How a Honey Monkey Works

A honey monkey is a new method that is used to identify websites that exploit vulnerabilities in Web browsers. Honey monkeys are set up on a network of computers for the sole purpose of crawling the Internet and searching for websites that use malicious codes to install malware on your computer.

How a Honey Monkey Works

A honey monkey consists of a virtual computer network that is designed for browsing the Internet to discover websites that contain files with malicious intent by detecting harmful codes that are embedded into the infrastructure of the site. In addition to searching for malicious websites, the honey monkey computer is used to receive the malware in an effort to identify the hacker and develop solutions for patching Web browser vulnerabilities and improving Web browser security.

Honey monkeys contain a software system that is similar to the system in personal computers. The software systems form a virtual network system that searches the Internet for websites that contain malicious codes that can be downloaded by unsuspecting computer users. The websites that are visited by the honey monkey are seen in the same way as a personal computer would view them, only the honey monkey is simulating the computers that are running on a Windows platform.

When the malicious file is detected on the website by the honey monkey, an alarm system is set off in the honey monkey computer. After the alarm is set off, logs and reports of the websites are automatically generated. The logs and reports describe the nature of the malicious file as well as the website of origin.

Strider Honey Monkey

A strider is a specific type of software that is used in conjunction with a honey monkey that is designed to identify the intentions that the malicious code has for the receiving computer. It assesses the harmful code injection and the damage that it can inflict of the computer's operating system and parameters. This process is known as a strider honey monkey.

Honey monkey systems are used to help identify vulnerabilities in Web browsers so that a security patch can be developed to repair the problem. They are also used to identify hackers and the websites they use to generate malicious code. Honey monkeys are useful for preparing the public for future attacks and are the primary tools used by Microsoft and others for developing security patches that improve Web browser security. They are also used by companies and organizations to provide added security to the network system.

Log in or sign up to comment.

Post a comment

Log in or sign up to comment.

A computer crash can occur at anytime and on any computer.

By backing up your files--personal documents, financial records, and digital pictures--you can ensure that you will never loose your precious and irreplaceable information.

There are many ways one can back up a computer: special equipment or online programs, which are becoming increasingly popular, can help you to create a sort of 'insurance policy' for the protection of all of your computer-based data.