Seguretat en xarxes informàtiques Autor: Lluís Pérez Vidal Curs Xarxes Linux.ICE-UPC Honeypots Honeypots “A un panal de rica miel...”

Slides:



Advertisements
Similar presentations
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Advertisements

Evangelos Markatos, FORTH CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Intrusion Prevention System DYNAMIC HONEYNET by Rosenfeld Asaf advisor Uritzky Max.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Introduction to Honeypot, Botnet, and Security Measurement
Chapter 7: Using Windows Servers to Share Information.
NoAH Spiros Antonatos Distributed Computing Systems Lab (DCS) Institute of Computer Science.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Evangelos Markatos, FORTH NoAH: A Network of Affined Honeypots : Current State and Collaboration Opportunities.
Honeypot and Intrusion Detection System
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Introduction to Honeypot, measurement, and vulnerability exploits
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
DoS/DDoS attack and defense
HoneyStat: Local Worm Detection Using Honeypots David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, et al from Georgia Institute of Technology Authors: The.
Netprog: Client/Server Issues1 Issues in Client/Server Programming Refs: Chapter 27.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
NETWORK DEVICES Ted Lawson LTEC Hub A hub is a device that allows you to connect multiple devices together, which allows them to act as a single.
Network Devices and Firewalls Lesson 14. It applies to our class…
Unit Communication Hardware
Chapter 7: Using Windows Servers
Chapter Objectives In this chapter, you will learn:
Firewall.
CNT 4704 Computer Communication Networking (not “analysis”)
Routers and Redundancy
CNT 4704 Computer Communication Networking (not “analysis”)
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Prepared By : Pina Chhatrala
Wireless Network Security
CNT 4704 Computer Communication Networking (not “analysis”)
Introduction to Computers
Honeypots at CESNET/MU
Introduction to Networking
Firewalls.
Introduction to Computers
The KGB the Computer and Me
Network Security: IP Spoofing and Firewall
Digital Pacman: Firewall Edition
The Hacking Suite for Governmental Interception
Firewalls Routers, Switches, Hubs VPNs
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
CNT 4704 Analysis of Computer Communication Networks
CNT 4704 Analysis of Computer Communication Networks
Issues in Client/Server Programming
Lecture 3: Secure Network Architecture
Introduction to Internet Worm
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

Seguretat en xarxes informàtiques Autor: Lluís Pérez Vidal Curs Xarxes Linux.ICE-UPC Honeypots Honeypots “A un panal de rica miel...”

Seguretat en xarxes informàtiques Autor: Lluís Pérez Vidal Curs Xarxes Linux.ICE-UPC El honeypot Aquest capítol és una part de Aquest capítol és una part de events/workshop_tnc06/noah_worksho p_markatos_v1.ppt Podeu referir-vos-hi per tenir més informació..

What is a honeypot? An “undercover” computer – which has no ordinary users – which provides no regular service Or a few selected services if needed – Just waits to be attacked… Its value lies on being compromised – Or in being exploited, scanned, etc. Honeypots are an “easy” target – But heavily monitored ones If attacked, they log as much information as possible

When was a honeypot first used? First widely publicized use: The cuckoo’s egg – By Cliff Stoll Cliff Stoll noticed a 75-cent accounting error in the computer he managed – This led Cliff to discover an intruder named “Hunter” – Instead of shutting “Hunter” out, Cliff started to study him – He connected the modem lines to a printer – He created dummy “top-secret” directories to “lure” “Hunter” into coming back – He was paged every time “Hunter” was in – He traced “Hunter” to a network of hackers Paid in cash and drugs and Reporting directly to KGB

How do we receive attacks? Three types of sensors: – Traditional honeypots who wait to be attacked – Collaborating organizations who install low-interaction honeypots and forward “interesting” attacks to NoAH core – A “screensaver” who forwards all unwanted traffic to NoAH Unwanted traffic received at – unused IP addresses – unused TCP/UDP ports

The NoAH architecture

Traditional Honeypots Low Interaction Honeypot listening to a single IP address of the dark space – Filters out unwanted traffic Which is not part of an attack High Interaction honeypots for providing responses

How about limited address space? Number of “traditional” honeypots is usually limited, They cover a small percentage of the IP address space Problem: they may see attack too late Solution: Monitor dark space What is Dark IP Address Space? – Unused IP addresses – IP addresses not associated with any computer – Some organizations (i.e. Universities) have lots of Dark IP address space Assign portions of dark space to this limited number of honeypots Funnel: map the dark space to a single or a few IP addresses

Funneling

Monitoring Dark Space of Cooperating Organizations So, where are we going to find the Dark Space? Collaborating Organizations Organizations may participate in NoAH but lack the ability to maintain a honeypot Packets targeting organization’s black space are tunneled to the honeypots of NoAH core

The NoAH architecture

a honeypot daemon – Run in at home (or at small office) – Run in the background, send all the traffic from the dark space to NoAH core for processing – Dark Space: Unused IP addresses Internal IP addresses Unused ports (or a selected subset of them) – Attackers think they communicate with a home computer but actually talk with honeypots at NoAH core

Empower the people – To help us fight cyberattacks With minimal installation overhead Minimal runtime overhead Appropriate for small organizations – Who want to contribute – But do not have the technical knowledge To install/maintain a full-fledged honeypot

illustrated