30
HONEYPOTS By: Ravindra Singh Rathore Monitor your Network

Honeypots (Ravindra Singh Rathore)

Embed Size (px)

Citation preview

Page 1: Honeypots (Ravindra Singh Rathore)

HONEYPOTS

By: Ravindra Singh Rathore

Monitor your Network

Page 2: Honeypots (Ravindra Singh Rathore)
Page 3: Honeypots (Ravindra Singh Rathore)

• The Internet security is hard– New attacks every day– Our Websites are static targets

• What should we do?• The more you know about your enemy, the

better you can protect yourself• Fake target?

THE PROBLEM

Page 4: Honeypots (Ravindra Singh Rathore)

A honeypot is an information system

resource whose value lies in unauthorized or

illicit use of that resource.

WHAT IS A HONEYPOT

Page 5: Honeypots (Ravindra Singh Rathore)

• A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems

• They are the highly flexible security tool with different applications for security. They don't fix a single problem. Instead they have multiple uses, such as prevention, detection, or information gathering

WHAT IS A HONEYPOT

Page 6: Honeypots (Ravindra Singh Rathore)

• Has no production value; anything going to/from a honeypot is likely a probe, attack or compromise

• Used for monitoring, detecting and analyzing attacks

WHAT IS A HONEYPOT

Page 7: Honeypots (Ravindra Singh Rathore)

What Honeypots Do

Page 8: Honeypots (Ravindra Singh Rathore)

Why we use Honeypots??

Its Different security from Firewall.Firewall only works on System Security.This security works on network layer.

Page 9: Honeypots (Ravindra Singh Rathore)

By level of interaction High Low

Classification

Page 10: Honeypots (Ravindra Singh Rathore)

By Implementation Physical Virtual

Classification

Page 11: Honeypots (Ravindra Singh Rathore)

By Purpose Production Research

Classification

Page 12: Honeypots (Ravindra Singh Rathore)

Low Interaction Simulates some aspects of the system

Easy to deploy, minimal risk

Limited Information

Honeyd

High Interaction Simulates all aspects of the system: real systems

Can be compromised completely, higher risk

More Information

Honeynet

Level of Interaction

Page 13: Honeypots (Ravindra Singh Rathore)

Low-Interaction High-Interaction

Installation Easy More difficult

Maintenance Easy Time consuming

Risk Low High

Need Control No Yes

Data gathering Limited Extensive

Interaction Emulated services Full control

Low Interaction vs. High Interaction

Page 14: Honeypots (Ravindra Singh Rathore)

– Physical• Real machines• Own IP Addresses• Often high-interactive

– Virtual• Simulated by other machines that:

– Respond to the traffic sent to the honeypots– May simulate a lot of (different) virtual

honeypots at the same time

Physical V.S. Virtual Honeypots

Page 15: Honeypots (Ravindra Singh Rathore)

Prevention Keeping the bad guys out

Detection Detecting the burglar when he breaks in.

Great work

Response Can easily be pulled offline

Little to no data pollution

Production HPs: Protect the systems

Page 16: Honeypots (Ravindra Singh Rathore)

Collect compact amounts of high value information

Discover new Tools and Tactics Understand Motives, Behavior, and

Organization Develop Analysis and Forensic Skills HONEYNET

Research HPs: gathering information

Page 17: Honeypots (Ravindra Singh Rathore)

Specifying Goals Selecting the implementation

strategies

Types, Number, Locations and Deployment    

Implementing Data Capture Logging and managing data Mitigating Risk Mitigating Fingerprint

Building your HoneyPots

Page 18: Honeypots (Ravindra Singh Rathore)

Information Capturing Mechanisms

Host Based Network Based Router/Gateway

Based

Page 19: Honeypots (Ravindra Singh Rathore)

Information Analysis Mechanisms

Firewall Logs IDS Analysis System Logs Forensics of the Compromised Machine Advanced Forensics of the Compromised Machine

Page 20: Honeypots (Ravindra Singh Rathore)

How do HONEYPOTS work?

Page 21: Honeypots (Ravindra Singh Rathore)

In front of the firewall

Demilitarized Zone

Behind the firewall (Intranet)

Location of Honeypots

Page 22: Honeypots (Ravindra Singh Rathore)

Placement of Honeypot

Page 23: Honeypots (Ravindra Singh Rathore)

Honeyd: A virtual honeypot application, which allows us to create thousands of IP addresses with virtual machines and corresponding network services.

Page 24: Honeypots (Ravindra Singh Rathore)

High Data Value- Small Data

Low Resource Cost- Weak or Retired system

Simple Concept, Flexible Implementation Return on Investment

- Proof of Effectiveness

Catch new attacks

Honeypot Advantages

Page 25: Honeypots (Ravindra Singh Rathore)

Narrow Field of View Fingerprinting Risks?

- If being detected?

- If being compromised?

- If being mis-configured?

Disadvantages

Page 26: Honeypots (Ravindra Singh Rathore)

Being Detected?- Anyway honeypots can be detected

- Modifying is a good solution, but not perfect

- Fingerprinting?

Being Exploited?

Mitigating Risks?

Page 27: Honeypots (Ravindra Singh Rathore)

Privacy- No single statue concerning privacy

- Electronic Communication Privacy Act

Entrapment- Used only to defendant to avoid conviction

- Applies only to law enforcement?

Liability- If a Honeynet system is used to attack or damage

other non- honeynet system?

Legal Issues

Page 28: Honeypots (Ravindra Singh Rathore)

Honeypots are not a solution, they are a flexible tool with different applications to security.

Primary value in detection and information gathering.

Just the beginning for honeypots.

Conclusion

Page 29: Honeypots (Ravindra Singh Rathore)

Q&A

Page 30: Honeypots (Ravindra Singh Rathore)

Thank you…