Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Michael Kuritzky and Guy Cepelevich Supervisor: Amichai Shulman.

Similar presentations


Presentation on theme: "By: Michael Kuritzky and Guy Cepelevich Supervisor: Amichai Shulman."— Presentation transcript:

1 By: Michael Kuritzky and Guy Cepelevich Supervisor: Amichai Shulman

2  Wikipedia: “In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource of value to attackers.”computernetwork 2M. Kuritzky & G. Cepelevich, Technion2010

3  Deploy a honeypot on the web.  Gather information about the usage of the deployed honeypot (requests and replies).  Store the data for future use.  Devise a tool to conveniently review and manually analyze the info gathered from the honeypot in order to create automatic “rules” that will categorize and filter the existing, and new information. 3M. Kuritzky & G. Cepelevich, Technion2010

4  Deploy a honeypot on the web:  In order to entice possible attackers into using our Honeypot, we “offered” them a service – an anonymizing proxy server, a very popular “tool” in the “scene”.  We used Amazon’s EC2 (Elastic Compute Cloud) machine to run the anonymizing proxy. 4M. Kuritzky & G. Cepelevich, Technion2010

5  Gather information about the usage of the deployed honeypot (requests and replies):  We used Privoxy (available from sourceforge.net) to monitor the traffic and record&store the raw traffic logs in an Amazon EBS (Elastic Block Storage) volume. 5M. Kuritzky & G. Cepelevich, Technion2010

6  Store the data for future use:  We wrote a parser to parse the raw privoxy logs.  The parser goes over the logs, one line at a time (to avoid memory problems), and parses it using several Regular Expressions (a.k.a Voodoo ).  We also wrote a listener which registers with the parser, and is called whenever the parser finishes parsing an entry.  The listener inputs the parsed entry into a MySQL database for future analysis. 6M. Kuritzky & G. Cepelevich, Technion2010

7  We use the following tables to store the entries in the DB: 2010M. Kuritzky & G. Cepelevich, Technion7

8  Devise a tool to conveniently review and manually analyze the info gathered from the honeypot in order to create automatic “rules” that will categorize and filter the existing, and new information:  This is the largest part in the system and will be covered in the next couple of slides. 8M. Kuritzky & G. Cepelevich, Technion2010

9  The system consists of 3 panels:  Entries Panel:  Convenient display of entries from the DB (all entries, or entries matching a certain rule).  Allows on-the-spot manipulation on the entries. 2010M. Kuritzky & G. Cepelevich, Technion9

10  The system consists of 3 panels:  Rule Editing Panel:  Interface for creating “rules” for automatic data manipulation. 2010M. Kuritzky & G. Cepelevich, Technion10

11  The system consists of 3 panels:  Rule Management Panel:  Interface for activating and deactivating existing rules. 2010M. Kuritzky & G. Cepelevich, Technion11

12  Interest level  Many entries result from regular internet usage; those can often be automatically marked as uninteresting using our rule system.  Some entries, on the other hand, entail potential attacks (sql injection, automation, etc.). those can be marked as interesting, and then manually processed.  Tags  Using our rule system, the user can automatically assign tags to entries that match certain patterns (e.g. suspicious user-agents). 2010M. Kuritzky & G. Cepelevich, Technion12

13 A simple rule to catch porn And the results: ~1000 entries Most requests come from the subnet 2010M. Kuritzky & G. Cepelevich, Technion13

14 Suspicious user-agents: users who claim to use Windows 98 And the results: ~9000 entries 2010M. Kuritzky & G. Cepelevich, Technion14

15  The project was written fully in Java, for the following reasons:  Developers’ experience.  Extensive integrated and third-party library support (i.e. JDBC for database connections).  In order to organize and save all the information gathered from our Honeypot, we used a MySQL database. This platform was chosen due to several reasons:  Very common  Free  Easy to access  Existing management tools  Easy to write rules on the entries  Developers’ experience 15M. Kuritzky & G. Cepelevich, Technion2010

16  Make the SQL queries more efficient (currently we have a problem dealing with databases with a large number of entries).  Make the user defined queries more structured and guided.  Support for creating automatic queries from multiple selection from the entries table.  Support for reconstruction and “replay” of requests. 2010M. Kuritzky & G. Cepelevich, Technion16

17 2010M. Kuritzky & G. Cepelevich, Technion17


Download ppt "By: Michael Kuritzky and Guy Cepelevich Supervisor: Amichai Shulman."

Similar presentations


Ads by Google