Top Banner
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning Tamas K Lengyel University of Connecticut
13

NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Aug 22, 2015

Download

Engineering

Tamas K Lengyel
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Towards Hybrid Honeynets via Virtual Machine Introspection and CloningTamas K Lengyel

University of Connecticut

Page 2: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

The role of the honeypot

Page 3: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

The limitationsLow-interaction honeypots:

● "Artificial" attack surface● Limited information about the attacks● Easily identified

High-interaction honeypots:● Complexity● Maintenance● High risk

Page 4: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Hybrid honeypot

Robin Berthier, 2006: Advanced honeypot architecture for network threats quantification

Primarily use the Low interaction honeypot and utilize a High interaction honeypot when something "interesting" is happening.

How do you define "interesting"?

Page 5: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Hybrid honeynet

Page 6: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

VMI-Honeymon http://vmi-honeymon.sf.net

● Fidelity via Virtual Machine Introspection

○ LibVMI

○ Volatility

○ LibGuestFS

● Scalability via Virtual Machine Cloning

○ QEMU copy-on-write disk

○ Xen copy-on-write RAM

Page 7: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Issues: clone routingClones share IP and MAC address!

○ Post-cloning in-guest network reconfiguration should be avoided

○ Separate bridge/VLAN required for each clone to avoid collision

○ Honeybrid requires extra setup (iptables rules, routing tables & ip marks) to be able to route clones

Page 8: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Network overview

Page 9: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Clone initiated routing

Page 10: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Memsharing results6207 attack sessions on clone HIHs in two weeks (single IP address)

Windows XP SP3 x86 (128MB RAM) Windows 7 SP1 x86 (1GB RAM)

Page 11: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Memsharing resultsProjected memory savings via CoW RAM

Windows XP SP3 x86 Windows 7 SP1 x86

Page 12: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Future work● Clone routing using Open vSwitch &

OpenFlow

● Auto-balloon number of HIHs

● Mix Linux and Windows HIHs with additional

software packages installed

● Test large-scale deployment (/24)

● Zazen IDS!

Page 13: NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Thank you!Questions?