Honey pots and honey nets are well known method to detect the attack. However, it requires establishment of dedicated infrastructure for the same. Work out an approach to implement the solution in live environment. The solution should be able to implement honeypot/honey net on actual live services (not dummy services created as bait), without posing a serious threat of organisation’s security.
Student should implement a live server (website or webmail) and honeypot/honey net along with it. Student should simulate some known attacks on the server and the solution should be able to detect the attack and redirect the attacker to honeypot/honey net and record his activities, path, his machines details and footprint.
Sample Data Required: No