Honeynets Detecting Insider Threats Kirby Kuehl

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad.
Security Controls – What Works
CSA 223 network and web security Chapter one
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Honeywall CD-ROM. 2 Developers and Speakers  Dave Dittrich University of Washington  Rob McMillen USMC  Jeff Nathan Sygate  William Salusky AOL.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Network security policy: best practices
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Introduction to Honeypot, Botnet, and Security Measurement
Intrusion Detection Chapter 12.
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
HONEYPOT.  Introduction to Honeypot  Honeytoken  Types of Honeypots  Honeypot Implementation  Advantages and Disadvantages  Role of Honeypot in.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
CSCE 815 Network Security Lecture 25 Data Control in HoneyNets SSH April 22, 2003.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Security tools. Outline Firewalls and network design Honeybots IPTables Snort.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Honeypots and Honeynets Alex Dietz. To discover methods used to breach a system To discover new root kits To learn what changes are made to a system and.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Topic 5: Basic Security.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Cryptography and Network Security Sixth Edition by William Stallings.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Role Of Network IDS in Network Perimeter Defense.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Incident Response Christian Seifert IMT st October 2007.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
O honeynet Project Lognitive.com Disclaimer This is a technical session that contain non- technical content. Get relaxed so to get ready for some details.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Security in Networking
Honeypots and Honeynets
Honeypots and Honeynets
Honeypots and Honeynets
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Chapter 4: Protecting the Organization
Intrusion Detection system
6. Application Software Security
Presentation transcript:

Honeynets Detecting Insider Threats Kirby Kuehl

 Honeynet Project member since  Honeynet application beta testing.  Honeywall CD  Sebek LKM  Technical Review of Know Your Enemy 2 nd Edition  Cisco Systems since  Internal Facing Information Security  Intrusion Detection and Event correlation  Internal Security Tools development  Open Source developer  Your Speaker

Insider Definition in·sid·er n.  An accepted member of a group.  One who has special knowledge or access to confidential information.  Network, System, and Database Administrators  Employees and Contractors  Business Partners

How can being a n accepted member of the group be used by an insider?  Leverage existing credentials on valuable systems.  Sniff clear text protocols to obtain valid credentials.  Use valid accounts to exploit unpatched local vulnerabilities to escalate privileges.  System Administrators can obviously access any sensitive information on the machines.  Companies typically focus on external threats.  Less secure intranet web applications and databases.  Ability to share internal data easily often more important that to share data securely.

How can an insider leverage existing knowledge?  Insiders know the location of valuable resources such as financial data and employee records.  Physical Access.  Insiders may be aware of company security weaknesses and defenses.  Familiar with the practices of the Security Team, IDS Locations, log rotations, patch cycles, access control lists.  Take advantage of unpatched remote vulnerabilities and backdoors left open by worms.

Possible Insider Motives Financial Gain  Industrial Espionage  Intellectual Property  Sensitive Customer Information  Sensitive Employee Information  Identity Theft Sabotage  Disgruntlement  Employee may be quitting or know they are about to be fired.  Damage another employee’s work.

Should you run an Insider Honeypot?  Consult your Legal Department.  Need their support for prosecution and or termination.  Company Acceptable Use Policy  Data Privacy Expectations  Security team has the authority to sniff traffic, image hard drives, obtain backups, read user , etc. during an investigation.  What is considered abuse/misuse.  Outline abuse of privileges, policy against vulnerability scanning, running sniffers, sharing passwords, etc.  How will misuse / abuse be handled?  Employee Termination, Legal Action

How will Forensic Data be handled?  The Honeynet Project is interested in learning the tools, tactics, and motives of the Blackhat community and are not interested in prosecution.  How will your company handle forensic data? Evidence may have to be presented in a court of law.  Ensure Evidence is not damaged, destroyed, or tainted  Preserve Chain of Custody

Defining an Internal Honeypot  A Honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource. Key Honeypot components:  Data Capture  Capture detailed information of host and network events.  Data Control  Ability to limit inbound and outbound connections when a threshold is reached.  Alerting  Ability to inform the honeypot administrators when an event is occurring.

Insider Honeypot Types  Low Interaction  High Interaction  Honeynets using the Honeywall CD  Hotzoning  Honeytokens

Low-Interaction Insider Honeypots Advantages:  Easy to deploy, minimal risk Disadvantages:  Emulated services provide limited interaction which makes it difficult to determine the real motives of the insider.  Internal low-interaction honeypots are probably only useful for detecting worms or sweeping vulnerability scans. Examples:  Black hole routers advertising dark IP space. Arbor Networks Whitepaper on Sink holes  Specter, KFSensor, Honeyd, and Labrea. SpecterKFSensorHoneydLabrea  Commercial HIDS: Cisco Security Agent, McAfee Entercept, ISS BlackIce.

High-interaction Insider Honeypots  Insider Honeypots should be deployed in the same IP space as real resources such as development web servers and cvs repositories.  Advantages:  Provide real operating systems and services, no emulation.  Insider may interact with real services for a long time capturing extensive information.  Any interaction should be considered malicious. Does not have to match an attack signature from an IDS. Disadvantages:  Complex to deploy (easier with Honeywall CD), greater risk.  Captures insiders less familiar with your environment.  Examples include Symantec Decoy and Honeynets.Symantec Decoy

Honeywall bootable CD-ROM Simplifies the deployment, maintenance, and customization of a honeynet. Layer 2 bridging firewall (iptables) used to count and limit connections.  No IP Address  Doesn’t decrement TTL Snort-inline  Modified version of Snort that accepts packets from iptables instead of libpcap. It then tell iptables whether the packet should be dropped, rejected, modified, or allowed to pass based on a snort rule set. Snortiptableslibpcap  Also used for alerting Sebek_extract  Server component of (kernel module based logger) data capture

Honeywall CD / Honeynet Diagram

Hot Zoning – Divert Traffic Destined for unused services on production systems to an internal honeypot.

Honeytokens  Resources used for detecting and tracking insider interaction with legitimate resources.  Items that should not normally be accessed.  Fake documents. Fake source code, Microsoft Word and Excel documents.  Bogus SSN or CC numbers  s  Login and password. Example test:test  Ability send notification when accessed.

Kirby Kuehl Question and Answer Session