Honeypot: Difference between revisions
imported>Sandy Harris m (fix a link, bypass disambig) |
John Leach (talk | contribs) m (Text replacement - "{{subpages}}" to "{{PropDel}}<br><br>{{subpages}}") Tag: Reverted |
||
Line 1: | Line 1: | ||
{{subpages}} | {{PropDel}}<br><br>{{subpages}} | ||
A '''honeypot''' is a computer, attached to a network, intended to attract the malicious interest of [[miscreant]]s. It may attract automated attack software, or deliberate penetration attempts. There are multiple reasons for having honeypots, which have evolved over time. Today's most common application is both as an early warning of attacks specifically intended for a protected resource, and the general capture of attack vectors so countermeasures can be developed. | A '''honeypot''' is a computer, attached to a network, intended to attract the malicious interest of [[miscreant]]s. It may attract automated attack software, or deliberate penetration attempts. There are multiple reasons for having honeypots, which have evolved over time. Today's most common application is both as an early warning of attacks specifically intended for a protected resource, and the general capture of attack vectors so countermeasures can be developed. | ||
Revision as of 04:48, 8 April 2024
This article may be deleted soon. | ||
---|---|---|
A honeypot is a computer, attached to a network, intended to attract the malicious interest of miscreants. It may attract automated attack software, or deliberate penetration attempts. There are multiple reasons for having honeypots, which have evolved over time. Today's most common application is both as an early warning of attacks specifically intended for a protected resource, and the general capture of attack vectors so countermeasures can be developed. The first honeypots were visible and intended to attract the notice of humans, with names suggesting they might contain money, erotica, or secrets. This was done at a time when miscreants were primarily motivated by personal challenge, and it became apparent that the psychology of honeypot use could be complex. If a miscreant found he had been tricked into a honeypot, he might become enraged and start a concerted attack. For this reason and others, it is essential that honeypots be as isolated as possible from actual resources. Often, they are "air gapped", having no physical connection to an internal network. Honeypots can also be deployed completely within an inside network, to detect trusted abusers of resources. Honeypots and sinkholes have some commonality of use, in that they both provide targets for attack. The honeypot, however, is more isolated yet made to be more attractive, where sinkholes are more an automated protective mechanism for diverting large-scale attacks. |