Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad.

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

Uzair Masood MASYU001.  What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use.
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Security Administration Tools and Practices Amit Bhan Usable Privacy and Security.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Dec, Honeyd Virtual Honeypot Frame Work Niels Provos Presented by: Fadi MohsenSupervised by: Dr. Chow CS591 Research Project Presented by: Fadi Mohsen.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
Honeynet/Honeypot Project - Leslie Cherian - Todd Deshane - Patty Jablonski - Creighton Long May 2, 2006.
Intrusion Prevention System DYNAMIC HONEYNET by Rosenfeld Asaf advisor Uritzky Max.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
1 The Honeynet Project: Trapping the Hackers Lance Spitzner, Sun Microsystems Presented by Vikrant Karan.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Introduction to Honeypot, Botnet, and Security Measurement
Speaker : Hong-Ren Jiang A Novel Testbed for Detection of Malicious Software Functionality 1.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
HONEYPOT.  Introduction to Honeypot  Honeytoken  Types of Honeypots  Honeypot Implementation  Advantages and Disadvantages  Role of Honeypot in.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Honeypots. Your Speaker Lance Spitzner –Senior Security Architect, Sun Microsystems –Founder of the Honeynet Project –Author of Honeypots: Tracking Hackers.
Deploying Honeynets Dodge, Jr., & Ragsdale - Presentation by Janakiram Dandibhotla.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Honeynets Detecting Insider Threats Kirby Kuehl
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Security tools. Outline Firewalls and network design Honeybots IPTables Snort.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Introduction to Honeypot, measurement, and vulnerability exploits
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Honeypots Today & Tomorrow. Speaker Involved in information security for over 10 years, 4 with Sun Microsystems as Senior Security Architect. Founder.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
DoS/DDoS attack and defense
Role Of Network IDS in Network Perimeter Defense.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
O honeynet Project Lognitive.com Disclaimer This is a technical session that contain non- technical content. Get relaxed so to get ready for some details.
Top 5 Open Source Firewall Software for Linux User
Chapter 7: Identifying Advanced Attacks
Putting It All Together
Putting It All Together
Firewalls.
Honeypots and Honeynets
Honeypots and Honeynets
Honeypots and Honeynets
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Chapter 4: Protecting the Organization
Security Overview: Honeypots
Honeypots Visit for more Learning Resources 1.
Introduction to Internet Worm
Presentation transcript:

Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad Mehedy Masud

What are Honeypots Honeypots are real or emulated vulnerable systems ready to be attacked. Definition: “ Honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource ” ◦ Primary value of honeypots is to collect information. ◦ This information is used to better identify, understand and protect against threats. ◦ Honeypots add little direct value to protecting your network.

Why HoneyPots A great deal of the security profession and the IT world depend on honeypots. Honeypots are used to ◦ Build anti-virus signatures ◦ Build SPAM signatures and filters ◦ Identify compromised systems ◦ Assist law-enforcement to track criminals ◦ Hunt and shutdown botnets ◦ Malware collection and analysis

Advantages and Disadvantages Advantages ◦ Collect only small data sets(only when interacted), which is valuable and easier to analyze. ◦ Reduce false positives – because any activity with the honeypot is unauthorized by definition ◦ Reduce false negatives – honeypots are designed to identify and capture new attacks ◦ Capture encrypted activity – because honeypots act as endpoints, where the activity is decrypted ◦ Work with IPv6 ◦ Highly flexible – extremely adaptable and can be used in a variety of environments ◦ Require minimal resources

Advantages and Disadvantages Disadvantages ◦ Honeypots have a limited field of view – see only what interacts with them. Can’t be used to detect attacks on other systems. ◦ However, there are some techniques to redirect attackers’ activities to honeypots. ◦ Risk – attacker may take over the honeypot and use it to attack other systems.

Types of Honeypots Server: Put the honeypot on the Internet and let the bad guys come to you. Client: Honeypot initiates and interacts with servers Other: Proxies

Types of Honeypots Low-interaction ◦ Emulates services, applications, and OS’s ◦ Low risk and easy to deploy/maintain ◦ But capture limited information – attackers’ activities are contained to what the emulated systems allow High-interaction ◦ Real services, applications, and OS’s ◦ Capture extensive information, but high risk and time intensive to maintain ◦ Can capture new, unknown, or unexpected behavior

Examples of Honeypots BackOfficer Friendly KFSensor Honeyd Honeynets Low Interaction High Interaction

Uses of Honeypots Preventing attacks ◦ Automated attacks – (e.g. worms)  Attacker randomly scan entire network and find vulnerable systems  “Sticky honeypots” monitor unused IP spaces, and slows down the attacker when probed  Use a variety of TCP tricks, such as using 0 window size ◦ Human attacks  Use deception/deterrence  Confuse the attackers, making them waste their time and resources  If the attacker knows your network has honeypot, he may not attack the network

Uses of Honeypots Detecting attacks ◦ Traditional IDSs generate too much logs, large percentage of false positives and false negatives ◦ Honeypots generate small data, reduce both false positives and false negatives ◦ Traditional IDSs fail to detect new kind of attacks, honeypots can detect new attacks ◦ Traditional IDSs may be ineffective in IPv6 or encrypted environment

Uses of Honeypots Responding to attacks ◦ Responding to a failure/attack requires in-depth information about the attacker ◦ If a production system is hacked (e.g. mail server) it can’t be brought offline to analyze ◦ Besides, there may be too much data to analyze, which will be difficult and time-consuming ◦ Honeypots can be easily brought offline for analysis. ◦ Besides, the only information captured by the honeypot is related to the attack – so easy to analyze.

Uses of Honeypots Research purposes ◦ How can you defend yourself against an enemy when you don’t know who your enemy is? ◦ Research honeypots collect information on threats. ◦ Then researchers can  Analyze trends  Identify new tools or methods  Identify attackers and their communities  Ensure early warning and prediction  Understand attackers’ motivations

Honeynets High-interaction honeypot designed to capture in-depth information. Information has different value to different organizations. Its an architecture you populate with live systems, not a product or software. Any traffic entering or leaving is a suspect.

Honeynet Architecture

How It Works A highly controlled network ◦ where every packet entering or leaving is monitored, captured, and analyzed. Should satisfy two critical requirements: ◦ Data Control: defines how activity is contained within the honeynet, without an attacker knowing it ◦ Data Capture: logging all of the attacker’s activity without the attacker knowing it Data control has priority over data capture

Data Control Mitigate risk of honeynet being used to harm non-honeynet systems Tradeoff need to provide freedom to attacker to learn about him More freedom – greater risk that the system will be compromised Some controlling mechanisms Restrict outbound connections (e.g. limit to 1) IDS (Snort-Inline) Bandwidth Throttling

No Data Control

Data Control

Data Control : Issues Must have both automated and manual control System failure should leave the system in a closed state (fail-close) Admin should be able to maintain state of all inbound and outbound connections Must be configurable by the admin at any time Activity must be controlled so that attackers can’t detect Automated alerting when honeypots compromised

Data Capture Capture all activity at a variety of levels. ◦ Network activity. ◦ Application activity. ◦ System activity. Issues ◦ No captured data should be stored locally on the honeypot ◦ No data pollution should contaminate ◦ Admin should be able to remotely view honeynet activity in real time ◦ Must use GMT time zone

Risks Harm ◦ compromised honeynet can be used to attack other honeynets or non-honeynet systems Detection ◦ Its value will dramatically decreased if detected by hacker ◦ Hacker may ignore or bypass it ◦ Hacker may inject false information to mislead Disabling honeynet functionality ◦ Attacker disables the data control & capture Violation ◦ Using the compromised system for criminal activity

Types of honeynets Gen-I Gen-II Virtual Distributed

Gen-II Honeynet Architecture

Virtual Honeynet source:

Hybrid Virtual Honeynet Source:

Honeywall CDROM Attempt to combine all requirements of a Honeywall onto a single, bootable CDROM. May, Released Eeyore May, Released Roo

Roo Honeywall CDROM Based on Fedora Core 3 Vastly improved hardware and international support. Automated, headless installation New Walleye interface for web based administration and data analysis. Automated system updating.

Installation Just insert CDROM and boot, it installs to local hard drive. After it reboots for the first time, it runs a hardening script based on NIST and CIS security standards. Following installation, you get a command prompt and system is ready to configure.

Further Information