24
Honeypot &Honeynet Sina Manavi [email protected] m

Honeypot honeynet

Embed Size (px)

Citation preview

Page 1: Honeypot honeynet

Honeypot &Honeynet

Sina Manavi

[email protected]

Page 2: Honeypot honeynet

Content

• What is Honeypot

• What is Honeynet

• Advantages and Disadvantages of Honeypot/net

Page 3: Honeypot honeynet

Definition of Honeypot:

• A Honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.

- Lance Spitzner

Page 4: Honeypot honeynet

Honeypots value:

• Preventionprevent automated attacks:(Warms and auto-rooters)

• Detectionidentify a failure or breakdown in prevention

• Response

Page 5: Honeypot honeynet

How Honeypot works:

HoneyPot A

Gateway

Attackers

Attack Data

Prevent

Detect

Response No connection

Page 6: Honeypot honeynet

Architecture

Page 7: Honeypot honeynet

Honeypot can be placed:

In front of the firewall (Internet)

DMZ (DeMilitarized Zone)

Behind the firewall (intranet)

Page 8: Honeypot honeynet

By Implementation• Virtual• Physical

By purpose• Production• Research

By level of interaction• High• Low• Middle?

Honeypot Classification:

Page 9: Honeypot honeynet

Implementation of Honeypot

Physical• Real machines• Own IP Addresses• Often high-interactive

Virtual• Simulated by other machines that:

– Respond to the traffic sent to the honeypots– May simulate a lot of (different) virtual honeypots at the same

time

Page 10: Honeypot honeynet

Physical Honeypot vs. Virtual Honeypot

• PH (Real machines, NICs, typically high-interaction)– High maintenance cost.– Impractical for large address spaces.

• VH (Simulated by other machines)– Multiple virtual services and VMs on one machine.– Typically it only simulate network level interactions, but

still able to capture intrusion attempts.

Page 11: Honeypot honeynet

Research Complex to deploy and maintain. Captures extensive information. Run by a volunteer(non-profit). Used to research the threats organization face.

Production Easy to use Capture only limited information Used by companies or corporations Mitigates risks in organization

Propose of Honeypot:

Page 12: Honeypot honeynet

Interaction Level:

• Low Interaction

• High Interaction

Note: Interaction measures the amount of activity an attacker can have with a honeypot.

Page 13: Honeypot honeynet

Low Interaction vs. High InteractionLow-Interaction High-Interaction

Installation Easy More difficult

Maintenance Easy Time consuming

Risk Low High

Need Control No Yes

Data gathering Limited Extensive

Interaction Emulated services Full control

Page 14: Honeypot honeynet

Example of Honeypots:

• Symantec Decoy Server (ManTrap)Symantec Decoy Server (ManTrap)• Honeynets• Nepenthes• Honeyd

– (Vitrual honeypot)

• KFSensor• BackOfficer Friendly

High Interaction

Low Interaction

Page 15: Honeypot honeynet

Honeynet History:

• Informally began in April 1999

• The Honeynet Project officially formed in June 2000

• Became a non-profit corporation in September 2001.

• Is made up of thirty Volunteer security professionals

Page 16: Honeypot honeynet

What is a Honeynet?

• Actual network of computers

• High-interaction honeypot

• Its an architecture, not a product

• Provides real systems, applications, and Provides real systems, applications, and services for attackers to interact with.services for attackers to interact with.

• Any traffic entering or leaving is suspect”.

Page 17: Honeypot honeynet

How the Honeynet works?

• Monitoring, capturing, and analyzing all the packets entering or leaving through networks.

• All the traffic is entering or leaving through the Honeynet is naturally suspect.

Page 18: Honeypot honeynet

Honeynet Evolution

• 1997, DTK (Deception Toolkit)• 1999, a single sacricial computer,• 2000, Generation I Honeynet,• 2003, Generation II Honeynet,• 2003, Honeyd software• 2004, Distributed Honeynets, Malware Collector...• 2009, Dionaea (multi stage payloads, SIP,...)

Kojoney, Kippo

Page 19: Honeypot honeynet

Architecture Requirements:Architecture Requirements:

• Data Control Data Control

• Data CaptureData Capture

Page 20: Honeypot honeynet

Data Control of the Honeynet

Internet

No Restrictions

No Restrictions

Honeypot

Honeypot

Internet

Honeywall

Honeypot

Honeypot

No Restrictions

Connections Limited Packet Scrubbed

Page 21: Honeypot honeynet

Honeynet Generations:

• Gen I:– Simple Methodology, Limited Capability– Highly effective at detecting automated attacks– Use Reverse Firewall for Data Control– Can be fingerprinted by a skilled hacker– Runs at OSI Layer 3

• Gen II:– More Complex to Deploy and Maintain– Examine Outbound Data and make determination to block, pass, or modify data– Runs at OSI Layer 2

Page 22: Honeypot honeynet

Advantages and Disadvantages of Honeynet/pots

Advantages :Honeypots are focused (small data sets)

Honeypots help to reduce false positive

Honeypots help to catch unknown attacks (false negative)

Honeypots can capture encrypted activity (cf. Sebek)

Honeypots work with IPv6

Honeypots are very flexible (advantage/disadvantage?)

Honeypots require minimal resources

Disadvantages :Honeypots field of view limited (focused)

Risk,

Page 23: Honeypot honeynet

Q&A

Page 24: Honeypot honeynet

Thank you 1/12/2011