Skip main navigation

Honeypots

Information on what attackers are likely to do (also called intelligence) can be very useful in helping defend against attacks
© Coventry University. CC BY-NC 4.0
The information on what attackers are likely to do (also called intelligence) can be very useful in helping the SOC defend against attacks.
Some of this we will get from observing attacks on our system, but if the SOC has done its job properly, that will only get you so far. Now you can put up the equivalent of a sign on the internet which invites people to attack you, but that is not a good idea and will probably invalidate any cyber insurance that you may have.
Another approach is to use what is called a honeypot (you may also come across the term honeynet – this is simply a network of honeypots). A honeypot is special computer that a) contains no files or information of actual value, and b) is walled off from the rest of the environment.
This type of computer provides two valuable sources of information for the SOC. The main source of information is on what the attackers are doing and we will look at this in much more detail later. The second piece of information is often overlooked, but it is the one that interests us now when we are setting up the SOC and that is it can act as a test bed for our monitoring systems and software as honeypots have to be very carefully monitored, and normally in a manner that does not indicate just how closely they are being monitored.
Honeypots are normally classed by the level of interaction they allow a user to have with them. Some honeypots are simply full machines which are patched and have basic security installed, but don’t have special measures put in place to protect them. These are called high interaction honeypots and you can gain a lot of intelligence from them. However, they are easier for an attacker to compromise so they need to be very carefully isolated from the rest of the system and they do require a lot of looking after as you will have to frequently reset them.
A more common approach used by SOCs just wanting to test their systems is to use a low interaction honeypot. These honeypots will not give you as much information, but are easy to set up and maintain. A low interaction honeypot emulates a range of services so it looks like an http server, an ftp, server, an ssh server, etc, but does not allow the full range of interaction that these services would normally allow. This reduced functionality means that it is easier to secure the programs that run these honeypots.
© Coventry University. CC BY-NC 4.0
This article is from the free online

Security Operations

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education