development, confusion and exploration of honeypot …•rising “cloud” project •360safe...

33
Development, Confusion and Exploration of Honeypot Technology Seak Antiy Labs

Upload: others

Post on 31-Dec-2019

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Development, Confusion and

Exploration of Honeypot Technology

Seak

Antiy Labs

Page 2: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Outline

• Development of Honeypots

• Status Quo of Honeypots

• Technical Challenges

• Exploration and Outlook

Page 4: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

1990-1998: Early Days

• In 1990, The Cuckoo’s Egg was published.

• Network administrators started using honeypots.

• Physical System

Page 5: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

1998-2000: Rapid Development

• Open source tools are used to induce attackers

• DTK( Fred Cohen )

• Honeyd(Niels Provos)

• Honeypot products: KFSensor, Specter

• Virtual Honeypots

Page 6: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Fred Cohen

• The first master in antivirus field

• First used the term “virus”

• Diagonal Method

Page 7: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

2000-2006: Prosperous Period

• Since 2000, security researchers tended to use real hosts, operating systems and apps to build honeypots. They also integrated data capture, data analysis and data control systems to security tools.

• main channels to collect samples

Page 8: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Outline

• Development of Honeypots

• Status Quo of Honeypots

• Technical Challenges

• Exploration and Outlook

Page 9: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Categories

• Deploy Purposes

– Security products

– Research

• Intensity of Interaction

– High intensity

– Low intensity

Page 11: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Honeypots of Low Interaction Intensity

• Nepenthes

• Honeyd:

• Honeytrap:

Honeypot using wireless nodes

Page 13: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Data Analysis Tool

• Honeysnap

Page 14: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Some Open Source Systems

Page 15: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Some Open Source Systems

Page 16: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Outline

• Development of Honeypots

• Status Quo of Honeypots

• Technical Challenges

• Exploration and Outlook

Page 17: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Security Threats

• DEP can protect users quite well. Until now, there hasn’t any Windows system services targeted attacks that can bypass DEP.

• Static format overflow, browser and other clients based attacks become the mainstream.

• The basic working principle of honeypots are

seriously threatened.

Page 18: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Core Challenges

• Honeypots simulates targets, and then waits for attackers ‘ malicious operations.

• The main attack links are not IP dominated, which makes the situation much more complicated. Attacks are becoming less specifically targeted.

Page 19: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Report All Activities

• Typical report system: OSLoader, drivers, services, processes, modules and IE plug-ins.

• Report large quantities of files + record data frequency + determine as yet unknown malware + automatic analysis system

Page 20: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Representative Distributive Report System

• Eset(NOD32)ThreatSense.Net

• ArrectNET

• Rising “Cloud” Project

• 360safe process report system

Page 21: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Challenges

• Large quantities of desktop security products and clients

• Actual activities

• Zero cost of devices and hardware resources

• Zero cost of distributive computation

Page 22: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Outline

• Development of Honeypots

• Status Quo of Honeypots

• Technical Challenges

• Exploration and Outlook

Page 23: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Trend: Sample Cultivation

• Web drive-by download

• Why do we cultivate samples? (incomplete extraction, frequent changes)

• Main sources of sample cultivation

Page 24: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Sample Cultivation and Analysis System

• Research of automatic behavior and signature extraction: Antiy Labs, Peking University, Tsinghua University

• Research of automatic file in large quantities: Antiy Labs, National “863” anti-intrusion and antivirus center, South China Normal University

Page 25: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

2012年11月5日 25

Research of automatic behavior and signature extraction

Families/categories

Application-level

Sandbox

Dynamic

Analysis

Malware

Samples Flow Chart (CFG)

Function Call Graph

API Call Sequence

File Signature

Report on

behavior

analysis Various

information

Signature

extraction

Network

behavior

Behavior analysis

Network signature

extraction

Network

signature

Report on

network

behavior

Malicious behavior

recognition

Result of static

analysis

Platform

recognition/unpack

Static analysis Online analysis

service

Analysis report

Virus

detection

and

various

engines

Antiy Labs

Tsinghua University

Peking University

Peking Universit

y

Peking University

Page 26: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Wind-catcher Plan

• Wind-catcher plan: a non-profit honeypot deploy project initiated by Antiy in 2006;

• The plan contains 3 periods:

• Wind-catcher I: improve the national basic capture system

• Wind-catcher II: cooperate with universities

• Wind-catcher III: target at civil researchers and report nodes

Page 27: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Wind-catcher I: ARM Virtual Honeypot

• Demonstration

• Circuit design

• Software system

Page 28: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Telecom-level Honeypot: Honey Pool

2008-07-07 28

Page 29: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Management System

Page 30: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Wind-catcher II: Honeypot Alliance

• Antiy cooperates with Harbin Institute of Technology; Tsinghua University and Wuhan University.

• Deploy 3-5 wind-catcher II honeypots in the universities, share data, and provide basic data for information science research.

Page 31: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Wind-catcher III: ADSL Honeypot

• Small-sized honeypot gateway with dual network cards;

• Can be placed between the use's system and the ADSL Modem

Page 32: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Honeybot

• Security application of NPC;

• Simulate the target value, induce attacks;

• Integrate with traditional system.

Page 33: Development, Confusion and Exploration of Honeypot …•Rising “Cloud” Project •360safe process report system . Challenges •Large quantities of desktop security products and

Creation in Our Wake

• We appreciate your suggestions.

[email protected]