Honeypots

22
“HONEYPOT” Submitted by: Gaurav Gupta DTU/2K13/CO/049 Presentation on

Transcript of Honeypots

Page 1: Honeypots

“HONEYPOT”

Submitted by: Gaurav

Gupta

DTU/2K13/CO/049

Presentation on

Page 2: Honeypots

DEFINITION

A honeypot is an information system

resource whose value lies in unauthorized or

illicit use of that resource.

- Lance Spitzner

Page 3: Honeypots

Basic Honeypot design

Page 4: Honeypots

Value of Honeypots

Primary value of honeypots is to

collect information.

This information is then used to better

identify, understand and protect

against threats.

Honeypots add little direct value to

protecting your network.

Page 5: Honeypots

How it helps us?

Helps to learn system’s weakness

Hacker can be caught & stopped

Design better & secured network

Page 6: Honeypots

Example..

Page 7: Honeypots

Honeypot Vs IDS

Page 8: Honeypots

No Data Control

Page 9: Honeypots

Data control

Page 10: Honeypots

Low interaction honeypots

Emulates certain

services, applications

Identify hostile IP

Protect internet side

of network

Low risk and easy to

deploy/maintain, but

capture limited

Information.

Page 11: Honeypots

High interaction honeypots

Real services,

applications, and

OS’s

Capture extensive

information but high

risk and time

intensive to

maintain

Internal network

protection

Page 12: Honeypots

Low interaction Vs High

interaction

Page 13: Honeypots

Example of Honeypots:

Symantec Decoy Server (Mantrap)

Honeynets

Nepenthes

Honeyd◦ (Virtual honeypot)

KFSensor

BackOfficer Friendly

High Interaction

Low Interaction

Page 14: Honeypots

Honeyd

Honeyd is a low-interaction virtual honeypot

◦ Run multiple virtual hosts on a computer network

◦ A network administrator running Honeyd can monitor his/her logs to see if there is any traffic going to the virtual hosts set up by Honeyd

◦ Supports multiple IP addresses

◦ Supports subsystem

Page 15: Honeypots

Honeyd Architecture

Page 16: Honeypots

Gen I Honeynet

◦ Simple Methodology, Limited Capability

◦ Highly effective at detecting automated attacks

◦ Use Reverse Firewall for Data Control

◦ Can be fingerprinted by a skilled hacker

◦ Runs at OSI Layer 3

Page 17: Honeypots

Gen I Honeynet

Page 18: Honeypots

Gen II Honeynet

◦More Complex to Deploy and Maintain

◦ Examine Outbound Data and make determination to block,pass, or modify data

◦ Runs at OSI Layer 2

Page 19: Honeypots

Gen II Honeynet

Page 20: Honeypots

Advantages and Disadvantages of

HoneypotsAdvantages :

Honeypots are focused (small data sets)

Honeypots help to reduce false positive

Honeypots help to catch unknown attacks (false

negative)

Honeypots can capture encrypted activity (cf. Sebek)

Honeypots work with IPv6

Honeypots are very flexible (advantage/disadvantage?)

Honeypots require minimal resources

Disadvantages :

Honeypots field of view limited (focused)

Honeypots can be detected by attacker

Page 21: Honeypots

Future work

I. Ease of use: In future Honeypots will most probably appear in prepackaged solutions, which will be easier to administer and maintain. People will be able to install and develop Honeypots at home and without difficulty.

II. Closer integration: Currently Honeypots are used along with other technologies such as firewall, tripwire, IDS etc. As technologies are developing, in future Honeypots will be used in closer integration with them.

III. Specific purpose: Already certain features such as honeytokens are under development to target Honeypots only for a specific purpose. Eg: catching only those attempting credit card fraud etc.

Page 22: Honeypots

Thanks for

listening