HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford...

19
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY

Transcript of HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford...

Page 1: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

HONEYPOT

By SIDDARTHA ELETI

CLEMSON UNIVERSITY

Page 2: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Introduction

• Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” �

and by Bill Cheswick’s in his paper “An Evening With Berferd.”�� ��

• A honeypot is an information system resource whose value lies in

unauthorized or illicit use of that resource.

• Acts as a Decoy or a Bait to lure attackers .

• They are designed to be attacked.

• Its about spying the spy i.e. attacker.

Page 3: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Working

• Uses the concept of deception.

• Honeypots work on the idea that all traffic to a honey pot should be deemed

suspicious.

• Designed to audit the activity of an intruder, save log files, and record events – Processes started– Adding, deleting, changing of files – even key strokes

Page 4: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Location

Page 5: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

• Honeypots are usually placed somewhere in the DMZ. This ensures that

the internal network is not exposed to the hacker.

• Most honeypots are installed inside firewalls so that they can be better

controlled.

• But a firewall that is placed in a honeypot works exactly the opposite to

how a normal firewall works.

Page 6: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Types of Honeypots

• Based on level of Deployment:– Production Honeypots– Research Honeypots

• Based on Design:– Pure– High Interaction– Low Interaction

Page 7: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Levels of Deployment

• Production : – Its easy and captures only limited info.– Adds value to the security measures of an organization.– Used by companies and large corporations

• Research :– Collects a lot of info i.e. attackers tools, intent, identity etc.– Does not directly add value to an organization – Researches the threats and tries to come up with better measures– Used by military, government organizations and research

Page 8: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Interaction

• What is Interaction?

– Level of Interaction determines amount of functionality a honeypot provides.

– The greater the interaction, the more you can learn.– The greater the interaction, greater the complexity.– The greater the interaction, greater the risk.

Page 9: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

• High Interaction:– Imitates the services and actions of a real system.

– Gives vast amount of information.

– Involves an operating system.• This involves risk

– Multiple honeypots can be hosted with the use of VM’s

– Difficult to detect

– Expensive to maintain

– Example : Honeynet

Page 10: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

• Low Interaction Honeypots:– It simulates the services of a system.

– Predetermined set of responses

– Not good for interacting with unexpected attacks

– Gives less information. Usually • Time of attack• IP and port of attacker • Destination IP and Port of attack

– Does not involve an operating system

– Easy to Detect

– Cheaper to maintain

Page 11: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Commercial Honeypot Systems• There are a variety of commercial Honey Pot systems available.

– Deception ToolKit (DTK)

– Specter

• Supported OS’s– Microsoft NT – Unix.

Page 12: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Deception Toolkit• First free Honeypot by Fred Cohen in 1997

• Suite of applications that listen to inbound traffic.– FTP, – Telnet,– HTTP

• Uses scripted responses.

• Experienced attackers can quickly realize that they are in a

Honeypot.

Page 13: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

SPECTER• SPECTER is a smart honeypot-based intrusion detection system.

• A Production Honeypot and easy to configure.

• Provides Real-time counterintelligence against hackers.

• It simulates a vulnerable computer with various operating systems like

Windows, Mac, Linux, Solaris etc.

• Offers common Internet services such as SMTP, FTP, POP3, HTTP and

TELNET.

• These services appear perfectly normal to the attackers but in fact are

traps for them to mess around and leave traces.

• Offers Intelligent systems like TRACER, TRACE ROUTE, DNS, FTP Banner

etc.

Page 14: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.
Page 15: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Advantages

• The administrator can learn about vulnerabilities in his system

• Intent of the attackers

• Simple design and implementation

• Less resources

• Cheaper to analyze collected information

Page 16: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Disadvantages• Has to be attacked directly.

• Can be avoided.

• Honeypots can be detected as they have expected characteristics or behavior.

• They can introduce risk to the environment.

• They don’t prevent or stop an attack.

Page 17: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

Conclusion• It’s a tool to learn and understand the how the attack is being executed

and motives of the attackers.

• Not a solution.

• Provide important information about – The attacker– The tools being used by attacker– What the attacker is after

Page 18: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

References• http://www.techrepublic.com/article/which-honeypot-should-i-use/10425

27• http://www.specter.com/default50.htm• http://en.wikipedia.org/wiki/Honeypot_(computing)• http://www.tracking-hackers.com/papers/honeypots.html• http://www.sans.org/security-resources/idfaq/honeypot3.php• Honeypots: Tracking Hackers By Lance Spitzner

Page 19: HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’s in his book “The Cuckoo’s Egg” and by Bill Cheswick’s.

THANK YOU