Skip to main content

Featured

Honeypot & its Types

Honeypot & its Types: Honeypot is a security mechanism which records all the actions, transactions and interactions with users. They are used to track the attackers and defend the attacks. Based on their deployment types, it is classified into – Production honeypots –  Easy to use but they capture only limited information. They are placed inside production networks to improve security. Research Honeypots -Works better in gathering information about attackers. They research the threats of the organization and tries to prevent the threats. These are complex to deploy and maintain. Based on design criteria, the honeypots are classified into – Pure honeypots – Activities are monitored using the honeypot’s installed link to the network. High interaction – Multiple honeypots in a single system. More secure, difficult to detect, expensive to maintain. Low interaction – Simulate the services of attackers.

Malware analysis procedure

Malware analysis procedure:

The malware analysis procedure involves a set of steps which includes –

  • Allocate physical or virtual system – Infect the system with a malware and identify the responses of the system. We can find ways to prevent or erase in case infections happen.
  • Makes use of analysis tools – Find previous malware attacks of the system and get detailed analysis.
  • Static Property analysis – Analysis of static properties and used to detect worms, viruses, trojans etc.
  • Interactive behavior analysis – To interact with the malware and identify the reactions based on our actions.
  • Manual code reversing – Decrypt the data to find the algorithm which generated the malware in the first place.
  • Combining malware analysis steps- Combine any of the two or more above steps to find a combined solution.

Popular Posts