From the course: Cisco Network Security: Intrusion Detection and Prevention

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Using IDS and honeypots

Using IDS and honeypots - Cisco Routers Tutorial

From the course: Cisco Network Security: Intrusion Detection and Prevention

Start my 1-month free trial

Using IDS and honeypots

- [Instructor] In addition to classic signature and heuristic-based intrusion detection, another way to use intrusion detection is to implement a honeypot-based detection. A honeypot is a system to set up and lure a would-be attacker with a goal of observing their behavior and attack methods to better protect the network by distracting attackers from hitting the real target or to gather forensic evidence required to aid in the apprehension or prosecution of intruders. Placement of a honeypot depends on your objectives. It can be inside the land, outside the network boundary, or in the DMZ as a tasty treat for a would-be attacker. When using a honeypot as part of an intrusion detection system, keep in mind the main focus is on gathering information. Once an intruder breaks into a system, many times they'll come back for subsequent visits where more information can be monitored and saved. Make sure you defend the internal network, because even though this is a fake system they're…

Contents