Top Banner
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY
19

HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Jan 02, 2016

Download

Documents

Jayson Malone
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

HONEYPOT

By SIDDARTHA ELETI

CLEMSON UNIVERSITY

Page 2: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Introduction

• Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” �

and by Bill Cheswick’s in his paper “An Evening With Berferd.”�� ��

• A honeypot is an information system resource whose value lies in

unauthorized or illicit use of that resource.

• Acts as a Decoy or a Bait to lure attackers .

• They are designed to be attacked.

• Its about spying the spy i.e. attacker.

Page 3: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Working

• Uses the concept of deception.

• Honeypots work on the idea that all traffic to a honey pot should be deemed

suspicious.

• Designed to audit the activity of an intruder, save log files, and record events – Processes started– Adding, deleting, changing of files – even key strokes

Page 4: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Location

Page 5: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

• Honeypots are usually placed somewhere in the DMZ. This ensures that

the internal network is not exposed to the hacker.

• Most honeypots are installed inside firewalls so that they can be better

controlled.

• But a firewall that is placed in a honeypot works exactly the opposite to

how a normal firewall works.

Page 6: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Types of Honeypots

• Based on level of Deployment:– Production Honeypots– Research Honeypots

• Based on Design:– Pure– High Interaction– Low Interaction

Page 7: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Levels of Deployment

• Production : – Its easy and captures only limited info.– Adds value to the security measures of an organization.– Used by companies and large corporations

• Research :– Collects a lot of info i.e. attackers tools, intent, identity etc.– Does not directly add value to an organization – Researches the threats and tries to come up with better measures– Used by military, government organizations and research

Page 8: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Interaction

• What is Interaction?

– Level of Interaction determines amount of functionality a honeypot provides.

– The greater the interaction, the more you can learn.– The greater the interaction, greater the complexity.– The greater the interaction, greater the risk.

Page 9: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

• High Interaction:– Imitates the services and actions of a real system.

– Gives vast amount of information.

– Involves an operating system.• This involves risk

– Multiple honeypots can be hosted with the use of VM’s

– Difficult to detect

– Expensive to maintain

– Example : Honeynet

Page 10: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

• Low Interaction Honeypots:– It simulates the services of a system.

– Predetermined set of responses

– Not good for interacting with unexpected attacks

– Gives less information. Usually • Time of attack• IP and port of attacker • Destination IP and Port of attack

– Does not involve an operating system

– Easy to Detect

– Cheaper to maintain

Page 11: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Commercial Honeypot Systems• There are a variety of commercial Honey Pot systems available.

– Deception ToolKit (DTK)

– Specter

• Supported OS’s– Microsoft NT – Unix.

Page 12: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Deception Toolkit• First free Honeypot by Fred Cohen in 1997

• Suite of applications that listen to inbound traffic.– FTP, – Telnet,– HTTP

• Uses scripted responses.

• Experienced attackers can quickly realize that they are in a

Honeypot.

Page 13: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

SPECTER• SPECTER is a smart honeypot-based intrusion detection system.

• A Production Honeypot and easy to configure.

• Provides Real-time counterintelligence against hackers.

• It simulates a vulnerable computer with various operating systems like

Windows, Mac, Linux, Solaris etc.

• Offers common Internet services such as SMTP, FTP, POP3, HTTP and

TELNET.

• These services appear perfectly normal to the attackers but in fact are

traps for them to mess around and leave traces.

• Offers Intelligent systems like TRACER, TRACE ROUTE, DNS, FTP Banner

etc.

Page 14: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.
Page 15: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Advantages

• The administrator can learn about vulnerabilities in his system

• Intent of the attackers

• Simple design and implementation

• Less resources

• Cheaper to analyze collected information

Page 16: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Disadvantages• Has to be attacked directly.

• Can be avoided.

• Honeypots can be detected as they have expected characteristics or behavior.

• They can introduce risk to the environment.

• They don’t prevent or stop an attack.

Page 17: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Conclusion• It’s a tool to learn and understand the how the attack is being executed

and motives of the attackers.

• Not a solution.

• Provide important information about – The attacker– The tools being used by attacker– What the attacker is after

Page 18: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

References• http://www.techrepublic.com/article/which-honeypot-should-i-use/10425

27• http://www.specter.com/default50.htm• http://en.wikipedia.org/wiki/Honeypot_(computing)• http://www.tracking-hackers.com/papers/honeypots.html• http://www.sans.org/security-resources/idfaq/honeypot3.php• Honeypots: Tracking Hackers By Lance Spitzner

Page 19: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

THANK YOU