Documente Academic
Documente Profesional
Documente Cultură
Presented By
T.Shruthi
I.haripriya
Contents:
Introduction to Honeypot.
Introduction to Honeyspots.
Types of attacks.
Types of Honeyspots.
Honeyspot design.
Honeyspot architecture.
Advantages and Disadvantages.
Conclusion.
References
Introduction:
Wireless technologies are fastest growing segments
of today’s telecommunications and computing industry.
ACKING
Attackers/hackers are
always looking to compromise
networks.
“Honey”pot + Hot“Spot”=
HONEYSPOT.
A Public HoneySpot
A Private HoneySpot
Public honeyspot is mainly interested in:
Direct client attacks.
Attacks focused on wireless infrastructure such as the access point.
Attacks focused on by passing the
Security controls imposed by the controller and obtaining full
network access without being a legitimate subscriber.
Private honeyspot is mainly interested in:
Direct client attacks.
Attacks focused on wireless infrastructure such as the access point.
Attacks focused on by passing other security mechanisms available on
wireless deployments,like MACaddress filtering,turned off SSID broad
cast etc..with the goal of getting full network layer-2 access.
Honeyspot design
A honeyspot must cover attacks that target both
infrastructure and client systems.
Focused on
Wireless attacks
Wireless
clients infrastructure
Access
servers points
The main goal of a honeyspot from a design
perspective is to
Frequency of attacks
Wireless clients(WC)module
Wireless Monitor(WMON)module
Wired infrastructure(WI)module(optional)
Honeyspot Architecture
ADVANTAGES: