Top Banner
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson
18

Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Dec 17, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Honey Pots: Natures Dessert or Cyber Defense Tool?

Eric Richardson

Page 2: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

What is it?

• A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource

Page 3: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Simple Definition

Page 4: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Definition Continued

• System appears to be legitimate• Should be of no use to any one• Any interaction with the honey pot is

malicious

Page 5: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Examples

• File Server• Web Sites• Work Station• Customer File

Page 6: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Important Attributes

• The Honey Pot needs to appear legitimate• Needs to be “difficult” to break into• Honey Pot needs to be isolated from rest of

the network• Will not catch every intrusion!

Page 7: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Advantages

• Collect small sets of data• Reduce false positives• Reduce false negatives• Capture encrypted activity• Work with IPv6

Page 8: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

High Interaction vs. Low Interaction

Which is better?

Page 9: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Low Interaction

• Emulates OS or various services• Attackers can not do much with the honey pot• Easier to deploy, maintain, and configure• Minimal risk

Page 10: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

High Interaction

• Implement real OS and services• Allow for extensive amount of interaction• Much greater risk• Used for research purposes

Page 11: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

HoneyD

• Open source program for setting up Honey Pots

• Emulate various services all on a single machine

• Simulate OS• Uses scripts to simulate

services

Page 12: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Symantec Decoy Server

• Commercial solution• Creates four “cages”• Each cage is an OS and

has own file system• Attackers interact with

each “cage”

Page 13: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Why use them?

• Prevention• Detection• Response

Page 14: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Prevention

• Automated attacks and human attacks

• Sticky Honey Pots, uses clever TCP tricks

• Protection by deception

Page 15: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Detection

• As stated before, reduces false positives and negatives

• Captures encrypted activity and IPv6 traffic

• Interaction with a honeypot is likely to be malicious

Page 16: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Response

• Log important information

• Easy to take offline and analyze

• Honeypot doesn’t affect day to day operations

Page 17: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

In Conclusion

• Honeypots are flippin’ sweet• A handy tool for helping with security• Very flexible

Page 18: Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.

Questions?

Maybe I’ll have answers!