Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security with Honeyd By Ryan Olsen. What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored.

Similar presentations


Presentation on theme: "Security with Honeyd By Ryan Olsen. What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored."— Presentation transcript:

1 Security with Honeyd By Ryan Olsen

2 What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored network composed of thousands of virtual decoy machines to protect “real” machines on the network.

3 Why use a honeypot? ➲ Three main reasons. ● Can distract adversaries from vulnerable machine on the network. ● Gather information. ● Can be used as an early warning system. ➲ Main use today is to gather information not available using a NIDS.

4 How it Works. ➲ It's a daemon program that creates virtual machine for IP addresses within a specified net. ➲ Claims unused IP addresses on the network. ➲ Can create 65,000 virtual host from a single machine.

5 How it works (2) ➲ Simulates networking stack of OSI model. ➲ Personality can be configured to mimic different operating systems. ● Linux, Windows, Sun ➲ System virtualization. ● Allows virtual IP addresses controlled by honeyd to run regular network applications. ● Can bind ports, accept and initialize TCP and UDP connections. ● Can redirect connection requests.

6 ➲ Can simulate asymmetric routing using routing tables. ➲ Can drop packets, add latency ➲ Handles ARP requests automatically.

7 Pros and Cons ➲ Can distract adversaries while gathering information. ➲ Can gain information not available using NIDS. ➲ Can run almost any TCP or UDP service. ➲ Simulates attributes of a real network accurately. ➲ Can be difficult to deploy. ➲ Adversaries can't gain access to virtual machine, so not as much info is gained as possible.

8 Conclusion ➲ Honeyd is an excellent program the allows it's users to learn and understand various patters and movements of viruses/worms or other malicious attacks that are not currently understood. And can provide information not available using NIDS helping decrease the number of false positives.


Download ppt "Security with Honeyd By Ryan Olsen. What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored."

Similar presentations


Ads by Google