June 30, 2016
-
Joe Franscella
,

The Advantages of a Modern Honeypot

<p>Operations of every size and in every industry need consistent, reliable threat intelligence. The consequences of a virus attack or data breach are devastating. Some businesses never recover from the damage. Some studies report that as few as <a href="http://www.homelandsecuritynewswire.com/gartner-only-6-percent-companies-survive-longer-two-years-after-losing-data" target="_blank">6% of businesses</a> who experience data loss are still in operation two years later.</p><p>The best strategy currently out there is to observe would-be attackers via a modern honeypot. That entails setting up decoy web assets and monitoring them for suspicious behavior. Since web traffic leaves distinctive data trails, traffic to your honeypot can be studied for clues about the identity and methods of hackers. A modern honeypot can take many forms such as:</p><ul><li><a href="https://en.wikipedia.org/wiki/Spamtrap" target="_blank">Email trap</a></li><li>Decoy database</li><li>Malware-detecting assets</li></ul><p>The modern honeypot is characterized as being either low or high-interaction, depending on the complexity. High interaction environments can encourage the hacker to spend a lot of time tooling about inside a phony environment, leaving lots of clues and wasting their time. Low interaction honeypots collect only basic info about invasive behavior but are smaller and use fewer resources.</p><p>Anomali understood the need for a comprehensive library of information on hackers and introduced the <a href="https://www.anomali.com/blog">Modern Honey Network</a>, an open-source honeypot framework. Open source software programs are not only free to download, but their source codes can be custom edited by users. When you host a <a href="https://www.anomali.com/blog">modern honeypot</a>, you have a lot of options. The low-stake web environments appear as a legit asset to outsiders. It’s best to use a combination of different types of honeypots together.</p><p>When you use the MHN, you have the upper hand. All honeypots collect visitor data, but it is comparing that information against years of traffic data collected from networks worldwide that makes it special. When your threat intelligence framework can compare your web traffic logs to an ever-growing log of threats, you have much higher quality intelligence.</p><p>Since the introduction of the modern honeypot, cyber criminals have been challenged to further protect their identities. Knowing that they may be tracked, hackers spend more effort concealing themselves and less time invading networks.</p><p>It used to be a substantial undertaking to sponsor a modern honeypot system. Source code, web space, and staff to monitor the collected data used to prove too costly for many. Now with open source code, the option of monitoring for attacks before they occur full-scale is now available to small to medium businesses and even private users at home.</p><p>People managing a network must protect its assets for the good of the company. It’s also important to protect your computers from being used by an outsider to attack others. Your networks processing capability could be leveraged to hack and spam others without your knowledge. Your enterprise needs to look out for early signs of intrusive behavior especially if you have:</p><ul><li>Employees opening emails from company or private accounts</li><li>Staff discussing policy, plans, or anything from which competitors could benefit</li><li>Any type of personal data such as employee addresses or client/patient records</li><li>Work such as research, innovations, or creative media</li></ul><p>Learning of exploratory behavior is your best bet for protecting yourself from cyber-criminals. This advice is not just applicable to large scale financial and healthcare operations. SMB’s with limited personnel and financial resources are more vulnerable than their larger counterparts. Individuals who care about privacy and security can also benefit from a modern honeypot.</p><p>Intelligence is becoming the cornerstone for security. Organizations large and small are making threat intelligence a part of their day-to-day security operations, but variations persist, hinting at blind spots that will need to be addressed.</p><p>This market guide is the product of surveys and interviews with over 300 IT professionals and provides insight in purchase and use activities for both small and medium sized businesses and large enterprises. See your organization through the lens of this important survey. Download our free market guide today.</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-fda943c5-9d10-4128-b771-479fea367310"><span class="hs-cta-node hs-cta-fda943c5-9d10-4128-b771-479fea367310" data-hs-drop="true" id="hs-cta-fda943c5-9d10-4128-b771-479fea367310" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="https://www.anomali.com/resources/whitepapers/market-focus-employing-cyber-threat-intelligence" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=841be726-533d-4f0f-86da-0338d3986fb1&amp;placement_guid=fda943c5-9d10-4128-b771-479fea367310&amp;portal_id=458120&amp;redirect_url=APefjpE3abCN-350Z63At97DauUjIbDDUEdWKpUf2ONfHPBwUAjvpHfpkkAwUfFokb5Bm5MZB69bbhfU69llHcNy7ABajH9y8PtBMyC6h21b2raxDMmWgJ6pcfZTvgopWVCNsCJVQaRINJJweSl7B5rc6xOn7-JlL5Dcf6jssxonkekRYqqJ_gxebxuGDF_03p3DHbfw2txTrSFERWjjnH1mMde1ob8PbvMXiasOd5daYUZhm_CmaLOT_aIOmvo6lDjez0HSqmjKkWbNudlsvZL15R_Qch0cPhkqZ6egxXJQPfH-mAeFS3PWelQvvOXGWM8863ItepN9asEr96mwojQ8etiG9314Jg&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fthe-advantages-of-a-modern-honeypot&amp;canon=https%3A%2F%2Fblog.anomali.com%2Fthe-advantages-of-a-modern-honeypot&amp;pageId=4234754746&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&amp;__hssc=41179005.98.1478831861868&amp;__hsfp=1335165674" id="cta_button_458120_841be726-533d-4f0f-86da-0338d3986fb1" style="margin: 20px auto;" target="_blank" title="Get The Survey Here">Get The Survey Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, 'fda943c5-9d10-4128-b771-479fea367310', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.