of the festival is Multimedia center Kibla, Maribor

 


The number of Internet users is increasing every day. Availability of this technology is no longer a privilege, but everyday fact. Consequently also the network misuses are on the increase. Tools for misusing vulnerable networks/servers are namely freely accessible on internet and easy to use, so the integrity of our network can be seriously threatened also by some common user if the proper tools are being used. No network is safe from breaking in, since the choice of the network attacked is usually random. Intruder in many cases doesn't care which server he is dealing with, so it can be a server of some important company or a server of an individual. Such intrusions can hardly be separated from the usual traffic, since the attackers usually use different techniques that common systems can't distinguish or register (various stealth scanners, such as SYN, FIN, Xmas, Null). Many tools and solutions for improved network security has been developed in recent years. One of them is also honeypot. Value of honeypot is in the very forbidden use of the sources of our network. Usually it is about systems that stimulate extended systems with known vulnerabilities. Compared to other solutions they are more simple to use and don't demand expensive hardware. Besides that, they only capture a small data quantity, which has a high value. Since there are not many data, it is easier to recognise what is relevant and thus we avoid the possibility of getting lost in a huge amount of unnecessary data.

Honeypot workshop will introduce you the basic principles of Honeypots, its advantages and disadvantages and latest solutions available. We will get to know in detail one of the low-interaction varieties, Honeyd by Niels Provos.





  Design : ZRCALO d.o.o.      Copyright KIBLIX 2003