翻訳と辞書
Words near each other
・ Honeymoon Lodge
・ Honeymoon Punch
・ Honeymoon registry
・ Honeymoon rhinitis
・ Honeymoon Suite
・ Honeymoon suite
・ Honeymoon Suite (album)
・ Honeymoon Travels Pvt. Ltd.
・ Honeymoon Trio
・ Honeymoon Uranium Mine
・ Honeymoon Well mine
・ Honeymoon-Hangover Effect
・ Honeymooner
・ Honeynet Project
・ Honeypot
Honeypot (computing)
・ Honeypot (tourism)
・ Honeypot ant
・ Honeypot Wood
・ Honeypots in espionage fiction
・ Honeyri
・ Honeyri-ye Do
・ Honeyri-ye Seh
・ Honeyri-ye Yek
・ Honeyroot
・ Honeys (album)
・ Honeysucker
・ Honeysuckle
・ Honeysuckle (disambiguation)
・ Honeysuckle (film)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Honeypot (computing) : ウィキペディア英語版
Honeypot (computing)

In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site but is actually isolated and monitored, and that seems to contain information or a resource of value to attackers, which are then blocked. This is similar to the police baiting a criminal and then conducting undercover surveillance, and finally punishing the criminal.
== Types ==
Honeypots can be classified based on their deployment (use/action) and based on their level of involvement. Based on deployment, honeypots may be classified as:
#production honeypots
#research honeypots
Production honeypots are easy to use, capture only limited information, and are used primarily by companies or corporations. Production honeypots are placed inside the production network with other production servers by an organization to improve their overall state of security. Normally, production honeypots are low-interaction honeypots, which are easier to deploy. They give less information about the attacks or attackers than research honeypots.
Research honeypots are run to gather information about the motives and tactics of the Black hat community targeting different networks. These honeypots do not add direct value to a specific organization; instead, they are used to research the threats that organizations face and to learn how to better protect against those threats. Research honeypots are complex to deploy and maintain, capture extensive information, and are used primarily by research, military, or government organizations.
Based on design criteria, honeypots can be classified as:
#pure honeypots
#high-interaction honeypots
#low-interaction honeypots
Pure honeypots are full-fledged production systems. The activities of the attacker are monitored by using a casual tap that has been installed on the honeypot's link to the network. No other software needs to be installed. Even though a pure honeypot is useful, stealthiness of the defense mechanisms can be ensured by a more controlled mechanism.
High-interaction honeypots imitate the activities of the production systems that host a variety of services and, therefore, an attacker may be allowed a lot of services to waste his time. By employing virtual machines, multiple honeypots can be hosted on a single physical machine. Therefore, even if the honeypot is compromised, it can be restored more quickly. In general, high-interaction honeypots provide more security by being difficult to detect, but they are expensive to maintain. If virtual machines are not available, one physical computer must be maintained for each honeypot, which can be exorbitantly expensive. Example: Honeynet.
Low-interaction honeypots simulate only the services frequently requested by attackers. Since they consume relatively few resources, multiple virtual machines can easily be hosted on one physical system, the virtual systems have a short response time, and less code is required, reducing the complexity of the virtual system's security. Example: Honeyd.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Honeypot (computing)」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.