Abstract:
In networking there is an ongoing war between security managers and crackers, each new day those crackers develop new techniques and technologies to achieve their goals of hacking our systems, and since they stay in the shadow its impossible for the security managers to know about them ,their tools and goals.
But this is changing , with the rise of HoneyPots technologies administrators could learn about their enemies tactics and motivations, which will definitely help achieving a better security level.
The value of HoneyPots and how could they be used is the main area that this study will show, types of HoneyPots available today will be covered and the way to implement them will be discussed, it will also show the draw backs of the current available network protection tools, and how HoneyPots could be used in order to fulfill the gaps they have.
A new technique will be discussed , this new model will mix HoneyPots with real production systems in order to achieve a greater success in fooling the hackers into the HoneyPot trap,and then study them carefully.
This model has been implemented and installed into the severs which have internet access to them ,a new logging mechanism have logged all of the information of different attacks to the honeypots system, this data was analyzed and and summary reports were generated.