Top Banner
Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 http://project.honeynet.org/misc/p roject.html
18

Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Dec 18, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Use of Honey-pots to Detect Exploited Systems Across Large

Enterprise Networks

Ashish Gupta

Network Security

May 2004

http://project.honeynet.org/misc/project.html

Page 2: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Overview

• Motivation• What are Honeypots?

– Gen I and Gen II

• The GeorgiaTech Honeynet System– Hardware/Software– IDS– Logging and review

• Some detected Exploitations– Worm exploits– Sage of the Warez Exploit

• Words of Wisdom• Conclusions

Page 3: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Why Honeynets ?

An additional layer of security

Page 4: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Security: A serious Problem

Firewall IDS

A Traffic Cop

Problems:

Internal Threats

Virus Laden Programs

Detection and Alert

Problems:

False Positives

False Negatives

Page 5: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

The Security Problem

Firewall IDS

HoneyNets

An additional layer of security

Page 6: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

• Captures all inbound/outbound data

• Standard production systems

• Intended to be compromised

• Data Capture– Stealth capturing– Storage location – away from the honeynet

• Data control– Protect the network from honeynets

Page 7: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Two types

Gen I Gen II

Good for simpler attacks

Unsophisticated targets

Limited Data Control

Sophisticated Data Control : Stealth Fire-walling

Gen I chosen

Page 8: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .
Page 9: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

GATech Honeynet System

Huge network

4 TB data processing/day

CONFIG Sub-standard systems

Open Source Software

Simple Firewall Data Control

Page 10: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

IDSInvisible SNORT Monitor

Promiscuous mode

Two SNORT Sessions

Session 1 Signature Analysis Monitoring

Session 2 Packet Capture DATA CAPTURE

Page 11: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .
Page 12: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Data Analysis

One hour daily !

Requires human resources

Forensic Analysis

SNORT DATA CAPTURE

All packet logs stored

Ethereal used

Page 13: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Detected Exploitations

16 compromises detected

Worm attacks Hacker Attacks

Page 14: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Honey Net traffic is Suspicious

Heuristic for worm detection:Frequent port scans

Specific OS-vulnerability monitoring possible

Captured traffic helps signature development

DETECTING WORM EXPLOITS

Page 15: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

SAGA of the WAREZ Hacker

Helped locate a compromised host

Honeynet

IIS Exploit Warez Server

+ Backdoor

Very difficult to detect otherwise !

Page 16: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Words of Wisdom

• Start small

• Good relationships help

• Focus on Internal attacks

• Don’t advertise

• Be prepared to spend time

Page 17: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Conclusion

• Helped locate compromised systems

• Can boost IDS research– Data capture

• Distributed Honey nets ?

Page 18: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 .

Discussion

• The usefulness of the extra layer ?

• Dynamic HoneyNets

• Comparison with IDS: are these a replacement or complementary ?

HONEYNET

IDS