Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

Uzair Masood MASYU001.  What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use.
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)
Honeypot Research Hung Nguyen Brendan Roberts Comp 4027 Forensic and Analytical Computing.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Honeypots Presented by Javier Garcia April 21, 2010.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
Intrusion Detection Systems and Practices
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection using Honeypots Patrick Brannan Honeyd with virtual machines.
Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Lecture 11 Intrusion Detection (cont)
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Introduction to Honeypot, Botnet, and Security Measurement
HONEYPOT.  Introduction to Honeypot  Honeytoken  Types of Honeypots  Honeypot Implementation  Advantages and Disadvantages  Role of Honeypot in.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Honeypot and Intrusion Detection System
Honeypots. Your Speaker Lance Spitzner –Senior Security Architect, Sun Microsystems –Founder of the Honeynet Project –Author of Honeypots: Tracking Hackers.
Honeypots “The more you know about the enemy, the better you can protect about yourself” Rohan Rajeevan Srikanth Vanama Rakesh Akkera.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Honeynets Detecting Insider Threats Kirby Kuehl
KFSensor Vs Honeyd Honeypot System Sunil Gurung
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Honeypots and Honeynets Alex Dietz. To discover methods used to breach a system To discover new root kits To learn what changes are made to a system and.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Evaluate the Merits of Using Honeypots to Defend against Distributed Denial- of-Service Attacks on Web Servers By Cheow Lip Goh.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
By Daniel, Amitsinh & Alfred.  Collect small data sets which are of high value  All activity is assumed to be malicious  Able to capture encrypted.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Computer Security By Duncan Hall.
HONEYPOTS An Intrusion Detection System. Index Intrusion Detection System Host bases Intrusion Detection System Network Based Intrusion Detection System.
Safe’n’Sec IT security solutions for enterprises of any size.
Forensic Computing: Tools, Techniques and Investigations Assignment 1 Seminar.
Lecture 13 Page 1 CS 236 Online Intrusion Detection Systems CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
O honeynet Project Lognitive.com Disclaimer This is a technical session that contain non- technical content. Get relaxed so to get ready for some details.
Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools Ch7 Part III Principles of Information Security, Fourth Edition.
CSCE 548 Student Presentation By Manasa Suthram
Managing Secure Network Systems
Wireless Network Security
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Virtual Private Networks
Click to edit Master subtitle style
Outline Introduction Characteristics of intrusion detection systems
Honeypots and Honeynets
Honeypots and Honeynets
Honeypots and Honeynets
The University of Adelaide, School of Computer Science
Security Essentials for Small Businesses
12/6/2018 Honeypot ICT Infrastructure Sashan
Honeypots.
Security Overview: Honeypots
Technology Convergence
Honeypots Visit for more Learning Resources 1.
Presentation transcript:

Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department

Friday, December 07, 2018 A honeypot is a computer system that is set up to act as a decoy to lure cyberattackers, and to detect, deflect or study attempts to gain unauthorized access to information systems. They are the highly flexible security tool with different applications for security. They don't fix a single problem. Instead they have multiple uses, such as prevention, detection, or information gathering A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource 2 Kantonsspital Graubunden ICT Department

Friday, December 07, 2018 A Honey Pot is an intrusion detection technique used to study hackers movements 3 Kantonsspital Graubunden ICT Department

Friday, December 07, 2018 Virtual machine that sits on a network or a client Goals Should look as real as possible! Should be monitored to see if its being used to launch a massive attack on other systems Should include files that are of interest to the hacker 4 Kantonsspital Graubunden ICT Department

Friday, December 07, 2018 By level of interaction High (complex) ex.SDS, Honynets Low (Limited) ex. Kfsensor,Specter,Honeyd By Implementation Virtual simulated by other machines Physical (Real Machines, Own IP address, By purpose Production Research 5 Kantonsspital Graubunden ICT Department

Interaction Low interaction Honeypots They have limited interaction, they normally work by emulating services and operating systems They simulate only services that cannot be exploited to get complete access to the honeypot Attacker activity is limited to the level of emulation by the honeypot Examples of low-interaction honeypots include Specter, Honeyd, and KFsensor Friday, December 07, Kantonsspital Graubunden ICT Department

Interaction High interaction Honeypots They are usually complex solutions as they involve real operating systems and applications Nothing is emulated, the attackers are given the real thing A high-interaction honeypot can be compromised completely, allowing an adversary to gain full access to the system and use it to launch further network attacks Examples of high-interaction honeypots include Symantec Decoy Server and Honeynets Friday, December 07, Kantonsspital Graubunden ICT Department

 Physical  Real machines  Own IP Addresses  Often high-interactive  Virtual  Simulated by other machines that:  Respond to the traffic sent to the honeypots  May simulate a lot of (different) virtual honeypots at the same time Friday, December 07, 2018 Implementation 8 Kantonsspital Graubunden ICT Department

 Outside of computing, honeypot security is often used to refer to “bait” of different kinds, designed to attract and then trap someone (or something). In the IT security world, it’s a system (usually a server, which can be a dedicated machine or may be running in a virtual machine) that is set up specifically to present an attractive target for hackers and attackers.  When you have two or more honeypots that form a network or network segment, it’s called a honeynet. Friday, December 07, 2018 What is honeypot security and how is it used? 9 Kantonsspital Graubunden ICT Department

Friday, December 07, 2018 Implementation Honeypots and honeynets can be used in several different ways: 10 Kantonsspital Graubunden ICT Department

 Security researchers use honeypot security and honeynets to observe and analyze types of attacks and learn more about attackers and attack methods.  Law enforcement personnel use honeypot security and honeynets in “sting” operations, to collect forensics information to help track and catch cybercriminals and evidence used to prosecute them.  Organizations use honeypot security and honeynets to divert attackers from their production networks and systems and to confuse or mislead them with false data.  Honeypots can be valuable in detecting insider attacks as well as outside intrusions. Friday, December 07, 2018 Implementation 11 Kantonsspital Graubunden ICT Department

 Production honeypots are easy to use, capture only limited information, and are used primarily by companies or corporations  Prevention  To keep the bad elements out  There are no effective mechanisms  Deception, Deterrence, Decoys do NOT work against automated attacks: worms, auto-rooters, mass-rooters  Detection  Detecting the burglar when he breaks in  Response  Can easily be pulled offline Friday, December 07, 2018 Production 12 Kantonsspital Graubunden ICT Department

Honeypots can be deployed in a variety of locations on a network. A honeypot outside the external firewall is useful for tracking attempts to scan or attack the internal network.... A honeypot can also be placed in a DMZ to trap attacks to the public facing service. Friday, December 07, Kantonsspital Graubunden ICT Department

 Research honeypots are complex to deploy and maintain, capture extensive information, and are used primarily by research, military, or government organizations.  Collect compact amounts of high value information  Discover new Tools and Tactics  Understand Motives, Behavior, and Organization  Develop Analysis and Forensic Skills Friday, December 07, 2018 Research 14 Kantonsspital Graubunden ICT Department

Advantages Small data sets of high value. Easier and cheaper to analyze the data Designed to capture anything thrown at them, including tools or tactics never used before Require minimal resources Work fine in encrypted or IPv6 environments Can collect in-depth information Conceptually very simple Friday, December 07, Kantonsspital Graubunden ICT Department

Disadvantages Can only track and capture activity that directly interacts with them All security technologies have risk(Legal issue) Building, configuring, deploying and maintaining a high- interaction honeypot is time consuming Difficult to analyze a compromised honeypot High interaction honeypot introduces a high level of risk Low interaction honeypots are easily detectable by skilled attackers Friday, December 07, Kantonsspital Graubunden ICT Department

Working of Honeynet – High – interaction honeypot Honeynet has 3 components: Data control Data capture Data analysis Friday, December 07, Kantonsspital Graubunden ICT Department

Working of Honeyd – Low – interaction honeypot Open Source and designed to run on Unix systems Concept - Monitoring unused IP space Friday, December 07, Kantonsspital Graubunden ICT Department

Summary Honeypot security is not acomprehensive solutins; It doesn’t take the place of strong perimeter defenses, a network intrusion detection and prevention system, good multi-factor authentication, system-level and file- level access controls, and strong encryption for mission-critical and sensitive data. It does provide a tool for greatly extending the amount of information you can gather about attempted and successful attacks beyond what an IDS can provide, and it can draw attackers away from your real resources and keep them occupied without doing harm to your production network. Because an improperly configured honeypot security system could pose a high security risk to your network and other systems or be used as part of a botnet to attack other networks, you should follow best practices and consult both an IT professional with expertise in honeypot deployment and a legal advisor before going “live” with your honeypot. Friday, December 07, Kantonsspital Graubunden ICT Department

Conclusion Not a solution! Can collect in depth data which no other technology can Different from others – its value lies in being attacked, probed or compromised Extremely useful in observing hacker movements and preparing the systems for future attacks Friday, December 07, Kantonsspital Graubunden ICT Department

References specialists/online-training-material/technical-operational#honeypots technology-How-honeypots-work-in-the-enterprise Friday, December 07, Kantonsspital Graubunden ICT Department

Thank you Q ? Friday, December 07, Kantonsspital Graubunden ICT Department