Honeypots By Merkur Maclang and John Luzzi CMPT 495.

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

Emerging Threats, RF-ID and eCrime issues. Pascal Chauvaud 28/06/2006.
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
Uzair Masood MASYU001.  What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use.
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)
Protection of Information Assets I. Joko Dewanto 1.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Troubleshooting Accessing the WAN – Chapter 8.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Mobile Computing Dorota Huizinga Department of Computer Science.
Introduction to Systems Architecture Kieran Mathieson.
Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004
Honeywall CD-ROM. 2 Developers and Speakers  Dave Dittrich University of Washington  Rob McMillen USMC  Jeff Nathan Sygate  William Salusky AOL.
Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.
Introduction to Honeypot, Botnet, and Security Measurement
Ajmer Singh PGT(IP) Software Concepts. Ajmer Singh PGT(IP) Operating System It is a program which acts as an interface between a user and hardware.
Chapter 4.  Can technology alone provide the best security for your organization?
HONEYPOT.  Introduction to Honeypot  Honeytoken  Types of Honeypots  Honeypot Implementation  Advantages and Disadvantages  Role of Honeypot in.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
Honeypots. Your Speaker Lance Spitzner –Senior Security Architect, Sun Microsystems –Founder of the Honeynet Project –Author of Honeypots: Tracking Hackers.
Honeypots and Honeynets A New Response to Cybercrime Analysis NAAG Seattle 04/14/03.
Honeypots “The more you know about the enemy, the better you can protect about yourself” Rohan Rajeevan Srikanth Vanama Rakesh Akkera.
Homeland Security UNCLASSIFIED United States Coast Guard Office of Port and Facility Compliance (CG-FAC) Cyber Security and the Marine Transportation System.
Introduction 1. Introduction Goal of this Presentation: To give a better understanding of the overview of our project. Such as: Researches Researches Project.
KFSensor Vs Honeyd Honeypot System Sunil Gurung
Nullcon Goa 2010http://nullcon.net Botnet Mitigation, Monitoring and Management - Harshad Patil.
Senior Design Projects Sam Brandler securboration.com.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Network Troubleshooting
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
By Dinesh Bajracharya Nepal Components of Information system.
Honeypots and Honeynets Alex Dietz. To discover methods used to breach a system To discover new root kits To learn what changes are made to a system and.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
24 September An Introduction to Honeynets and Intrusion Protection Systems James Kearney Oct. 25, 2004.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
Cosc 4765 Computer Security Thinking beyond today.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
Component 6- Health Management Information Systems Unit 5-2 Clinical Decision Support Systems This material was developed by Duke University, funded by.
SECURITY ANALYSIS TOOLS FOR INFORMATION MANAGEMENT Alicia Coon.
O honeynet Project Lognitive.com Disclaimer This is a technical session that contain non- technical content. Get relaxed so to get ready for some details.
Kevin Watson and Ammar Ammar IT Asset Visibility.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Honeypots: Not Just for Pooh
Systems Security Keywords Protecting Systems
Building a Security Operations Center
ICTF EC2 By Daniel Ruiz.
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Honeypots.
Security Overview: Honeypots
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Government and the State
Week1 software - Lecture outline & Assignments
LO1 - Know about aspects of cyber security
Computer Security Damian Gordon.
Basic Positions net defense zone defense zone attack zone
Presentation transcript:

Honeypots By Merkur Maclang and John Luzzi CMPT 495

What is a Honeypot? A computer system open to attackers

Honeypot Positioning

Considerations What do you want out of it? How should the network environment be established?

Legal Issues U.S. state law adoption of the S-DMCA legislation, defining unlawful communication devices as “ any communication device which is capable of facilitating the disruption of a communication service without the express consent of express authorization of the communication service provider. ”

Types of Honeypots Diversionary ex. La Brea Tarpit: makes it look like there are more devices on the network than there really are Confusion ex. Honeyd: OS deception tool that can obscure the true operating system and confuse attackers Research ex. Tiny HoneyPot: similar to La Brea but includes IDS software Snort

Correct Implementations Not a toy! Know what you are doing Keep up to date Secure it

References Know Your Enemy: Honeynets in Universities SecurityDocs HONEYPOTS REVEALED Computer Network Defense The Honey Net Project “ How to build a Honeypot ” ; SysAdmin Sept 2003 Volume 12 – 9