Sunteți pe pagina 1din 24

- The Wireless Honeypot

Presented By
T.Shruthi
I.haripriya
Contents:
 Introduction to Honeypot.
 Introduction to Honeyspots.
 Types of attacks.
 Types of Honeyspots.
 Honeyspot design.
 Honeyspot architecture.
 Advantages and Disadvantages.
 Conclusion.
 References
Introduction:
Wireless technologies are fastest growing segments
of today’s telecommunications and computing industry.
ACKING

Attackers/hackers are
always looking to compromise
networks.

Customizing the settings will


help prevent easy access for
hackers.

Honeypots are important


technologies which can deter
an attacker from
compromising the network.
Honeypot…….?

•“HONEYPOT IS A HACKER TRAP”

•A honeypot is a system designed to learn


how “black-hats” probe.

•It is defined as “an information system


resource whose value lies in unauthorized
or illicit use of that resource”.
“HONEYSPOT”

 “Honey”pot + Hot“Spot”=
HONEYSPOT.

• “A HoneySpot is a venue that offers Wi-Fi


access whose
value is being probed, attacked, or
compromised, you want the
bad guys to interact with it”.
Types of Attacks

A : attacks directed towards wired networks

B : attacks directed towards wireless users

C : attacks directed towards the wireless network infrastructure


Then what honeyspot
do……??

 Divert an attacker from accessing critical


systems.
 Collect information about the attacker’s
activity.
 Encourage the attacker to stay on system
long enough for administrators to respond.
Types of Honeyspots

 A Public HoneySpot

 A Private HoneySpot
Public honeyspot is mainly interested in:
Direct client attacks.
Attacks focused on wireless infrastructure such as the access point.
Attacks focused on by passing the
Security controls imposed by the controller and obtaining full
network access without being a legitimate subscriber.
Private honeyspot is mainly interested in:
Direct client attacks.
Attacks focused on wireless infrastructure such as the access point.
Attacks focused on by passing other security mechanisms available on
wireless deployments,like MACaddress filtering,turned off SSID broad
cast etc..with the goal of getting full network layer-2 access.
Honeyspot design
A honeyspot must cover attacks that target both
infrastructure and client systems.

HONEY SPOT SYSTEM

Focused on

Wireless attacks

Wireless
clients infrastructure
Access
servers points
The main goal of a honeyspot from a design
perspective is to

Reveal real statistics about wireless attacks

Frequency of attacks

The attackers level,goals and methods

 Even help to determine the hacking tools being


used.
Types of modules

Wireless access point(WAP)module

Wireless clients(WC)module

Wireless Monitor(WMON)module

Wireless data analysis(WDA)module

Wired infrastructure(WI)module(optional)
Honeyspot Architecture
ADVANTAGES:

 They are clearly a useful tool for trapping attackers.

They generate alerts when someone is interacting with


them.

The activities of attackers provides valuable information


for analysing their attacking techniques and methods.
Drawbacks:

 They only track and capture activity that


directly interacts with hackers.

Furthermore, deploying honeypots without


enough planning and consideration may introduce
more risks to an existing network.
Honeyspots are targeted to research the real
security threats.

One of the goals of this paper is to create


awareness about the current wireless threats.

The current honeyspot design is focused on attacks


on wireless networks and technologies, learning about
the attackers tools.
References:

[1].“Wi-Fi Honeypots a New Hacker Trap”. Kevin Poulsen.


http://www.securityfocus.com/news/552

[2].“Wireless Honeypot Countermeasures”. Laurent Oudot.


http://www.securityfocus.com/infocus/1761

[3].“Network Security Essentials” Applications and standards by


WILLIAM STALLINGS

S-ar putea să vă placă și