honeypot-a brief overview

25
CET,BBSR HONEYPOT Presented Presented By: By: SILPI RUPA SILPI RUPA ROSAN ROSAN Computer Sc Computer Sc Engg Engg CET CET Bhubaneswar Bhubaneswar

Upload: silpi-rosan

Post on 27-Jan-2015

128 views

Category:

Education


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Honeypot-A Brief Overview

CET,BBSR

HONEYPOT

Presented By:Presented By: SILPI RUPA ROSANSILPI RUPA ROSAN Computer Sc EnggComputer Sc Engg

CETCET BhubaneswarBhubaneswar

Page 2: Honeypot-A Brief Overview

CET,BBSR

CONTENTS

The ThreatsDefinition of HoneypotBasic Design of HoneypotClassification of HoneypotWorkingExamplesAdvantages & DisadvantagesConclusion

Page 3: Honeypot-A Brief Overview

CET,BBSR

Page 4: Honeypot-A Brief Overview

CET,BBSR

The Threat

Thousands of scans a day Fastest time honeypot manually compromised, 15

minutes Life expectancies:

Vulnerable Win32 system is 93 min

Vulnerable Unix system is 1604 min

Primarily cyber-crime, focus on Win32 systems and their users.

Botnets

Page 5: Honeypot-A Brief Overview

CET,BBSR

Definition

A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.

- Lance Spitzner

Page 6: Honeypot-A Brief Overview

CET,BBSR

Basic Honeypot design

Page 7: Honeypot-A Brief Overview

CET,BBSR

How it helps us?

Helps to learn system’s weakness

Hacker can be caught & stopped

Design better & secured network

Page 8: Honeypot-A Brief Overview

CET,BBSR

HONEYPOT IDS

Nobody is supposedto use it

Generates less Compiles But imp. Logs huge logs of authorised Of unauthorised activity

activity

Page 9: Honeypot-A Brief Overview

CET,BBSR

Categories Of Honeypots…

Production honeypots--

used to help mitigate risk in an organization

Research honeypots--

to gather as much information as possible

Page 10: Honeypot-A Brief Overview

CET,BBSR

Level of interaction

Low-Interaction Honeypots

High-Interaction Honeypots

Page 11: Honeypot-A Brief Overview

CET,BBSR

Low Interaction Honeypot

-Emulates certain services, applications

-Identify hostile IP

-Protect internet side of network

-Low risk and easy to deploy/maintain, but capture limited information.

Page 12: Honeypot-A Brief Overview

CET,BBSR

High Interaction Honeypot

-Real services, applications, and OS’s

-Capture extensive information but high risk and time intensive to maintain

-Internal network protection

Page 13: Honeypot-A Brief Overview

CET,BBSR

Comparison

Low-interaction

Solution emulates operating systems services.

High-interaction

No emulation, real operating systems and services are provided.

Easy to install and deploy. Usually requires simply installing and configuring software on a computer.

Can be complex to install or deploy (commercial versions tend to be much simpler).

Minimal risk, as the emulated services control what attackers can and cannot do.

Increased risk, as attackers are provided real operating systems to interact with

Captures limited amounts of information, mainly transactional data and some limited interaction.

Can capture far more information, including new tools, communications, or attacker keystrokes.

Page 14: Honeypot-A Brief Overview

CET,BBSR

How does a honeypot work?

Lure attackers

Data Control

Data Capture

Page 15: Honeypot-A Brief Overview

CET,BBSR

Example--

Page 16: Honeypot-A Brief Overview

CET,BBSR

Implementation….

Page 17: Honeypot-A Brief Overview

CET,BBSR

Examples of Honeypots

BackOfficer Friendly

KFSensor

Honeyd

Nepenthes

Honeynets

Low Interaction

High Interaction

Page 18: Honeypot-A Brief Overview

CET,BBSR

BackOfficer Friendly

Page 19: Honeypot-A Brief Overview

CET,BBSR

Advantages

Collect small data sets of high value

New tools and tactics

Information

Work in encrypted or IPv6 environments

Simple concept requiring minimal resources

Page 20: Honeypot-A Brief Overview

CET,BBSR

Disadvantages

Limited field of view

Risk (mainly high-interaction honeypots)

Requires time and resources to maintain and analyze

Page 21: Honeypot-A Brief Overview

CET,BBSR

Legal issues of Honeypot

Privacy

Liability

Page 22: Honeypot-A Brief Overview

CET,BBSR

Conclusion

Page 23: Honeypot-A Brief Overview

CET,BBSR

References

http://www.tracking-hackers.com/papers/honeypots.html

http://www.securityfocus.com/infocus/1757 http://www.securitywizardry.com/honeypots.html http://www.honeynet.org/papers/honeynet Honeynet Project, “Know Your Enemy: Defining Virtual

Honeynets”. Available on line at: http://

project.honeynet.org/papers/index.html Lance Spizner, “Honeytokens: the Other Honeypot”,

Security Focus information

Page 24: Honeypot-A Brief Overview

CET,BBSR

Page 25: Honeypot-A Brief Overview

CET,BBSR