[Snort-users] VERY simple 'virtual' honeypot
lance at ...2024...
Thu Mar 7 20:35:04 EST 2002
Most honeypots work on the same concept, a system that has no
production activity. You deploy a box that has no production
value, any packets going to that box indicate a probe, scan, or
attack. This helps reduce both false positives and false
negatives. Exampls of such honeypots include BackOfficer Friendly,
DTK, ManTrap, Specter, and Honeynets.
However, I was just thinking, why bother deploying the box?
Why not create a list of Snort rules that generate an alert
whenever a TCP/SYN packet or UDP packet is sent to an IP
address that has no system? This could incidate a probe,
scan or attack, the same principles of a honeypot, but
without deploying an actual system.
Of course this does not give you the Data Capture capabilites
of a honeypot, as there is no system for the attacker to
interact with. However, this could be used to help detect
scanning or probing activity.
More information about the Snort-users