Deception And Disruption Flashcards
Honeynet
Is multiple, linked honeypots that simulate a network environment
DNS sinkhole
Sinkhole is a DNS server that response with false results. DNS sinkholes can be captured and analyses . Sinkholes are most often used to seize control of botnets by interrupting DNS names of the bot that is used by malware
SPAM trap
Spam traps (fake email address) are used to identify and block spammers. Legitimate email is unlikely to be sent to fake address, so when an email is received it is most likely spam
Honey Token
Is a beacon embedded into a document, databases, images, directory and folders. Honey-tokens are used to identify the attacker. Are used to track malicious actors and collecting critical information about their identity and methods used to exploit the system. Putting traceable data to the honeynet.
Honey traps
Are a deception technique that allows security defenders to understand attacker behaviors and patterns. Based on a design and deployment models, they are intended to look legitimate to attackers.
Honey traps :
Honeypot
Honey files
Honey net
Honey tokens
Honeypot
This is a decoy system (self defense system, gives a false impression) i.e we server,
Honey pots can be divided into :
High interaction
Low interaction
Deception and disruption
Techniques and practices are used to deceive potential attackers with the goal of threat intelligence collection and early breach detection
Honey file
Is a decoy file located in network files folder. Is designed to detect access and exploration attemps,