As we reach the end of our project, we have learned a great deal about the Raspberry Pi, as well as honeypots and their place in cyber security. There is still much to be done and the Raspberry Pi Cyber Internship Team is hard at work deliberating on how to expand the scope of our research; however, we have successfully been able to answer the questions presented during the initial stage of the project.
After a long semester of work, we are almost done with our final report. After our final analysis, our team believes that Raspberry Pis are a viable alternative to consumer grade honeypots. Their low cost and minimal digital footprint make them a very effective sensor for a honeypot network. Raspberry Pis are also much easier to deploy than conventional setups. We have also determine that if proper load balance was introduced between multiple Raspberry Pis, it would be almost impossible to overrun the sensors with traffic, making them an extremely robust component in a honeypot. One remaining concern we have is that scanning the sensors with Nmap identifies them as a honeypot A honeypot is supposed to look like just another regular part of the network so it should not be broadcasted as a honeypot. We are going to continue our research by finding ways to circumvent this concern in the future.
We will be sharing our progress and findings in future blog posts throughout the coming months. If you have questions or comments about the project, you can leave a comment or contact the LCDI via Twitter @ChampForensics or via email at email@example.com.