honeypots (ravindra singh rathore)

Post on 08-Jun-2015

1.008 Views

Category:

Technology

5 Downloads

Preview:

Click to see full reader

TRANSCRIPT

HONEYPOTS

By: Ravindra Singh Rathore

Monitor your Network

• The Internet security is hard– New attacks every day– Our Websites are static targets

• What should we do?• The more you know about your enemy, the

better you can protect yourself• Fake target?

THE PROBLEM

A honeypot is an information system

resource whose value lies in unauthorized or

illicit use of that resource.

WHAT IS A HONEYPOT

• A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems

• They are the highly flexible security tool with different applications for security. They don't fix a single problem. Instead they have multiple uses, such as prevention, detection, or information gathering

WHAT IS A HONEYPOT

• Has no production value; anything going to/from a honeypot is likely a probe, attack or compromise

• Used for monitoring, detecting and analyzing attacks

WHAT IS A HONEYPOT

What Honeypots Do

Why we use Honeypots??

Its Different security from Firewall.Firewall only works on System Security.This security works on network layer.

By level of interaction High Low

Classification

By Implementation Physical Virtual

Classification

By Purpose Production Research

Classification

Low Interaction Simulates some aspects of the system

Easy to deploy, minimal risk

Limited Information

Honeyd

High Interaction Simulates all aspects of the system: real systems

Can be compromised completely, higher risk

More Information

Honeynet

Level of Interaction

Low-Interaction High-Interaction

Installation Easy More difficult

Maintenance Easy Time consuming

Risk Low High

Need Control No Yes

Data gathering Limited Extensive

Interaction Emulated services Full control

Low Interaction vs. High Interaction

– Physical• Real machines• Own IP Addresses• Often high-interactive

– Virtual• Simulated by other machines that:

– Respond to the traffic sent to the honeypots– May simulate a lot of (different) virtual

honeypots at the same time

Physical V.S. Virtual Honeypots

Prevention Keeping the bad guys out

Detection Detecting the burglar when he breaks in.

Great work

Response Can easily be pulled offline

Little to no data pollution

Production HPs: Protect the systems

Collect compact amounts of high value information

Discover new Tools and Tactics Understand Motives, Behavior, and

Organization Develop Analysis and Forensic Skills HONEYNET

Research HPs: gathering information

Specifying Goals Selecting the implementation

strategies

Types, Number, Locations and Deployment    

Implementing Data Capture Logging and managing data Mitigating Risk Mitigating Fingerprint

Building your HoneyPots

Information Capturing Mechanisms

Host Based Network Based Router/Gateway

Based

Information Analysis Mechanisms

Firewall Logs IDS Analysis System Logs Forensics of the Compromised Machine Advanced Forensics of the Compromised Machine

How do HONEYPOTS work?

In front of the firewall

Demilitarized Zone

Behind the firewall (Intranet)

Location of Honeypots

Placement of Honeypot

Honeyd: A virtual honeypot application, which allows us to create thousands of IP addresses with virtual machines and corresponding network services.

High Data Value- Small Data

Low Resource Cost- Weak or Retired system

Simple Concept, Flexible Implementation Return on Investment

- Proof of Effectiveness

Catch new attacks

Honeypot Advantages

Narrow Field of View Fingerprinting Risks?

- If being detected?

- If being compromised?

- If being mis-configured?

Disadvantages

Being Detected?- Anyway honeypots can be detected

- Modifying is a good solution, but not perfect

- Fingerprinting?

Being Exploited?

Mitigating Risks?

Privacy- No single statue concerning privacy

- Electronic Communication Privacy Act

Entrapment- Used only to defendant to avoid conviction

- Applies only to law enforcement?

Liability- If a Honeynet system is used to attack or damage

other non- honeynet system?

Legal Issues

Honeypots are not a solution, they are a flexible tool with different applications to security.

Primary value in detection and information gathering.

Just the beginning for honeypots.

Conclusion

Q&A

Thank you…

top related