Top Banner
Honeypot Honeypot An instrument for attracting An instrument for attracting and detecting attackers and detecting attackers Adapted from R. Baumann
22

Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Dec 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

HoneypotHoneypotAn instrument for attractingAn instrument for attractingand detecting attackersand detecting attackers

Adapted from R. Baumann

Page 2: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

AgendaAgenda

Theory Implementation Administrations Toolkit Attacks Conclusion

Page 3: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

TheoryTheory

HoneypotHoneypot Term originally from the military Fake target or ambush In this presentation, the term „honeypot“ is used

in network security environment

Page 4: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

TheoryTheory

DefinitionDefinition

A honeypot is a resource which pretends to be a real target. A

honeypot is expected to be attacked or compromised. The main goals are the distraction of an attacker

and the gain of information about an attacker, his methods and tools.

Page 5: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

TheoryTheory

BenefitBenefit Productive environment:

distraction from the real targets Research environment:

information gathering

but: No direct protection gained In difference to IDS: no false alerts

Page 6: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

TheoryTheory

Types of implementationTypes of implementation Level of Involvement

– Low Involvement: Port Listeners

– Mid Involvement: Fake Daemons

– High Involvement: Real Services

Risk increases with level of involvement

Page 7: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

TheoryTheory

HoneynetHoneynet Network of honeypots Supplemented by firewalls and intrusion

detection systems

Advantages: “More realistic” environment Improved possibilities to collect data

Page 8: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

ImplementationImplementation

Projekt HoneybreadProjekt Honeybread Honeynet implementation Administration Toolkit Ethernet Tunneling Software

Page 9: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

ImplementationImplementation

Schematic illustrationSchematic illustration

HoneypotsDetectionInternet

Page 10: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

ImplementationImplementation

TopologyTopology

Page 11: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

ImplementationImplementation

HoneypotsHoneypots Multiple honeypots

Virtual machines

Different, independent systems

Page 12: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

ImplementationImplementation

Detection unitDetection unit Information logging

Connection control

Administration

Page 13: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

Administration InterfaceAdministration Interface

FeaturesFeatures Web-based Event visualization Connections from and to the honeynet Intrusion detection system alerts Session logs Statistics and reports

Page 14: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

Administration InterfaceAdministration Interface

ScreenshotScreenshot

Page 15: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

AttacksAttacks

FactsFacts Huge amount of IDS alerts (>40‘000) Mostly automated attacks Code Red Virus

In less than 24 hours successfully attacked Well known security vulnerabilities used

Page 16: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

AttacksAttacks

IDS alertsIDS alerts

Page 17: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

AttacksAttacks

Distribution over timeDistribution over time

Page 18: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

AttacksAttacks

OriginOrigin

Page 19: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

AttacksAttacks

SummarySummary Amount of attacks surprised Origin of attacks mostly from local systems

– Attacks on own subnet

– Most tools use own subnet as default setting

Conclusion: Protection required and possible

Page 20: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

SummarySummary

TechnologyTechnology Honeypot as a safety solution not very attractive

– Very time expensive

– No out-of-the-box solutions

– Risk quite high when used inappropriately

– Deep knowledge needed

– Legal situation uncertain

Honeypot as a service very attractive

Page 21: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.

Honeypot - R. Baumann – April 2002

SummarySummary

ImplementationImplementation Data analysis very complex and time consuming Very good learning results Very interesting research area Exciting and suprising moments

Page 22: Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.