Top Banner
Honeynet.BR and the National Early Warning Capability Based on a Network of Distributed Honeypots Cristine Hoepers [email protected] Computer Emergency ResponseTeam Brazil – CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/ SIG 2 Seminar – Singapore, June/2005 – p.1/35
35

Honeynet.BR and the National Early Warning Capability ...

Jun 06, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Honeynet.BR and the National Early Warning Capability ...

Honeynet.BR and the National EarlyWarning Capability Based on a Network of

Distributed Honeypots

Cristine Hoepers

[email protected]

Computer Emergency Response Team Brazil – CERT.brhttp://www.cert.br/

Brazilian Internet Steering Committeehttp://www.cgi.br/

SIG2 Seminar – Singapore, June/2005 – p.1/35

Page 2: Honeynet.BR and the National Early Warning Capability ...

Overview

• Honeynet.BR– objectives and requirements– architecture overview

• Early warning using honeypots– Motivation– The honeypots network– Advantages and disadvantages– Future work

SIG2 Seminar – Singapore, June/2005 – p.2/35

Page 3: Honeynet.BR and the National Early Warning Capability ...

Honeynet.BR Objectives

• Monitor current attacks and intrusions

• Collect data

• Develop new tools

• Use in Incident Response

SIG2 Seminar – Singapore, June/2005 – p.3/35

Page 4: Honeynet.BR and the National Early Warning Capability ...

Implementation Decisions

Requirements:

• Low-cost and reliability

• High quality data control mechanism

Decisions:

• Use of Free Software

• Store data in a well-known format (libpcap)

SIG2 Seminar – Singapore, June/2005 – p.4/35

Page 5: Honeynet.BR and the National Early Warning Capability ...

Architecture Overview

• 2 honeynets in different address spaces

• Use of OpenBSD for data control and datacollection

• Several honeypots with different OSs andapplications

• Developed Honeynet MaintenanceProcedures and Tools

SIG2 Seminar – Singapore, June/2005 – p.5/35

Page 6: Honeynet.BR and the National Early Warning Capability ...

Alerts and Summaries

• Alerts– outgoing packets originating from the

honeynet– shell commands

• Daily summaries– statistics (top ports, protocols, number of

packets, etc)– snort alerts

SIG2 Seminar – Singapore, June/2005 – p.6/35

Page 7: Honeynet.BR and the National Early Warning Capability ...

Use in Incident Response

Understand constituency threats:

• Detection of attacks

• Better understanding of ongoing activities

• Compare activities with incident reports

Help the community:

• Alert networks that originate malicious activity

• New rootkits are used to update chkrootkit

toolhttp://www.chkrootkit.org/

SIG2 Seminar – Singapore, June/2005 – p.7/35

Page 8: Honeynet.BR and the National Early Warning Capability ...

Lessons Learned

• Needs good containment mechanisms

• Can be time consuming– use of scripts can minimize the problem

• Correlate honeynet data and incident reports– clarify attacks– add more information– help to identify false positives

SIG2 Seminar – Singapore, June/2005 – p.8/35

Page 9: Honeynet.BR and the National Early Warning Capability ...

Early Warning UsingHoneypots

SIG2 Seminar – Singapore, June/2005 – p.9/35

Page 10: Honeynet.BR and the National Early Warning Capability ...

Motivation

Have a national early warning capability with thefollowing characteristics:

• Widely distributed across the country– in several ASNs and geographical locations

• Based on voluntary work of research partners

• High level of privacy for the members

• Useful for Incident Response

SIG2 Seminar – Singapore, June/2005 – p.10/35

Page 11: Honeynet.BR and the National Early Warning Capability ...

The Honeypots Network

Brazilian Honeypots Alliance –Distributed Honeypots Project

• Coordination:– CERT.br – Computer Emergency

Response Team Brazil (formerly NBSO)Brazilian Internet Steering Committee

– CenPRA Research CenterMinistry of Science and Technology

SIG2 Seminar – Singapore, June/2005 – p.11/35

Page 12: Honeynet.BR and the National Early Warning Capability ...

The Honeypots Network (cont.)

• Technical requirements:– secure configuration– follow the project’s standards (OS,

configurations, updates, etc)– no data pollution

• Privacy concerns (in a NDA):– don’t disclose IP/network information– don’t collect production network traffic– don’t exchange any information in clear text

SIG2 Seminar – Singapore, June/2005 – p.12/35

Page 13: Honeynet.BR and the National Early Warning Capability ...

The Honeypots Network (cont.)

The architecture:

• low interaction honeypots– OpenBSD + Honeyd– using a netblock range– emulating services (HTTP, SMTP,

malwares backdoors, etc)

• a central server– collects logs and uploaded malware– performs a status check in all honeypots

SIG2 Seminar – Singapore, June/2005 – p.13/35

Page 14: Honeynet.BR and the National Early Warning Capability ...

The Honeypots Network (cont.)

26 research partner’s institutions:

• Academia, Government, Industry, Military andTelcos networks

• They provide:– hardware and network blocks

(usually a /24)– maintenance of their own honeypots

• Use the data for intrusion detection purposes– less false positives than traditional IDSs

• several have more than one honeypotSIG2 Seminar – Singapore, June/2005 – p.14/35

Page 15: Honeynet.BR and the National Early Warning Capability ...

The Honeypots Network (cont.)

# City Institutions

01 São José dos Campos INPE, ITA

02 Rio de Janeiro CBPF, Fiocruz, PUC-RIO, RedeRio, UFRJ

03 São Paulo ANSP, CERT.br, Diveo, Durand, UNESP, USP

04 Campinas CenPRA, HP Brazil, UNICAMP

05 São José do Rio Preto UNESP

06 Piracicaba USP

07 Brasília Brasil Telecom, Ministry of Justice, TCU, UNB LabRedes

08 Natal UFRN

09 Petrópolis LNCC

10 Porto Alegre CERT-RS

11 Ribeirão Preto USP

12 São Carlos USP

13 Taubaté UNITAU

14 Florianópolis UFSC DAS

15 Americana VIVAX

16 Manaus VIVAX

SIG2 Seminar – Singapore, June/2005 – p.15/35

Page 16: Honeynet.BR and the National Early Warning Capability ...

The Honeypots Network (cont.)

As of June, 2005 SIG2 Seminar – Singapore, June/2005 – p.16/35

Page 17: Honeynet.BR and the National Early Warning Capability ...

Early Warning

• Private Statistics – summaries including:– specific information for each honeypot– most active IPs, OSs, ports, protocols and

Country Codes– correlated activities (ports and IPs)

• Public Statistics– combined daily flows seen in the

honeypots– most active OSs, TCP/UDP ports and

Country Codes (CC)* the top ports, OSs and CCs are

calculated every day SIG2 Seminar – Singapore, June/2005 – p.17/35

Page 18: Honeynet.BR and the National Early Warning Capability ...

Early Warning (cont.)

Usefulness:

• observation of trends– detect scans for potential new

vulnerabilities

• partner institutions are detecting promptly:– outbreaks of new worms/bots– compromised servers– network configuration errors

• collect new signatures and new malwareSIG2 Seminar – Singapore, June/2005 – p.18/35

Page 19: Honeynet.BR and the National Early Warning Capability ...

Public Statistics Generation

• convert the raw network data into flow data

• compute the amount of bytes/packetsreceived by each port (or OS or CC)

• select the top 10 to plot– the remaining will be displayed as “others”

• use RRDtool and ORCA to generate theflows’ graphics– stack area graphics– logarithmic scale

SIG2 Seminar – Singapore, June/2005 – p.19/35

Page 20: Honeynet.BR and the National Early Warning Capability ...

Public Statistics Generation (cont.)

ascii flow files (filtered)

ascii flow files

flow files

ascii flow files

pflog files

flow files

TOP−10−tcp, TOP−10−udp, TOP−10−cc, TOP−10−srcos files

(filtered)

network flows

make−pflog2flows.pl

flow2srcos.plflow2ports.pl

cidrgrepflow−print

flow−capturefprobe

flow2cc.pl

SIG2 Seminar – Singapore, June/2005 – p.20/35

Page 21: Honeynet.BR and the National Early Warning Capability ...

Public Statistics Generation (cont.)

TOP−10−cc

PNG file

PNG file

TOP−10−tcpTOP−10−udp

HTML files

HTML file

TOP−10−srcos

feed RRDTool database

store TOP−10−<type> files

store daily image

make−honeyd−stats.pl

for each 4−hour data

make−orca−stats.pl

run ORCA

store image for 4−hour period

create HTML files

for each TOP−10−<type> file

store daily file

SIG2 Seminar – Singapore, June/2005 – p.21/35

Page 22: Honeynet.BR and the National Early Warning Capability ...

Public Statistics – Top TCP Ports

June 15, 2005SIG2 Seminar – Singapore, June/2005 – p.22/35

Page 23: Honeynet.BR and the National Early Warning Capability ...

Public Statistics – Top Country Codes

June 17, 2005SIG2 Seminar – Singapore, June/2005 – p.23/35

Page 24: Honeynet.BR and the National Early Warning Capability ...

Public Statistics – Top Source OS

June 16, 2005 SIG2 Seminar – Singapore, June/2005 – p.24/35

Page 25: Honeynet.BR and the National Early Warning Capability ...

Public Statistics – Correlation

June 12, 2005SIG2 Seminar – Singapore, June/2005 – p.25/35

Page 26: Honeynet.BR and the National Early Warning Capability ...

Public Statistics – Correlation (cont.)

June 12, 2005SIG2 Seminar – Singapore, June/2005 – p.26/35

Page 27: Honeynet.BR and the National Early Warning Capability ...

Public Statistics – Correlation (cont.)

June 12, 2005SIG2 Seminar – Singapore, June/2005 – p.27/35

Page 28: Honeynet.BR and the National Early Warning Capability ...

Public Statistics – Correlation (cont.)

June 12, 2005SIG2 Seminar – Singapore, June/2005 – p.28/35

Page 29: Honeynet.BR and the National Early Warning Capability ...

Public Statistics – Correlation (cont.)

June 12, 2005 SIG2 Seminar – Singapore, June/2005 – p.29/35

Page 30: Honeynet.BR and the National Early Warning Capability ...

Incident Response

• Identify signatures of well knownmalicious/abusive activities– worms, bots, scans, spam and other

malware

• Notify the responsible networks of theBrazilian IPs– with recovery tips

• Donate sanitized data of non-Brazilian IPs toother CSIRTs (e.g. Team Cymru)

SIG2 Seminar – Singapore, June/2005 – p.30/35

Page 31: Honeynet.BR and the National Early Warning Capability ...

Architecture advantages

• Few false positives

• Ability to collect malware samples– specific listeners: mydoom, kuang,

subseven, etc.

• Ability to implement spam traps

• Permits the members expertise’simprovement in several areas:– honeypots, intrusion detection, PGP,

firewalls, OS hardening

SIG2 Seminar – Singapore, June/2005 – p.31/35

Page 32: Honeynet.BR and the National Early Warning Capability ...

Architecture disadvantages

• It’s more difficult to maintain than a darknet

• Usually don’t catch attacks targeted toproduction networks

• Need the partners cooperation to maintainand update the honeypots

SIG2 Seminar – Singapore, June/2005 – p.32/35

Page 33: Honeynet.BR and the National Early Warning Capability ...

Low x High-Interaction Honeypots

Low-Interaction High-Interaction

Installation Easy More difficult

Maintenance Easy Time consuming

Risk Low High

Need Control No Yes

Data gathering Limited Extensive

Interaction Emulated services Full control

SIG2 Seminar – Singapore, June/2005 – p.33/35

Page 34: Honeynet.BR and the National Early Warning Capability ...

Future Work

Honeynet.BR

• Implement a 3rd honeynet

Distributed Honeypots Network

• Continuously expand the network– 9 new partners in installation phase

• Have more frequent private summaries

• Provide hourly public statistics

• Increase data donation to trusted parties

SIG2 Seminar – Singapore, June/2005 – p.34/35

Page 35: Honeynet.BR and the National Early Warning Capability ...

Related Links

• This presentationhttp://www.cert.br/docs/palestras/

• Honeynet.BR Projecthttp://www.honeynet.org.br/

• Brazilian Honeypots Alliance Statisticshttp://www.honeypots-alliance.org.br/stats/

• Computer Emergency Response Team Brazil –

CERT.brhttp://www.cert.br/

• The Honeynet Research Alliancehttp://project.honeynet.org/alliance/

SIG2 Seminar – Singapore, June/2005 – p.35/35