Top Banner
Monitoring Indonesia Darknets – Revealing the Unseen Security Intrusion CodeBali International Cyber Security Conference Bali, 22 September 2015 Charles Lim
40

Monitoring indonesia darknets - Revealing the unseen security intrusion

Jan 11, 2017

Download

Internet

Charles Lim
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Indonesia Darknets –

Revealing the Unseen Security

Intrusion

CodeBali International Cyber Security Conference

Bali, 22 September 2015

Charles Lim

Page 2: Monitoring indonesia darknets - Revealing the unseen security intrusion

Speakers

• Charles Lim, Msc., ECSA, ECSP, ECIH,

CEH, CEI

• More than 20+ year in IT services industry

• IP networking, Software Automation,

• Led Indonesia Chapter (2012)

• Lecturer and Researcher at Swiss German

University (Information Security Group) –

http://people.sgu.ac.id/charleslim

Page 3: Monitoring indonesia darknets - Revealing the unseen security intrusion

Agenda

• Introduction to Honeynet

• Introduction to Honeynet - Indonesia

Chapter

• What is darknets?

• Honeypots

• Attack Statistics

• The New Dashboard

• Conclusion

Page 4: Monitoring indonesia darknets - Revealing the unseen security intrusion

Introduction to The Honeynet

Project

• Volunteer open source computer security research organization since 1999 (US 501c3 non-profit)

• Mission: ¨learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned¨ -http://www.honeynet.org

Page 5: Monitoring indonesia darknets - Revealing the unseen security intrusion

Brief Introduction to The

Honeynet Project

Honeynet Workshop 2015 @ Stavanger

Page 6: Monitoring indonesia darknets - Revealing the unseen security intrusion

Indonesia Chapter

• 25 November 2011, about 15

people from academia, security

professionals and government

made the declaration during

our yearly malware workshop

at SGU (Swiss German

University)

• 19 January 2012 accepted as

part of Honeynet Chapter

• Members: 109 (today)

Page 7: Monitoring indonesia darknets - Revealing the unseen security intrusion

Indonesia Chapter

• Indonesia Honeynet Project

• Id_honeynet

• http://www.honeynet.or.id

• http://groups.google.com/group/id-honeynet

Page 8: Monitoring indonesia darknets - Revealing the unseen security intrusion

Indonesia Honeynet Project

Seminar & Workshop

Honeynet Workshop 10-11 Juni 2015, Lampung

Page 9: Monitoring indonesia darknets - Revealing the unseen security intrusion

How we start?

• Four students of SGU in 2010 wanted to explore how to use Data Mining to understand Cyber Security Threats:

• 2 students focusing on Malware Threats

• 2 students focusing on Cyber Terrorism

• 1 Student SGU focused on capturing malware using Honeypots (Nepenthes)

• We also invited Malware Expert, Pak Aat to share his experience

Page 10: Monitoring indonesia darknets - Revealing the unseen security intrusion

Honeypot Deployment History

2009 2011 2013 2015

Learning

Period

Early

Period

Growing

Period

Expanding

Period

Honeypot:

Nepenthes

Honeypot:

Nepenthes,

Dionaea

Honeypot:

Dionaea

Honeypot:

Dionaea, Kippo,

Glastopf,

Honeytrap

Learning How to

install and

configure

Deployed 1st

Honeypot in SGU

More Honeypots

deployed

Coverage: Java,

Bali, Sumatera,

# Honeypots

deployed: None

# Honeypots

deployed: 1

# Honeypots

deployed: 5

# Honeypots

deployed: 13

Hardware: Client Hardware: Simple

Client and Server

Hardware: Mini PC

and Server

Hardware:

Raspberry Pi and

Dedicated servers

Page 11: Monitoring indonesia darknets - Revealing the unseen security intrusion

List of contributors

• Amien H.R.

• Randy Anthony

• Michael

• Stewart

• Glenn

• Mario Marcello

• Joshua Tommy

• Andrew Japar

• Christiandi

• Kevin Kurniawan

Page 12: Monitoring indonesia darknets - Revealing the unseen security intrusion

What is Darknets?

Darknet – portion of routed, allocated IP

space in which no active servers reside.

— Team CYMRU

Page 13: Monitoring indonesia darknets - Revealing the unseen security intrusion

What is Darknets?

Livenet Darknet

Live IP Address (used) Unused IPs

Page 14: Monitoring indonesia darknets - Revealing the unseen security intrusion

Darknets and Honeypots

Goal

• To understand cyber activities in our institutions in Indonesia (Government, Education and Industry)

How

• Honeypot servers put in the unused IP address across the above organizations

Page 15: Monitoring indonesia darknets - Revealing the unseen security intrusion

Honeypots

Currently deployed

• Dionaea

• Kippo

• Glastopf

• Honeytrap

Future

• SPAMpots

Page 16: Monitoring indonesia darknets - Revealing the unseen security intrusion

Previous Works

• Nano PC with Atom processors

• Pull Protocol

Page 17: Monitoring indonesia darknets - Revealing the unseen security intrusion

Today

• Raspberry PI

• ARM processor

• RAM 512 MB, 8 GB SD Card

• Push Protocol

Page 18: Monitoring indonesia darknets - Revealing the unseen security intrusion

Near Future

• 1 U Rack Case

• 5 Raspberry PI

• 5 different honeypots: dionaea, glastopf, kippo, etc.

Page 19: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results

Page 20: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results

Page 21: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results

Page 22: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results

Page 23: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results

Page 24: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Ports Attacked)

Page 25: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Ports Attacked)

Page 26: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Ports Attacked)

Page 27: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Ports Attacked)

Page 28: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Ports Attacked)

Page 29: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Malware)

Page 30: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Malware)

Page 31: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Malware)

Page 32: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Malware)

Page 33: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Malware)

Page 34: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Malware)

Page 35: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Malware)

Page 36: Monitoring indonesia darknets - Revealing the unseen security intrusion

Monitoring Results (Malware)

Page 37: Monitoring indonesia darknets - Revealing the unseen security intrusion

New Dashboard

Page 38: Monitoring indonesia darknets - Revealing the unseen security intrusion

Further Information

• The Honeynet Project

(http://www.honeynet.org)

• Indonesia Honeynet Project

(http://www.honeynet.or.id)

• Swiss German University

(http://www.sgu.ac.id)

• My Blog

(http://people.sgu.ac.id/charleslim)

Page 39: Monitoring indonesia darknets - Revealing the unseen security intrusion

Indonesia Chapter

• Indonesia Honeynet Project

• Id_honeynet

• http://www.honeynet.or.id

• http://groups.google.com/group/id-honeynet

Page 40: Monitoring indonesia darknets - Revealing the unseen security intrusion

Questions ???