DOC PREVIEW
UTD CS 4398 - LECTURE NOTES

This preview shows page 1-2-3-27-28-29 out of 29 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Honeypots and HoneynetsWhat are HoneypotsWhy HoneyPotsAdvantages and DisadvantagesSlide 5Types of HoneypotsSlide 7Examples of HoneypotsUses of HoneypotsSlide 10Slide 11Slide 12HoneynetsHoneynet ArchitectureHow It WorksData ControlNo Data ControlSlide 18Data Control : IssuesData CaptureRisksTypes of honeynetsGen-II Honeynet ArchitectureVirtual HoneynetHybrid Virtual HoneynetHoneywall CDROMRoo Honeywall CDROMInstallationFurther InformationHoneypots and HoneynetsHoneypots and HoneynetsSource: The HoneyNet Project http://www.honeynet.org/Book: Know Your Enemy (2nd ed)Presented by:Mohammad Mehedy MasudWhat are HoneypotsWhat are HoneypotsHoneypots are real or emulated vulnerable systems ready to be attacked.Definition: “Honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource”◦Primary value of honeypots is to collect information.◦This information is used to better identify, understand and protect against threats.◦Honeypots add little direct value to protecting your network.Why HoneyPotsWhy HoneyPots A great deal of the security profession and the IT world depend on honeypots.  Honeypots are used to ◦Build anti-virus signatures◦Build SPAM signatures and filters◦Identify compromised systems◦Assist law-enforcement to track criminals◦Hunt and shutdown botnets◦Malware collection and analysisAdvantages and Advantages and DisadvantagesDisadvantagesAdvantages◦Collect only small data sets(only when interacted), which is valuable and easier to analyze.◦Reduce false positives – because any activity with the honeypot is unauthorized by definition◦Reduce false negatives – honeypots are designed to identify and capture new attacks◦Capture encrypted activity – because honeypots act as endpoints, where the activity is decrypted◦Work with IPv6◦Highly flexible – extremely adaptable and can be used in a variety of environments◦Require minimal resourcesAdvantages and Advantages and DisadvantagesDisadvantagesDisadvantages◦Honeypots have a limited field of view – see only what interacts with them. Can’t be used to detect attacks on other systems.◦However, there are some techniques to redirect attackers’ activities to honeypots.◦Risk – attacker may take over the honeypot and use it to attack other systems.Types of HoneypotsTypes of HoneypotsServer: Put the honeypot on the Internet and let the bad guys come to you. Client: Honeypot initiates and interacts with serversOther: ProxiesTypes of HoneypotsTypes of HoneypotsLow-interaction◦Emulates services, applications, and OS’s◦Low risk and easy to deploy/maintain◦But capture limited information – attackers’ activities are contained to what the emulated systems allowHigh-interaction◦Real services, applications, and OS’s◦Capture extensive information, but high risk and time intensive to maintain◦Can capture new, unknown, or unexpected behaviorExamples of HoneypotsExamples of HoneypotsBackOfficer FriendlyKFSensorHoneydHoneynetsLow InteractionHigh InteractionUses of HoneypotsUses of HoneypotsPreventing attacks◦Automated attacks – (e.g. worms) Attacker randomly scan entire network and find vulnerable systems“Sticky honeypots” monitor unused IP spaces, and slows down the attacker when probedUse a variety of TCP tricks, such as using 0 window size◦Human attacksUse deception/deterrenceConfuse the attackers, making them waste their time and resourcesIf the attacker knows your network has honeypot, he may not attack the networkUses of HoneypotsUses of HoneypotsDetecting attacks◦Traditional IDSs generate too much logs, large percentage of false positives and false negatives◦Honeypots generate small data, reduce both false positives and false negatives◦Traditional IDSs fail to detect new kind of attacks, honeypots can detect new attacks◦Traditional IDSs may be ineffective in IPv6 or encrypted environmentUses of HoneypotsUses of HoneypotsResponding to attacks◦Responding to a failure/attack requires in-depth information about the attacker◦If a production system is hacked (e.g. mail server) it can’t be brought offline to analyze◦Besides, there may be too much data to analyze, which will be difficult and time-consuming◦Honeypots can be easily brought offline for analysis.◦Besides, the only information captured by the honeypot is related to the attack – so easy to analyze.Uses of HoneypotsUses of HoneypotsResearch purposes◦How can you defend yourself against an enemy when you don’t know who your enemy is?◦Research honeypots collect information on threats.◦Then researchers can Analyze trendsIdentify new tools or methodsIdentify attackers and their communitiesEnsure early warning and predictionUnderstand attackers’ motivationsHoneynetsHoneynetsHigh-interaction honeypot designed to capture in-depth information.Information has different value to different organizations.Its an architecture you populate with live systems, not a product or software. Any traffic entering or leaving is a suspect.Honeynet ArchitectureHoneynet ArchitectureHow It WorksHow It Works A highly controlled network ◦where every packet entering or leaving is monitored, captured, and analyzed.Should satisfy two critical requirements:◦Data Control: defines how activity is contained within the honeynet, without an attacker knowing it◦Data Capture: logging all of the attacker’s activity without the attacker knowing itData control has priority over data captureData ControlData Control•Mitigate risk of honeynet •being used to harm non-honeynet systems•Tradeoff•need to provide freedom to attacker to learn about him•More freedom – greater risk that the system will be compromised•Some controlling mechanisms•Restrict outbound connections (e.g. limit to 1)•IDS (Snort-Inline)•Bandwidth ThrottlingNo Data ControlNo Data ControlInternetNo RestrictionsNo RestrictionsHoneypotHoneypotData ControlData ControlInternetHoneywallHoneypotHoneypotNo RestrictionsConnections Limited Packet ScrubbedData Control : IssuesData Control : IssuesMust have both automated and manual controlSystem failure should leave the system in a closed state (fail-close)Admin should be able to maintain state of all inbound and outbound connectionsMust be configurable by the admin at any timeActivity must be controlled so that attackers


View Full Document

UTD CS 4398 - LECTURE NOTES

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download LECTURE NOTES
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view LECTURE NOTES and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view LECTURE NOTES 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?