May 31, 2016
-
Joe Franscella
,

How To Make Your Modern Honeypot an Enterprise Defense

<p>The modern honeypot is a security tool developed using <a href="http://www.darkreading.com/analytics/threat-intelligence/open-source-tool-aimed-at-propelling-honeypots-into-the-mainstream/d/d-id/1278726" target="_blank">open-source framework</a>. Honeypots are like interactive traps which are useful to study would-be attackers. Enterprises host a no-stakes entity such as a website that attracts threats including invasive bots and attackers. Criminals are trying to access proprietary data, client leads, personnel biographical data, financial transaction data, internal memos, or anything of value. Honeypots are created to monitor, record, and analyze hackers’ behavior.</p><p>The purpose of sponsoring a honeypot is to gain useful intelligence about threats. A decoy network is established with the assumption that all traffic to it is uninvited and malicious. Witnessing and examining attacks lead to identifying and catching cyber-criminals. Studying invasive behavior exposes system vulnerabilities. This tactic works outside the network where it can scan for threats. It works within the network to detect breaches coming from within or targeted outsider attacks.</p><p>The reputation of your company and consumer confidence in your web store are assets. Consider a honeypot to protect against costly repairs and loss of irreversible social collateral. Use it proactively to defend your business from email hacks, browser attacks, breaches of secure data.</p><p>Security applications like the modern honey pot date back almost to the beginning of the web. The need for threat management was evident not long after people took to the Internet and the scientific community witnessed the inevitable lawless period characteristic of any frontier. The market for an effective decoy was evident; however, the complexity of their nature made them expensive to develop and labor-intensive to maintain. Prohibitive costs had put honeypots beyond the means of many businesses for a long time.</p><p>How can small or medium sized businesses use a honeypot today? More recently, developments allowed honeypots to be accessible to enterprises of any size or budget. Free open-source architecture for implementing custom honeypots is based on a downloadable program, Modern Honey Network. Hosting, customization, and ongoing management of the software do carry inherent costs, as does using the information collected. However, the tool itself is made free for the greater good. Credit for development of the <a href="https://github.com/Pwnlandia/mhn" target="_blank">Modern Honey Network goes to ThreatStream</a>.</p><p>How do you choose which kind of honeypot to use? A modern honeypot may take many forms. You may set up an email account that isn’t used for any other purpose than identifying spammers who’ve scanned the web for addresses to solicit. A high-interaction resource in the guise of a phony web environment can be hosted to monitor malware. If your IT security team hasn’t already suggested building a modern honeypot, it is perhaps out of their league. If this is the case or if you have no security staff, consider hiring specialists to build and manage it. The struggle to have superior technology continues to escalate. Spammers and other criminals now have <a href="http://www.csun.edu/~deb53351/Papers/Krawetz_Anti_Honeypot.pdf" target="_blank">honeypot detectors</a> in their arsenal.</p><p>This responsibility may be best left to professionals. Working with an <a href="https://www.anomali.com/blog/shockpot-exploitation-analysis">experienced service</a> to deploy your honeypot gives you the benefit of their skills as well as the aggregate of the other intelligence collected. Why not compare the “fingerprints” in your honeypot against as large of a bank of samples as possible?</p><p>Internet security is a high-stakes game. Having a honeypot gives you peace of mind that you're taking the most technologically advanced measure available. A modern honeypot is a relatively new tactic. However, the principle of guarding new treasures with the newest traps is as old an idea as the invention itself. It's time-tested wisdom that due diligence has the greatest return on investment.</p><p>Download our free white paper that describes the Anomali Match model which focuses on prioritization and relevance for both security operations and threat analysts.</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-522663a1-2e23-4655-9c36-592b876fdb70"><span class="hs-cta-node hs-cta-522663a1-2e23-4655-9c36-592b876fdb70" data-hs-drop="true" id="hs-cta-522663a1-2e23-4655-9c36-592b876fdb70" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_3455}" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=ae87b536-87f5-4cf1-85e5-1cf25faf63c6&amp;placement_guid=522663a1-2e23-4655-9c36-592b876fdb70&amp;portal_id=458120&amp;redirect_url=APefjpHluOEqdEXC3-2mMG4iOybZD4cKXAhXu1d-RUVYtMbtRO6ShcOE_P62JJqIrHRij-idP0R5SGhAJAAfvcgGGY_bDPLnWZBzBxlogulPZl1oh3JvpN7e_--Oifl5SJu95C4YKglNzY3J-_LNXvaQpWwwPEQTB2m35m-hrCNYHbv2EN75D5QaKQZECwuxLhcjMHHCIHkHKLBoyBNW3-GF2Dtw-vXkSxgkIFJXFzWuvcC5YUbYrqYkF4csmfR8LPbH4UAgLa0I6cqQ7fdH73Av-tFthO1Iogy78pMwTVWPO2wEEqfgo-DaHvTqow-zcW4NYstw8kzqemicltRtfK5Ruxb0ajeVskY4mNifvRPShQXY7r9IwTXinCH7oil8jQI0NyoK-yKu&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fhow-to-make-your-modern-honeypot-an-enterprise-defense&amp;canon=https%3A%2F%2Fblog.anomali.com%2Fhow-to-make-your-modern-honeypot-an-enterprise-defense&amp;pageId=4165835276&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478831861868.1478887113345.180&amp;__hssc=41179005.11.1478887113345&amp;__hsfp=1335165674" id="cta_button_458120_ae87b536-87f5-4cf1-85e5-1cf25faf63c6" style="margin: 20px auto;" target="_blank" title="Free Download Here">Free Download Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, '522663a1-2e23-4655-9c36-592b876fdb70', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.