Skip to main content

Honeypots of Cyber Security


Honeypot is a part of a study of Cyber Security. It is used for detecting or deflecting the problems or unauthorized attempts on Information System and also gathering the info. It is able to monitor, block or analyze the attackers. Honeypot is just used to attract the attackers to the system. You can say it is like a baiting the cyber criminals. It have a same application and system like the real system of computers. That's why attackers take this as a baits. This mostly used for understanding attackers behavior pattern.

Honeypot are classifieds on their deployment and based on their level of development.
Classification based on their deployment:-
  • Productions honeypots
They are easy to use but gather less info and mostly used by corporations. It is placed in production network along with other production servers. This honeypots are easy to deploy. They serve as a decoy system inside fully network and servers.
  • Research honeypots
They run to know the motive and tactics of Black Hat community. They are used to learn the system vulnerabilities to make better security system. They are also hard to deploy and gather extensive legitimate information.

Classification based on their level of deployment:-
  •   Pure honeypots
In this the activities of attackers are monitor by using the bug tap which are installed to the honeypots linked to the network. No other software needs to be installed. It is ensure more control mechanism.They are unsophisticated.
  • High-interactions honeypots
This imitate the activities of production system that host the variety of services. This allow the attackers to use lot of services and waste their time. By employing the virtual machine multiple honeypots can be run on one physical machine. Therefore, if honeypot even get compromised it can be restored.
  • Low-interaction honeypots
This stimulates the service only requested by attackers. That's why it consume less resource. It doesn't have complex system.

Comments

Popular posts from this blog

NVIDIA Tesla V100 - First Tensor Core GPU

  8x NVIDIA Tesla V100 32GB Server As we all know NVIDIA processor are so famous now a days. It give a perfect gaming performance and people used it worldwide. The thing is that it is not only use in personal computer but also at data center, where so many super computer are present for providing services. So, NVIDIA Tesla V100 is a first tensor core GPU. It is especially built to focus on AI, High Performance Computing ( HPC ) and graphics. It is powered by NVIDIA Volta Architecture. It comes with configuration 16 and 32GB and have a performance up to 100 CPUs in single GPU. A single server node with V100 GPUs can replace 60 CPUs nodes. DATA CENTER GPUs Image © NVIDIA NVIDIA V100 for NVLINK  Performance with NVIDIA GPU Boost for double precision is  7.8 teraflops and single precision is 15.7 teraflops. Deep learning performance boost is 125 teraflops. Interconnect bandwidth with bidirectional is 300 GB/s. It have memory capacity of 32/16 GB HBM2 with bandwidth 900GB/s. I...

The Amazing Vantablack Material...!!

Vantablack is a material developed by Surrey NanoSystems in the United Kingdom and is one of the darkest substances known, absorbing up to 99.96% of visible light (at 663 nm if the light is perpendicular to the material).The name is a compound of the acronym VANTA (vertically aligned carbon nanotube arrays) and the color black. Vantablack is not actually a color pigment or a paint, but a coating of carbon nanotubes. These have the property of absorbing incident light almost completely. Against a deep black background, objects coated in Vantablack material seem to disappear, as the perception of spatial depth is lost. This is because the human eye perceives shapes coated in Vantablack to be two-dimensional. IUPAC Name is Activated carbon high density skeleton. Other names are Multiwalled carbon nanotube (MWCNT), Vantablack S-VIS and Vantablack S-IR. It is insoluble in water. When light strikes Vantablack, instead of bouncing off, it becomes trapped and is continually deflected amo...

SCADA Network

So welcome to my blog. In this post I am gonna write about SCADA network. This actually come to my mind because of web show named Mr. Robot. The show is awesome if you love hacking believe me you will enjoy the series. So basically the SCADA ( Supervisory Control and Data Acquisition ) is a control system architecture comprising computers, networked data communications and graphical user interface for high level process supervisory management, while also comprising other peripheral devices like programmable logic controllers and discrete proportional-integral-derivative controllers to interface with process plant or machinery. SCADA networks used for monitoring and controlling the  industry like  telecommunication, water plant, etc. It is one of the most commonly used industrial control system, in spite of concerns about SCADA system being vulnerable to cyberattack.  This network is used for gathering info about the system, transferring that info to central site, alerting...