Raspberry Pi Honeypot Network

IntroDUCTION

As we reach the end of our project, we have learned a great deal about the Raspberry Pi, as well as honeypots and their place in cyber security. There is still much to be done and the Raspberry Pi Cyber Internship Team is hard at work deliberating on how to  expand the scope of our research; however, we have successfully been able to answer the questions presented during the initial stage of the project.

Analysis

After a long semester of work, we are almost done with our final report. After our final analysis, our team believes  that Raspberry Pis are a viable alternative to consumer grade honeypots. Their low cost and minimal digital footprint make  them a very effective sensor for a honeypot network. Raspberry Pis are also much easier to deploy than conventional setups. We have also determine that if proper load balance was introduced between multiple Raspberry Pis, it would be almost impossible to overrun the sensors with traffic, making them an extremely robust component in a honeypot. One remaining concern we have is that scanning the sensors with Nmap identifies them as a honeypot A honeypot is supposed to look like just another regular part of the network so it should not be broadcasted as a honeypot. We are going to continue our research by finding ways to circumvent this concern in the future.

Conclusion

We will be sharing our progress and findings in future blog posts throughout the coming months. If you have questions or comments about the project, you can leave a comment or contact the LCDI via Twitter @ChampForensics or via email at lcdi@champlain.edu.

LCDI Twitter LCDI Facebook

More Research Projects
The Leahy Center Inventory Project
Social Media Footprint Awareness
My Experience on The VPN Comparison Team