Top Banner
HONEYPOTS PRESENTATION HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ankur Sharma Ashish Agrawal Ashish Agrawal Elly Bornstein Elly Bornstein Santak Bhadra Santak Bhadra Srinivas Natarajan Srinivas Natarajan
27

HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Jan 02, 2016

Download

Documents

Nelson Gilmore
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

HONEYPOTS PRESENTATIONHONEYPOTS PRESENTATION

TEAM:TEAM:Ankur SharmaAnkur Sharma

Ashish AgrawalAshish Agrawal

Elly BornsteinElly Bornstein

Santak BhadraSantak Bhadra

Srinivas NatarajanSrinivas Natarajan

Page 2: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Topics to be coveredTopics to be covered Network IDS - Brief IntroNetwork IDS - Brief Intro What is a Honeypot ?What is a Honeypot ? Honeypot - in a Network environmentHoneypot - in a Network environment A Three Layered ApproachA Three Layered Approach Types of HoneypotTypes of Honeypot Honeypot and IDS - Traditional detection problemHoneypot and IDS - Traditional detection problem Honeypot as detection solutionHoneypot as detection solution Honeypot implementation and an example attackHoneypot implementation and an example attack Virtual HoneypotVirtual Honeypot Advantages and DisadvantagesAdvantages and Disadvantages DemoDemo ReferencesReferences

Page 3: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Network IDS – Brief IntroNetwork IDS – Brief Intro An IDS which detects malicious activity such as denial of service An IDS which detects malicious activity such as denial of service

attacks, port scans or even attempts to crack into computers by attacks, port scans or even attempts to crack into computers by monitoring network traffic.monitoring network traffic.

Inspect incoming network traffic and studies the packets.Inspect incoming network traffic and studies the packets.

Reads valuable information about an ongoing intrusion from Reads valuable information about an ongoing intrusion from outgoing or local traffic as well.outgoing or local traffic as well.

It can co-exist with other systems as well. For example, update It can co-exist with other systems as well. For example, update some firewalls' blacklist IP database about computers used by some firewalls' blacklist IP database about computers used by (suspected) hackers.(suspected) hackers.

Page 4: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

What is a Honeypot ?What is a Honeypot ?

A trap set to detect, deflect and counteract A trap set to detect, deflect and counteract attempts at unauthorized use of information attempts at unauthorized use of information systems.systems.

A security resource whose value lies in being A security resource whose value lies in being probed, attacked, or compromised. probed, attacked, or compromised.

A Valuable system that can be used as A Valuable system that can be used as surveillance and early-warning tool.surveillance and early-warning tool.

Page 5: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Honeypot in a Network Honeypot in a Network EnvironmentEnvironment

In general, it consists of a computer or a In general, it consists of a computer or a network site that appears to be part of network network site that appears to be part of network but which is actually isolated, unprotected and but which is actually isolated, unprotected and monitored.monitored.

It can also take other forms, such as files or It can also take other forms, such as files or data records, or even unused IP address space.data records, or even unused IP address space.

Page 6: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Honeypot in a Network Honeypot in a Network EnvironmentEnvironment

Page 7: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

A Three Layered ApproachA Three Layered Approach

Honeypot can be defined in a three layered Honeypot can be defined in a three layered approach:approach:

PreventionPrevention DetectionDetection ResponseResponse

Page 8: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

A Three Layered ApproachA Three Layered Approach Prevention:Prevention: Honeypots can be used to slow down or stop Honeypots can be used to slow down or stop

automated attacks. It can utilize psychological weapons such automated attacks. It can utilize psychological weapons such as deception or deterrence to confuse or stop attacks.as deception or deterrence to confuse or stop attacks.

Detection:Detection: It is used to detect unauthorized activity and It is used to detect unauthorized activity and capture unknown attacks. Generate very few alerts, but when capture unknown attacks. Generate very few alerts, but when they do you can almost be sure that something malicious has they do you can almost be sure that something malicious has happened.happened.

Response:Response: Production honeypots can be used to respond to an Production honeypots can be used to respond to an attack. Information gathered from the attacked system can be attack. Information gathered from the attacked system can be used to respond to the break-in.used to respond to the break-in.

Page 9: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Types of HoneypotTypes of Honeypot

Classified based on two categories:Classified based on two categories:

Deployment Deployment 1. Production1. Production 2. Research2. Research

Levels of interactionLevels of interaction 1. Low Interaction1. Low Interaction 2. High Interaction2. High Interaction

Page 10: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Deployment TypesDeployment Types Production Honeypots:Production Honeypots: Easy to use, capture only limited information, and Easy to use, capture only limited information, and

primarily used by companies or corporations. They primarily used by companies or corporations. They are placed along with other production network and are placed along with other production network and help to mitigate risk in an organization.help to mitigate risk in an organization.

Research Honeypots:Research Honeypots: Run by a volunteer, non-profit research organization Run by a volunteer, non-profit research organization

or an educational institution to gather information or an educational institution to gather information about the motives and tactics of Blackhat community about the motives and tactics of Blackhat community targeting different networks.targeting different networks.

Page 11: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Levels of InvolvementLevels of Involvement

Low Interaction (Honeyd)Low Interaction (Honeyd) Able to simulate big network structures on a single Able to simulate big network structures on a single

host. With one single instance of the daemon, many host. With one single instance of the daemon, many different hosts running different services can be different hosts running different services can be simulated.simulated.

High Interaction (HoneyNet)High Interaction (HoneyNet) Network of real systems. A stealth inline network Network of real systems. A stealth inline network

bridge that closely monitors and controls the network bridge that closely monitors and controls the network data flow to and from the honeypots in the network. data flow to and from the honeypots in the network.

Page 12: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Honeypot and IDS - Traditional Honeypot and IDS - Traditional detection problemsdetection problems

Data overloadData overload False positivesFalse positives False negativesFalse negatives ResourcesResources EncryptionEncryption IPv6IPv6

Page 13: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Honeypot as detection solutionHoneypot as detection solution

Small data setsSmall data sets Reduced false positivesReduced false positives Catching false negativesCatching false negatives Minimal resourcesMinimal resources EncryptionEncryption IPv6IPv6

Page 14: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

HoneydHoneyd

It's designed to be used on Unix-based It's designed to be used on Unix-based operating systems, such as OpenBSD or operating systems, such as OpenBSD or Linux; however, it may soon be ported to Linux; however, it may soon be ported to Windows. Windows.

Since this solution is OpenSource, not only is Since this solution is OpenSource, not only is it free, but we also have full access to the it free, but we also have full access to the source code, which is under the BSD license. source code, which is under the BSD license.

Continue…..Continue…..

Page 15: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

HoneydHoneyd

The primary purpose of Honeyd is detection, The primary purpose of Honeyd is detection, specifically to detect unauthorized activity specifically to detect unauthorized activity within your organization. within your organization.

It does this by monitoring all the unused IPs in It does this by monitoring all the unused IPs in your network. your network.

Any attempted connection to an unused IP Any attempted connection to an unused IP address is assumed to be unauthorized or address is assumed to be unauthorized or malicious activity malicious activity

Page 16: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Example….Example….

Page 17: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Configuring HoneydConfiguring Honeyd

To implement Honeyd we need to compile and To implement Honeyd we need to compile and use two tools: Arpd and Honeyd. use two tools: Arpd and Honeyd.

Arpd is used for ARP spoofingArpd is used for ARP spoofing Monitors the unused IP space and directs Monitors the unused IP space and directs

attacks to the Honeyd honeypot. attacks to the Honeyd honeypot.

Page 18: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Building honeypot with UMLBuilding honeypot with UML UML allows to run multiple instances of UML allows to run multiple instances of

Linux on the same system at the same timeLinux on the same system at the same time The UML kernel receives the system call from The UML kernel receives the system call from

its application and sends/requests them to the its application and sends/requests them to the host kernelhost kernel

UML has many capabilities, among themUML has many capabilities, among them It can log all the keystrokes even if the attacker uses It can log all the keystrokes even if the attacker uses

encryptionencryption It reduces the chances of revealing its identity as It reduces the chances of revealing its identity as

honeypothoneypot Makes UML kernel data secure from tampering by its Makes UML kernel data secure from tampering by its

processes.processes.

Page 19: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Honey NetHoney Net

Network of HoneypotsNetwork of Honeypots Supplemented by firewalls and intrusion Supplemented by firewalls and intrusion

detection system.detection system.

Advantages:Advantages: More realistic environmentMore realistic environment Improved possibility to collect dataImproved possibility to collect data

Page 20: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

How Honey net worksHow Honey net works

A highly controlled A highly controlled network where network where every packet every packet entering or leaving entering or leaving is monitored, is monitored, captured and captured and analyzedanalyzed

Page 21: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Virtual HoneypotVirtual Honeypot

Virtual machines allow different OS to run at Virtual machines allow different OS to run at the same time at the same machinethe same time at the same machine

Honeypots are guest on the top of another OS.Honeypots are guest on the top of another OS. We can implement guest OS on host OS in We can implement guest OS on host OS in

two waystwo ways Raw disc- actual disc partitionRaw disc- actual disc partition Virtual disc- file on host file systemVirtual disc- file on host file system

Page 22: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Most Exploited Vulnerabilities Most Exploited Vulnerabilities

Top 5 most frequently exploited vulnerabilities Top 5 most frequently exploited vulnerabilities with a rating of "severe."with a rating of "severe."

Page 23: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

The Five Most Attacked PortsThe Five Most Attacked Ports

X-Axis: Port NumberX-Axis: Port Number Y-Axis: Number of attackers with the rating of Y-Axis: Number of attackers with the rating of

“severe” per honeypot in the last week“severe” per honeypot in the last week

Page 24: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

AdvantagesAdvantages

Productive environment: distraction from the Productive environment: distraction from the real target real target

Can peek into guest operating system at Can peek into guest operating system at anytime.anytime.

Reinstallation of contaminated guest is also Reinstallation of contaminated guest is also easy.easy.

And it is very easy way.And it is very easy way.

Page 25: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

DisadvantagesDisadvantages

Sub-optimal utilization of computational Sub-optimal utilization of computational resources.resources.

Reinstallation of polluted system is very Reinstallation of polluted system is very difficult.difficult.

Difficulty in monitoring of such system in a Difficulty in monitoring of such system in a safe way.safe way.

Detecting the honeypot is easyDetecting the honeypot is easy

Page 26: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

ReferencesReferences

http://www.securityfocus.comhttp://www.securityfocus.comHoneypots: Simple, Cost-Effective DetectionHoneypots: Simple, Cost-Effective Detection

Open Source Honeypots: Learning with HoneydOpen Source Honeypots: Learning with HoneydSpecter: A Commercial Honeypot Solution for WindowsSpecter: A Commercial Honeypot Solution for Windows

http://www.honeypots.net/http://www.honeypots.net/

http://en.wikipedia.org/wiki/Honeypot_(computing)http://en.wikipedia.org/wiki/Honeypot_(computing)

http://www.tracking-hackers.com/http://www.tracking-hackers.com/

Page 27: HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.

Thank You!Thank You!

We are happy to answer any questions……We are happy to answer any questions……