HONEYPOTS PRESENTATION TEAM Ankur Sharma Ashish Agrawal Elly

  • Slides: 27
Download presentation
HONEYPOTS PRESENTATION TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan

HONEYPOTS PRESENTATION TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan

Topics to be covered n n n Network IDS - Brief Intro What is

Topics to be covered n n n Network IDS - Brief Intro What is a Honeypot ? Honeypot - in a Network environment A Three Layered Approach Types of Honeypot and IDS - Traditional detection problem Honeypot as detection solution Honeypot implementation and an example attack Virtual Honeypot Advantages and Disadvantages Demo References

Network IDS – Brief Intro n n An IDS which detects malicious activity such

Network IDS – Brief Intro n n An IDS which detects malicious activity such as denial of service attacks, port scans or even attempts to crack into computers by monitoring network traffic. Inspect incoming network traffic and studies the packets. Reads valuable information about an ongoing intrusion from outgoing or local traffic as well. It can co-exist with other systems as well. For example, update some firewalls' blacklist IP database about computers used by (suspected) hackers.

What is a Honeypot ? n n n A trap set to detect, deflect

What is a Honeypot ? n n n A trap set to detect, deflect and counteract attempts at unauthorized use of information systems. A security resource whose value lies in being probed, attacked, or compromised. A Valuable system that can be used as surveillance and early-warning tool.

Honeypot in a Network Environment n n In general, it consists of a computer

Honeypot in a Network Environment n n In general, it consists of a computer or a network site that appears to be part of network but which is actually isolated, unprotected and monitored. It can also take other forms, such as files or data records, or even unused IP address space.

Honeypot in a Network Environment

Honeypot in a Network Environment

A Three Layered Approach Honeypot can be defined in a three layered approach: n

A Three Layered Approach Honeypot can be defined in a three layered approach: n Prevention n Detection n Response

A Three Layered Approach n n n Prevention: Honeypots can be used to slow

A Three Layered Approach n n n Prevention: Honeypots can be used to slow down or stop automated attacks. It can utilize psychological weapons such as deception or deterrence to confuse or stop attacks. Detection: It is used to detect unauthorized activity and capture unknown attacks. Generate very few alerts, but when they do you can almost be sure that something malicious happened. Response: Production honeypots can be used to respond to an attack. Information gathered from the attacked system can be used to respond to the break-in.

Types of Honeypot n n n Classified based on two categories: Deployment 1. Production

Types of Honeypot n n n Classified based on two categories: Deployment 1. Production 2. Research Levels of interaction 1. Low Interaction 2. High Interaction

Deployment Types n n Production Honeypots: Easy to use, capture only limited information, and

Deployment Types n n Production Honeypots: Easy to use, capture only limited information, and primarily used by companies or corporations. They are placed along with other production network and help to mitigate risk in an organization. Research Honeypots: Run by a volunteer, non-profit research organization or an educational institution to gather information about the motives and tactics of Blackhat community targeting different networks.

Levels of Involvement n n Low Interaction (Honeyd) Able to simulate big network structures

Levels of Involvement n n Low Interaction (Honeyd) Able to simulate big network structures on a single host. With one single instance of the daemon, many different hosts running different services can be simulated. High Interaction (Honey. Net) Network of real systems. A stealth inline network bridge that closely monitors and controls the network data flow to and from the honeypots in the network.

Honeypot and IDS - Traditional detection problems n n n Data overload False positives

Honeypot and IDS - Traditional detection problems n n n Data overload False positives False negatives Resources Encryption IPv 6

Honeypot as detection solution n n n Small data sets Reduced false positives Catching

Honeypot as detection solution n n n Small data sets Reduced false positives Catching false negatives Minimal resources Encryption IPv 6

Honeyd n n It's designed to be used on Unix-based operating systems, such as

Honeyd n n It's designed to be used on Unix-based operating systems, such as Open. BSD or Linux; however, it may soon be ported to Windows. Since this solution is Open. Source, not only is it free, but we also have full access to the source code, which is under the BSD license. Continue…. .

Honeyd n n n The primary purpose of Honeyd is detection, specifically to detect

Honeyd n n n The primary purpose of Honeyd is detection, specifically to detect unauthorized activity within your organization. It does this by monitoring all the unused IPs in your network. Any attempted connection to an unused IP address is assumed to be unauthorized or malicious activity

Example….

Example….

Configuring Honeyd n n n To implement Honeyd we need to compile and use

Configuring Honeyd n n n To implement Honeyd we need to compile and use two tools: Arpd and Honeyd. Arpd is used for ARP spoofing Monitors the unused IP space and directs attacks to the Honeyd honeypot.

Building honeypot with UML n n n UML allows to run multiple instances of

Building honeypot with UML n n n UML allows to run multiple instances of Linux on the same system at the same time The UML kernel receives the system call from its application and sends/requests them to the host kernel UML has many capabilities, among them It can log all the keystrokes even if the attacker uses encryption n It reduces the chances of revealing its identity as honeypot n Makes UML kernel data secure from tampering by its processes. n

Honey Net n n Network of Honeypots Supplemented by firewalls and intrusion detection system.

Honey Net n n Network of Honeypots Supplemented by firewalls and intrusion detection system. Advantages: n More realistic environment n Improved possibility to collect data

How Honey net works n A highly controlled network where every packet entering or

How Honey net works n A highly controlled network where every packet entering or leaving is monitored, captured analyzed

Virtual Honeypot n n n Virtual machines allow different OS to run at the

Virtual Honeypot n n n Virtual machines allow different OS to run at the same time at the same machine Honeypots are guest on the top of another OS. We can implement guest OS on host OS in two ways Raw disc- actual disc partition n Virtual disc- file on host file system n

Most Exploited Vulnerabilities n Top 5 most frequently exploited vulnerabilities with a rating of

Most Exploited Vulnerabilities n Top 5 most frequently exploited vulnerabilities with a rating of "severe. "

The Five Most Attacked Ports n n X-Axis: Port Number Y-Axis: Number of attackers

The Five Most Attacked Ports n n X-Axis: Port Number Y-Axis: Number of attackers with the rating of “severe” per honeypot in the last week

Advantages n n Productive environment: distraction from the real target Can peek into guest

Advantages n n Productive environment: distraction from the real target Can peek into guest operating system at anytime. Reinstallation of contaminated guest is also easy. And it is very easy way.

Disadvantages n n Sub-optimal utilization of computational resources. Reinstallation of polluted system is very

Disadvantages n n Sub-optimal utilization of computational resources. Reinstallation of polluted system is very difficult. Difficulty in monitoring of such system in a safe way. Detecting the honeypot is easy

References http: //www. securityfocus. com Honeypots: Simple, Cost-Effective Detection Open Source Honeypots: Learning with

References http: //www. securityfocus. com Honeypots: Simple, Cost-Effective Detection Open Source Honeypots: Learning with Honeyd Specter: A Commercial Honeypot Solution for Windows http: //www. honeypots. net/ http: //en. wikipedia. org/wiki/Honeypot_(computing) http: //www. tracking-hackers. com/

Thank You! We are happy to answer any questions……

Thank You! We are happy to answer any questions……