The traps of honeypot to detect cyber attacks
Every day, many companies suffer by Cyber-attacks which has negative consequences which results from losing all theirs data to paralyze the function of the internal system of the company. Honeypot is a concept which has been developed by computer security and makes possible to attract and trap hackers to insecure servers using a virtual machine in order to identify them and to be able to trace the attack. For example: to get hacker’s IP address the software used and what items edited. We can also classify the honey pots depends on the degree of interaction:
Types of the honeypots
Low-interaction honeypots: Its allows to have a limited interaction for certain services requested by attackers and secure other networks in the system. This type of interaction must accept the all incoming connection. For the purpose of being able to detect unauthorized services.
High-interaction honeypots: here, we use a high level of security, since we involve the real systems and we allow attackers to access all the networks of our machine in order to have a detailed vision on the different unauthorized system used by attackers.
This detection system is placed in production servers which contains several false informations in order to be able to control attacks. The company must reduce the system of open connections and avoid the risks which can cause the stabilization of the system, while respecting legal framework, for objective to fight cybercrime. Finally, honeypot is consider like a complement to security systems.