Honeynets
Is an actual network of computers left in their default (and insecure) configuration. This network sits behind a firewall where all inbound and outbound details contained, captured and controlled. This captured information is then analyzed to learn the tools, tactics, and motives of the hacker community.
Requirements of Honeynets:
1-Data Control
Reduce risk – cannot be used to harm others
2-Data Capture
Detect and capture all the blackhat’s activities
3-Data Analyze
Analyze what the blackhat has done
Types of Honeynets:
1. Gen I Honeynets
2. Gen II Honeynets
3. Gen III Honeynets
4. Distributed Honeynets
5. Virtual Honeynets
How Honeynet works:
A honeynet, just like honeypots, works by creating a highly controlled environment. Honeynets as opposed to honeypots though takes the concept one step further. Instead of just one computer or a number of unconnected computers, a network is set up in such a way that everything in the honeynet appears like a normal network. All applications and services are real though all systems running within the honeynet are considered honeypots.