Intrusion detection reviews for network security
Your Internet network security policies-Time for a rewrite
Honeypot intrusion detection techniques-The Trojans trap the Greeks
McAfee Firewall reviews
Norton personal firewall reviews
Sygate Personal firewall reviews
Why use personal firewalls?The basics
Honeypot Intrusion detection reviews for networking security
Sponsored LinksWhat is honeypot intrusion detection ?
Intrusion detection Honeypots are like Trojans using the Trojan Horse to trap the Greeks!
Assume the Greeks have left the Trojan horse with their soldiers at the gates of Troy. The Trojans drag the Trojan
horse into Troy. The Greeks creep out of the Trojan horse late at night...only to find the entire Trojan army waiting to
dismember them.
The Honeypot intrusion detection principle
The Trojan role reversal is the basic Intrusion detection honeypot principle. Intrusion detection honeypots allow you to lay a trap for the hacker or cracker who forever uses Trojans of varous kinds against you.
Intrusion detection honeypots are typically :
- System files or system utilities that 'leave traces' when a hacker or cracker tries to access them
- As the name suggests,intrusion detection honeypots are like 'pots of honey' that appear to be mission critical information but are harmless pieces of information meant to trap the hackers.
Are intrusion detection honeypots risky?
Intrusion detection honeypots are risky,since they do intentionally provide real access to system files. In case the hacker or intruder is smart enough , he could actually use the intrusion detection honeypot to compromise theentire system and lay his hands on the 'real honey' in the form of mission critical data and sensitive data.
Types of intrusion detection honeypots
- Production or military grade intrusion detection honeypots
- The production or military grade intrusion detection honeypots capture a lot of information about the hacker or intruder.
- Production or military grade intrusion detection honeypots are more complex and difficult to create.
- Research based honeypot intrusion detection systems
- The research based honeypot intrusion detection systems are simpler and easier to create
- Research based honeypot IDS are typically used by corporates
- Research based honeypot intrusion detection systems capture limited information about the network intruder.