Page 51 - Cyber Warnings
P. 51
Implementation can be as simple as choosing a preprogrammed, bare-bones honeypot from a
dropdown menu. Or, custom lures can be designed and deployed based upon the type of
information to be collected.
What types of phishing scams are hot right now, or what are the most active and dangerous
sites? Which ports are popular? Honeypots have different characteristics that lure and capture
specific types of traffic, and therefore, intelligence.
MHN is an open source project; users are encouraged to feed it events while becoming a part of
a larger sensor grid. MHN low-interaction honeypots can be placed on the perimeter of a
network—to see who’s trying to break in—or deep into protected spaces. Deployed inside of a
network, honeypots can catch compromised hosts that are internally scanning your network or
detect a malicious insider doing something they should not be doing. A honeypot acts as early
warning system.
51 Cyber Warnings E-Magazine – March 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide