Presented by Stanley Chand & Damien Prescod

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

Uzair Masood MASYU001.  What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use.
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Honeypot Research Hung Nguyen Brendan Roberts Comp 4027 Forensic and Analytical Computing.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Honeypots Presented by Javier Garcia April 21, 2010.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Dec, Honeyd Virtual Honeypot Frame Work Niels Provos Presented by: Fadi MohsenSupervised by: Dr. Chow CS591 Research Project Presented by: Fadi Mohsen.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Intrusion Detection using Honeypots Patrick Brannan Honeyd with virtual machines.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Network security policy: best practices
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Introduction to Honeypot, Botnet, and Security Measurement
Chapter 6: Packet Filtering
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
HONEYPOT.  Introduction to Honeypot  Honeytoken  Types of Honeypots  Honeypot Implementation  Advantages and Disadvantages  Role of Honeypot in.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Honeypot and Intrusion Detection System
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
CIS 450 – Network Security Chapter 3 – Information Gathering.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
KFSensor Vs Honeyd Honeypot System Sunil Gurung
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Lecture 12 Page 1 CS 236 Online Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite coasts.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Honeypots and Honeynets Alex Dietz. To discover methods used to breach a system To discover new root kits To learn what changes are made to a system and.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Security with Honeyd By Ryan Olsen. What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Computer Security By Duncan Hall.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network security Vlasov Illia
Introduction to Networking
Firewalls.
Security in Networking
6.6 Firewalls Packet Filter (=filtering router)
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Firewalls and Security
Presentation transcript:

Presented by Stanley Chand & Damien Prescod

 Introduction  Hackers  Goals of Honeypot  Common topologies for Honeypots  Different types of Honeypots Based on deployment Based on Involvement  Honeynets Architecture  Honeyd Architecture  Entrapments in Honeypots  Anti Honeypots  Conclusion

 Honeypots are often understood to refer to the English children’s character Winnie-the-pooh.  In computer terminology, a Honeypot is a trap set to detect, and aid in counter attacking attempts of unauthorized use of information systems.  Generally it consists of computer data or network sites that appears to be a part of a network but its actually isolated, (un)protected, and monitored, which seems to contain information that would be of value to the attackers.

 Often Honeypots are used as computers, but it can also be used in other forms like data records or even unused IP address space.  They must be handled carefully, else can become a risk to the internal networks. If they are not properly walled off, attackers can use them to break into the system.  These computers run special software, designed to appear to an intruder as being worth looking into. But in reality these programs are dummies, and are specifically constructed to foster interest in attackers.

 A hacker can be defined as: a person using Computer skills to manipulate private IS without authority for mal-intent.  Kevin Mitnick is a famous hacker who is the yardstick in the CP black hat arena.  Why do they do it, Thrill (Kevin), Ego ( MS, Yahoo, Ebay), But in most case malicious intent $$$. Ukrainian Credit card extortion case.  Sentences if caught can vary from 5-10 years, some special cases have cost the freedom of individuals indefinitely. es/hackers_cartoons.jpg

 The goal of the honeypot is to trap or trace the events of the hackers with a pseudo operational network.  Key to the setup is constructing a FTP,DNS or web server outside of the DMZ* safe area.  The collected info can be used as legal evidence or for academic research in anti- hacker software or procedures.  Protect production networks while enticing hacker events.  Configure such that all public inbound IP’s are allowed whilst preventing outgoing traffic via a firewall.

Configuration Keys!! Never leave access to secure data/production data networks. Use moderate passwords not to strong neither easy!! Else you may give away the objective to smarter hackers. Implement no productions ID’s or passwords in the honeypots. Be sure to implement real time monitoring on the honeypot. Have an alerting mechanism configured. You want to know!! In any business architecture where internet usage is available never under estimate the usefulness of a honeypot in conjunction with your VPN. $$$ don’t let profit marginalize security.

De Militarized Zone!! The honeypot should be set up in this area, for security from the internal network, but also to “entice” the hacker. Must have the configuration of a working network.

Configurations such as the one below are great in visually aiding prospective network managers configure their honeypot, for efficient results. 4/dos_figure_6.gif

 There are mainly two types of Honeypots:-  Production Honeypots.  Research Honeypots.  Production Honeypots:- These are easy to use, capture only limited information and are used primarily by companies. These Honeypots are easier to deploy, and gives less information about the attackers than the Research Honeypots do.  Research Honeypots :- They are mainly used by non profit research organizations or an educational institution to gather information about the motives and tactics of the Blackhat community targeting different networks.

 There are again two types of Honeypots (Involvement):-  High Interaction Honeypots.  Low Interaction Honeypots.  High Interaction Honeypots:- Honeypots installed on complex architectures with complex functions are based on high interaction systems. Honeynets, and Decoy server are good example of High Interaction Honeypots.  Low Interaction Honeypots:- They are useful when the maintainers are not able to guarantee that the process will be excluded from rest of the network activities during the attack. Honeyd, and Specters are good example of Low Interaction Honeypots.

 Honeynets are the complex architecture made up of various types of Honeypots.  It’s a network of Honeypots simulating a production environment.  Data Control:- Mechanism for containing attacker activities within the Honeynet, without attackers realizing it.  Data Capture:- Logging of attackers activities without attackers knowledge.

ity/security/v1n2/j2spi02.gif

 Its an open source computer program which has a ability to create virtual host(Honeypots) on a computer network.  These Honeyds allow user an infinite number of computer network configuration.  It acts as a distraction to potential hackers. /sec04/tech/full_papers/provos/provos_html/img1.png

ovos/provos_html/

 Depending on the objective of the honeypot system, research or production.  The use of data acquired must be done so legally.  The setup of the website topology/browser must adhere to legal ramifications.  It can “entice” but not “entrap” potential subjects.  Malicious intent must not be coerced!!

Not the movie, but the action of misleading!  The information on the web must not trick subjects into thinking that there is something to be had publically.  Not only will this evidence not hold up in court as plaintiff material it can backfire and lead to an anti-suit for the respective Honeypot owners. apment_ver1.jpg

Send safe honeypot hunter. Why??? HP’s hurt spammers. HP’s are detectable. TCP sequence analysis, ARP request analysis. What does the Anti-HP do??? It test the open proxy connections and label them as Good, Bad or Traps. Hackers- can open a false mail server at port 25 (proxy test) Connect to this port Attempt to proxy back to its own false mail server. HP may suggest connection, but if hacker does not get any valid connection he can correctly assume it maybe an HP. More anti-Hp’s to come!!!

Current HP’s aren't the solution- detectable Must evolve with hacker environment. Can be poisoned or attacked by hackers If compromised addresses can be made public Some Honey D’s have fixed response messages that if not changed by network administrators can prove backwardly constructive.

 Narrow Field of view:- They can only see activities directed towards them.  Fingerprinting :- This is when an attacker can identify the true identity of Honeypots.  Risk:- Once Honeypots are attacked, can be used to attack or harm other systems.

 From misunderstanding to acceptance.  Improving ease of use.  Easier administration.  Pre-packaged solution.

1.Honey Pot Project- Know your enemy- Anderson Wesley Security + Exam Guide-Christopher Crayton 3.CISSP-Shon Harris 4. A Virtual Honeypot frame work, Internet article (n.d). Retrieved on (2 nd Feb 2008) 5. Anti Honeypot Technology, Internet article (n.d). Retrieved on (2 nd Feb 2008) technology-slides.pdf 6.