DOC PREVIEW
UTD CS 4398 - Honeypots and Honeynets

This preview shows page 1-2-3-4-5-6 out of 19 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Honeypots and HoneynetsWhy HoneyPotsWhat are HoneypotsTypes of HoneyPotSlide 5Examples Of HoneypotsHoneynetsHow It WorksHoneynet ArchitectureData ControlNo Data ControlSlide 12Data CaptureSebekSebek ArchitectureHoneywall CDROMRoo Honeywall CDROMInstallationFurther InformationHoneypots and HoneynetsHoneypots and HoneynetsSource: The HoneyNet Project http://www.honeynet.org/ Mehedi MasudSeptember 19, 2007Lecture #12Why HoneyPotsWhy HoneyPots A great deal of the security profession and the IT world depend on honeypots. Honeypots◦Build anti-virus signatures.◦Build SPAM signatures and filters.◦ISP’s identify compromised systems.◦Assist law-enforcement to track criminals.◦Hunt and shutdown botnets.◦Malware collection and analysis.What are HoneypotsWhat are HoneypotsHoneypots are real or emulated vulnerable systems ready to be attacked.Primary value of honeypots is to collect information.This information is used to better identify, understand and protect against threats.Honeypots add little direct value to protecting your network.Types of HoneyPotTypes of HoneyPotServer: Put the honeypot on the Internet and let the bad guys come to you. Client: Honeypot initiates and interacts with serversOther: ProxiesTypes of HoneyPotTypes of HoneyPotLow-interaction◦Emulates services, applications, and OS’s.◦Low risk and easy to deploy/maintain, but capture limited information.High-interaction◦Real services, applications, and OS’s◦Capture extensive information, but high risk and time intensive to maintain.Examples Of HoneypotsExamples Of HoneypotsBackOfficer FriendlyKFSensorHoneydHoneynetsLow InteractionHigh InteractionHoneynetsHoneynetsHigh-interaction honeypot designed to capture in-depth information.Information has different value to different organizations.Its an architecture you populate with live systems, not a product or software. Any traffic entering or leaving is suspect.How It WorksHow It Works A highly controlled network where every packet entering or leaving is monitored, captured, and analyzed.◦Data Control◦Data Capture◦Data AnalysisHoneynet ArchitectureHoneynet ArchitectureData ControlData Control•Mitigate risk of honeynet being used to harm non-honeynet systems.•Count outbound connections.•IPS (Snort-Inline)•Bandwidth ThrottlingNo Data ControlNo Data ControlInternetNo RestrictionsNo RestrictionsHoneypotHoneypotData ControlData ControlInternetHoneywallHoneypotHoneypotNo RestrictionsConnections Limited Packet ScrubbedData CaptureData CaptureCapture all activity at a variety of levels.Network activity.Application activity.System activity.SebekSebekHidden kernel module that captures all host activityDumps activity to the network.Attacker cannot sniff any traffic based on magic number and dst port.Sebek ArchitectureSebek ArchitectureHoneywall CDROMHoneywall CDROMAttempt to combine all requirements of a Honeywall onto a single, bootable CDROM.May, 2003 - Released EeyoreMay, 2005 - Released RooRoo Honeywall CDROMRoo Honeywall CDROMBased on Fedora Core 3Vastly improved hardware and international support.Automated, headless installationNew Walleye interface for web based administration and data analysis.Automated system updating.InstallationInstallationJust insert CDROM and boot, it installs to local hard drive.After it reboots for the first time, it runs a hardening script based on NIST and CIS security standards.Following installation, you get a command prompt and system is ready to configure.Further InformationFurther Informationhttp://www.honeynet.org/http://www.ho


View Full Document

UTD CS 4398 - Honeypots and Honeynets

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download Honeypots and Honeynets
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Honeypots and Honeynets and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Honeypots and Honeynets 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?