Skip to main content

Honeypots of Cyber Security


Honeypot is a part of a study of Cyber Security. It is used for detecting or deflecting the problems or unauthorized attempts on Information System and also gathering the info. It is able to monitor, block or analyze the attackers. Honeypot is just used to attract the attackers to the system. You can say it is like a baiting the cyber criminals. It have a same application and system like the real system of computers. That's why attackers take this as a baits. This mostly used for understanding attackers behavior pattern.

Honeypot are classifieds on their deployment and based on their level of development.
Classification based on their deployment:-
  • Productions honeypots
They are easy to use but gather less info and mostly used by corporations. It is placed in production network along with other production servers. This honeypots are easy to deploy. They serve as a decoy system inside fully network and servers.
  • Research honeypots
They run to know the motive and tactics of Black Hat community. They are used to learn the system vulnerabilities to make better security system. They are also hard to deploy and gather extensive legitimate information.

Classification based on their level of deployment:-
  •   Pure honeypots
In this the activities of attackers are monitor by using the bug tap which are installed to the honeypots linked to the network. No other software needs to be installed. It is ensure more control mechanism.They are unsophisticated.
  • High-interactions honeypots
This imitate the activities of production system that host the variety of services. This allow the attackers to use lot of services and waste their time. By employing the virtual machine multiple honeypots can be run on one physical machine. Therefore, if honeypot even get compromised it can be restored.
  • Low-interaction honeypots
This stimulates the service only requested by attackers. That's why it consume less resource. It doesn't have complex system.

Comments

Popular posts from this blog

NVIDIA Tesla V100 - First Tensor Core GPU

  8x NVIDIA Tesla V100 32GB Server As we all know NVIDIA processor are so famous now a days. It give a perfect gaming performance and people used it worldwide. The thing is that it is not only use in personal computer but also at data center, where so many super computer are present for providing services. So, NVIDIA Tesla V100 is a first tensor core GPU. It is especially built to focus on AI, High Performance Computing ( HPC ) and graphics. It is powered by NVIDIA Volta Architecture. It comes with configuration 16 and 32GB and have a performance up to 100 CPUs in single GPU. A single server node with V100 GPUs can replace 60 CPUs nodes. DATA CENTER GPUs Image © NVIDIA NVIDIA V100 for NVLINK  Performance with NVIDIA GPU Boost for double precision is  7.8 teraflops and single precision is 15.7 teraflops. Deep learning performance boost is 125 teraflops. Interconnect bandwidth with bidirectional is 300 GB/s. It have memory capacity of 32/16 GB HBM2 with bandwidth 900GB/s. I...

The Amazing Vantablack Material...!!

Vantablack is a material developed by Surrey NanoSystems in the United Kingdom and is one of the darkest substances known, absorbing up to 99.96% of visible light (at 663 nm if the light is perpendicular to the material).The name is a compound of the acronym VANTA (vertically aligned carbon nanotube arrays) and the color black. Vantablack is not actually a color pigment or a paint, but a coating of carbon nanotubes. These have the property of absorbing incident light almost completely. Against a deep black background, objects coated in Vantablack material seem to disappear, as the perception of spatial depth is lost. This is because the human eye perceives shapes coated in Vantablack to be two-dimensional. IUPAC Name is Activated carbon high density skeleton. Other names are Multiwalled carbon nanotube (MWCNT), Vantablack S-VIS and Vantablack S-IR. It is insoluble in water. When light strikes Vantablack, instead of bouncing off, it becomes trapped and is continually deflected amo...

Operating System as Extended machine and Resource manager

Operating system is software that runs in kernel mode even that is not always true. Part of the problem is that operating system perform two essential unrelated function. We can say that operating system is system software that manages computer hardware, software resources, and provide common services for computer program.  The Operating System as an Extended machine The architecture of most computers at the machine language level is not developed and difficult to program, especially for input/output. To make this point more concrete, consider modern SATA hard disks used on most computers. Only the insane the programmer would try to mess with hard disks at the hardware level. Therefore disk driver - a piece of software deals with hardware and provide interface to read and write disks blocks. Operating System  contain many drivers for control input/output device. Macintosh hardware are complicated. Real processors, memories, disks, and other devices are very complicated and it...