O honeynet Project Lognitive.com Disclaimer This is a technical session that contain non- technical content. Get relaxed so to get ready for some details.

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
The Most Analytical and Comprehensive Defense Network in a Box.
Honeypots Presented by Javier Garcia April 21, 2010.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Dec, Honeyd Virtual Honeypot Frame Work Niels Provos Presented by: Fadi MohsenSupervised by: Dr. Chow CS591 Research Project Presented by: Fadi Mohsen.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Honeynet/Honeypot Project - Leslie Cherian - Todd Deshane - Patty Jablonski - Creighton Long May 2, 2006.
Intrusion Prevention System DYNAMIC HONEYNET by Rosenfeld Asaf advisor Uritzky Max.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
PNW Honeynet Overview. Agenda What is a Honeynet What is the PNW Honeynet Alliance Who is involved in the project Where to get more information.
1 The Honeynet Project: Trapping the Hackers Lance Spitzner, Sun Microsystems Presented by Vikrant Karan.
Honeywall CD-ROM. 2 Developers and Speakers  Dave Dittrich University of Washington  Rob McMillen USMC  Jeff Nathan Sygate  William Salusky AOL.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
Introduction to Honeypot, Botnet, and Security Measurement
Speaker : Hong-Ren Jiang A Novel Testbed for Detection of Malicious Software Functionality 1.
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
The Most Analytical and Comprehensive Defense Network in a Box.
HONEYPOT.  Introduction to Honeypot  Honeytoken  Types of Honeypots  Honeypot Implementation  Advantages and Disadvantages  Role of Honeypot in.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Honeypots. Your Speaker Lance Spitzner –Senior Security Architect, Sun Microsystems –Founder of the Honeynet Project –Author of Honeypots: Tracking Hackers.
Deploying Honeynets Dodge, Jr., & Ragsdale - Presentation by Janakiram Dandibhotla.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Honeynets Detecting Insider Threats Kirby Kuehl
KFSensor Vs Honeyd Honeypot System Sunil Gurung
Application of Content Computing in Honeyfarm Introduction Overview of CDN (content delivery network) Overview of honeypot and honeyfarm New redirection.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Security tools. Outline Firewalls and network design Honeybots IPTables Snort.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
Introduction to Honeypot, measurement, and vulnerability exploits
Honeypots and Honeynets Alex Dietz. To discover methods used to breach a system To discover new root kits To learn what changes are made to a system and.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Evaluate the Merits of Using Honeypots to Defend against Distributed Denial- of-Service Attacks on Web Servers By Cheow Lip Goh.
Wireless Intrusion Prevention System
Slide Background Graphics by Paul Sagona. Overview Introduction Related Work Proposed Approach Experiment Results Conclusion.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
HoneyStat: Local Worm Detection Using Honeypots David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, et al from Georgia Institute of Technology Authors: The.
Role Of Network IDS in Network Perimeter Defense.
Forensic Computing: Tools, Techniques and Investigations Assignment 1 Seminar.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Critical Security Controls
Honeypots and Honeynets
Honeypots and Honeynets
Intro to Ethical Hacking
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Honeypots and Honeynets
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Security Overview: Honeypots
Intrusion Detection system
6. Application Software Security
Presentation transcript:

O honeynet Project Lognitive.com Disclaimer This is a technical session that contain non- technical content. Get relaxed so to get ready for some details. We will have fun because we will take seriously

O honeynet Project Lognitive.com O honeynet Project Lognitive.com Build a Security Intelligence Center (SiC) Know your enemy tactics and motives Ahmed A. Selim Information Security Consultant

O honeynet Project Lognitive.com Bottom Line How to boost your SoC activity efficiency by introducing a set of intelligence techniques That’s All

O honeynet Project Lognitive.com Overview Offensive Defensive Sword Shield Analyst Attacker Proactive Reactive

O honeynet Project Lognitive.com Good must win!

O honeynet Project Lognitive.com May the force be with you What we really need….. We need a move SoC SiC Security operation Center Security intelligence Center

O honeynet Project Lognitive.com The Answer ? Be bad - Poison the Honey

O honeynet Project Lognitive.com Honeypots “ Honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource ” KYE- Know Your Enemy “Honeypot a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.” Wiki “Honeypot is system that through lot of log, that need us to analyze for predicting attacker action, analyze malware or preforming attack …!” The speaker

O honeynet Project Lognitive.com Types of Honeypots Low-interaction – Emulates services, applications, and OS’s – Low risk and easy to deploy/maintain – But capture limited information – attackers’ activities are contained to what the emulated systems allow High-interaction – Real services, applications, and OS’s – Capture extensive information, but high risk and time intensive to maintain – Can capture new, unknown, or unexpected behavior

O honeynet Project Lognitive.com Uses of Honeypots Preventing attacks – Automated attacks – (e.g. worms) “Sticky honeypots” monitor unused IP spaces, and slows down the attacker when probed – Human attacks Confuse the attackers, making them waste their time and resources Detecting attacks – Traditional IDSs generate too much logs, large percentage of false positives and false negatives – Traditional IDSs may be ineffective in IPv6 or encrypted environment – Honeypots generate small data, reduce both false positives and false negatives

O honeynet Project Lognitive.com Uses of Honeypots Responding to attacks – Responding to a failure/attack requires in-depth information about the attacker – If a production system is hacked (e.g. mail server) it can’t be brought offline to analyze – Honeypots can be easily brought offline for analysis, while production not. Research purposes – Research honeypots collect information on threats. Attacking purposes – Simulating legal service for legal users

O honeynet Project Lognitive.com Data Control Mitigate risk of honeynet being used to harm non-honeynet systems Tradeoff need to provide freedom to attacker to learn about him More freedom – greater risk that the system will be compromised Some controlling mechanisms Restrict outbound connections (e.g. limit to 1) IDS (Snort-Inline) Bandwidth Throttling

O honeynet Project Lognitive.com No Data Control Data Control

O honeynet Project Lognitive.com Honeypot Theory Control & Capture

O honeynet Project Lognitive.com Data Capture Capture all activity at a variety of levels. – Network activity. – Application activity. – System activity. Issues – No captured data should be stored locally on the honeypot – No data pollution should contaminate – Admin should be able to remotely view honeynet activity in real time – Must use unified time zone

O honeynet Project Lognitive.com Data Control Mitigate risk of honeynet being used to harm non-honeynet systems Tradeoff need to provide freedom to attacker to learn about him More freedom – greater risk that the system will be compromised Some controlling mechanisms Restrict outbound connections (e.g. limit to 1) IDS (Snort-Inline) Bandwidth Throttling

O honeynet Project Lognitive.com How It Works A highly controlled network – where every packet entering or leaving is monitored, captured, and analyzed. Should satisfy two critical requirements: – Data Control: defines how activity is contained within the honeynet, without an attacker knowing it – Data Capture: logging all of the attacker’s activity without the attacker knowing it Data control has priority over data capture

O honeynet Project Lognitive.com Types of Deployments Gen-I (1999): – served as a proof of concept and were very simple to deploy. – basic mechanisms for fulfilling data control and capture requirements. – Data Control through reveres firewall – Data Collection through IDS

O honeynet Project Lognitive.com Types of Deployments Gen-II (2002): – improved a lot of honeypot features where it provide a high level of interaction with a malicious user – Data Control replace reveres firewall with honeywall – Data Collection using different techniques

O honeynet Project Lognitive.com Do The Right!

O honeynet Project Lognitive.com Control, Capture, Analysis & Act Control – Honeywall/IPTables Capture – User-Mode Linux – UML – Honeyd Analysis – PicViz – Hflaw2 Act – Honey snap – Honeysink – Nebula/Honeycomb

O honeynet Project Lognitive.com Capture: User-Mode Linux - UML Opensource virtualization solution Limited to Linux only Sandbox Self contained virtual honeypot Can be used with image of existing Filesystem Need tool to capture traffic (ex: Snort,system logs)

O honeynet Project Lognitive.com Capture: User-Mode Linux - UML Booting Halting

O honeynet Project Lognitive.com Capture: Honeyd Opensoure low-interactive honeypot. One of the active projects. Simulate wide range of systems & service: – Read Nmap os figureprint format /usr/share/nmap/nmap-os-db  /usr/share/honeyd/nmap.print – Emulate multi-vendor service: /usr/share/honeyd/scripts/ Let’s Configure….

O honeynet Project Lognitive.com Capture: generator.sh Generator.sh, is part of Ohoneynet project. Simple tool to create a low-interagtion Honeynet (upto 254 node) in seconds. Distributed under opensource license

O honeynet Project Lognitive.com Analysis

O honeynet Project Lognitive.com Logs…Logs…Logs Info Sec = logs  Need a way to visualize logs instead of analyzing raw logs Logs dimensions…? Answer Parallel Coordinate

O honeynet Project Lognitive.com Analysis: PicViz The simplest visualization method No need for excessive data processing Only need to know PGDL (PicViz Graphic Description Language) sudo pcv -Tpngcairo apache.log -r -a -o apache.png Lets Check it.....

O honeynet Project Lognitive.com The web server is being used all the time, no difference between daytime and nighttime Only two protocols are being used (that are HTTP/1.1 and HTTP/1.0) Six request types were used. While GET is the main one, there are other interesting requests that we could investigate One request type (actually GET) covers fully the URL axis while other request types seems to cover only a subset.

O honeynet Project Lognitive.com Act: Honeycomb Automated IDS signature generator Plugin integrates with Honeyd Signatures are generated /tmp/honeycomb.log Lets generate.....

O honeynet Project Lognitive.com Raping Up SoC is good idea but we need intelligence for fast response Being a good guy doesn’t mean you don’t think badly Honeypot is a good technique but need good care

O honeynet Project Lognitive.com Ohoneynet Project sponsored by Lognitive.com Create a honeypot framework Framework: offer Control, Capture & analysis Finally with User friendly GUI

O honeynet Project Lognitive.com Ahmed A. Selim Ohoneynet Project Lognitive.net