Introduction 1. Introduction Goal of this Presentation: To give a better understanding of the overview of our project. Such as: Researches Researches Project.

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

Point of Sale (POS) Client & Back Office Server. Operational Concept What is our Objective? What is our Objective? What are our Goals? What are our Goals?
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Honeypot Research Hung Nguyen Brendan Roberts Comp 4027 Forensic and Analytical Computing.
Extreme Programming Alexander Kanavin Lappeenranta University of Technology.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
1 An Overview of Computer Security computer security.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
COEN 252: Computer Forensics Router Investigation.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Introduction (Based on Lecture slides by J. H. Wang)
HONEYPOT.  Introduction to Honeypot  Honeytoken  Types of Honeypots  Honeypot Implementation  Advantages and Disadvantages  Role of Honeypot in.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Project Title : CyberGIS Project Members : M.S.R Perera D.S Kulasuriya W.M.D Jeewantha Project Title : CyberGIS Project Members : M.S.R Perera D.S Kulasuriya.
Honeypot and Intrusion Detection System
© 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Introduction to Software Engineering ECSE-321 Unit 4 – Project Management 10/19/2015Introduction to Software Engineering – ECSE321Unit 4 – Project Management/1.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security What is Information Security?
Cloud Computing Project By:Jessica, Fadiah, and Bill.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Software Project Management Iterative Model & Spiral Model.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
1 Chapter 2 SW Process Models. 2 Objectives  Understand various process models  Understand the pros and cons of each model  Evaluate the applicability.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Advanced Software Engineering Dr. Cheng
CS457 Introduction to Information Security Systems
Securing Information Systems
Cybersecurity First Principles
Network Security Marshall Leitem 11/30/04
Click to edit Master subtitle style
THE STEPS TO MANAGE THE GRID
Firewalls.
Tool Server Workstation Router Universal
I have many checklists: how do I get started with cyber security?
Honeypots and Honeynets
Digital Pacman: Firewall Edition
Applicable Areas Business Logic Case Presentation Cost Design
Software life cycle models
INFORMATION SYSTEMS SECURITY and CONTROL
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Presentation transcript:

Introduction 1. Introduction Goal of this Presentation: To give a better understanding of the overview of our project. Such as: Researches Researches Project Plans Project Plans Customer Expectations Customer Expectations Business Case Business Case Cost Budget Cost Budget Unsolved Issues, etc Unsolved Issues, etc

2.0 Project Assumptions and Objectives  Project Explanation  Track attacks and log their paths  Create a complete package  Background  1990, first concepts of Honeypot by Clifford Stolls  1997, first toolkit released: Fred Cohen’s Deception Toolkit  Other releases: CyberCop, Back Officer Friendly and Honeynet Project  “Know Your Enemy”, publications

2.0 Project Assumptions and Objectives  Scope  Raytheon allows a great deal of freedom  Add, modify and combine individual components  Wireless Linksys router  Honeypot software  Logging station  Create automatic script for setup

2.0 Project Assumptions and Objectives  Major Objectives  Modify wireless Linksys router  Add authentication capability to router  Modify honeypot open source  Add unique element to open source  Add logging station  Separate logging from the honeypot to eliminate the chance of logging being compromised  Hack our system  Try hack our system and then fix and upgrade features throughout the process Project Assumptions and Objectives

2.0 Project Assumptions and Objectives  Expectations  Unique modification to honeypot open source code  Slow down attacks in real-time to limit their bandwidth  Provide a quick and easy setup  Annual Quantity  Raytheon may possibly continue this project in house and sell it as a package to customters

3.0 Customer Expectations  Wants and Needs of the customer:  The wants and needs of the customer are exactly the results of the effort that our team puts in.  Not usually the norm, but its Raytheon’s only expectation that we create a working honeypot that shows off our team’s imagination and innovation.  Relative importance:  Strong research and development into creating a unique honeypot (priority 1)  Creating a bundled software and hardware product that reflects our R & D. (priority 2)

3.0 Customer Expectations  Product Specifications  Technical  Creating a functioning honeypot, that can be used on an infrastructure network and can effectively log and divert intruders from the production network.  Performance  Emulation of all the traffic directed through the router as though it was traveling through the actual production network.  Quality  An effective logging system to monitor which parts of the production network are being attacked.  Overall Goal  Provide a product that slows down an attacker by creating a simulated network environment, applicable in real world scenarios, which can log an attacker’s intentions and paths, with the potential for collecting materials able to be admissible in a court of law.

3.0 Customer Expectations  Measurable Engineering Characteristics based on customer expectations  Accuracy of logging software  Speed of packet-sniffing algorithm  Size of logged information storage  Speed & Accuracy of IDS (Intrusion Detection System)  Reliability of logged information (Spoofing detection) Project Assumptions and Objectives

3.0 Customer Expectations  Relationship of product specifications to customer’s wants and needs:  Difficult to define since the customer in this case is allowing the product specifications to be their “wants and needs”.  Specifics:  Technical aspect of our product specification is the creation of a functioning honeypot. (high priority)  The performance of our system should be similar to existing honeypot and honeynet systems, but different in that ours adds some innovative and unique designs (which our ad-hoc application should provide). (medium priority)  The product being created, although not explicitly manufactured for future retail value, should be a finished product complete with bundled hardware and software. While this is not a “need” of the customer, it could potentially be a “want”. (low priority)

4.0 Analysis of Competitive Products To our knowledge, there are no products that are similar enough to ours to be considered competitors. our system is in its own class because of the features that will be implemented with it.

4.0 Analysis of Competitive Products However, we have looked at other products that have some of our product’s functionalities, such as:  Symantec Mantrap monitor intrusions instantly look and act exactly like full-function servers  Snort traffic analysis and packet logging on IP networks

5.0 Concept Selection and Description Slow down an attack Slow down an attack the honeypot will act as a diversion to provide time to take the appropriate measures and keep harmful traffic away from the production network Simulate a real network environment Simulate a real network environment create the illusion of a real network so outsiders are none the wiser Log incoming and outgoing data Log incoming and outgoing data determine vulnerabilities in our own network and prevent future attacks Do not interfere with production network Do not interfere with production network keep honeypot separate to avoid complications with production network in case the honeypot is compromised

5.0 Concept Selection and Description Setup Of A Honeypot :

6.0 Project Plan, Resources, Schedules  Major Check Points and Deliverables  Setup Network (10/4 - 10/11)  Comprehensive Plan (10/ /2)  Prototypes Plan (10/12 – 10/27)  Modify Linksys BIOS (10/22 – 11/30)  Configure dedicated machines for specific use (11/15 – 12/09)  Project Plan Review (01/3 – 01/10)  Prototype Results (01/3 – 01/10)

6.0 Project Plan, Resources, Schedules  Major Check Points and Deliverables (con.)  Stimulate Real World Attacks (01/5 – 02/16)  Code integration and test/build (02/07 – 02/14)  Modification to system (02/07 – 02/14)  Final Packaging and Documentation (02/23 – 03/29)

6.0 Project Plan, Resources, Schedules  Responsibilities for each member  We are at the point that we feel it’s better to work as a team  More specific tasks will be assigned later in the project to pairs of members as needed.

7.0 Business Case  With industrial espionage and particularly, computer based industrial espionage on the rise, companies are all going many steps further to protect their information. The most commonly seen threat to a company’s computer network is something as simple as a virus or worm. While these scripts do cause slow downs in production and monetary loss, another threat that is not as often thought about is theft of intellectual property. The wireless honeypot appliance is part of a solution to curb the efforts of outsiders wanting to gain access to our corporate network, be it for malicious or theft reasons.

7.0 Business Case Assumptions: Internal use only – Not for sale Internal use only – Not for sale Still has (positive) financial impact by preventing unauthorized information from being “stolen” from Raytheon. Still has (positive) financial impact by preventing unauthorized information from being “stolen” from Raytheon.

Estimated Product Cost: $20, in R&D $20, in R&D Approximately $ to replicate Approximately $ to replicate All software either developed in-house or under the GPL license All software either developed in-house or under the GPL license

Support Costs: Low support costs Low support costs “Setup and Go” “Setup and Go” Costs may increase if threat is found as a matter of protection Costs may increase if threat is found as a matter of protection

Return on Investment As stated before, no actual dollar amount can be assigned to the value of this project, however the liability that Raytheon employees assume will be greatly decreased. As stated before, no actual dollar amount can be assigned to the value of this project, however the liability that Raytheon employees assume will be greatly decreased.

8. Issues list of areas in the design that are not too well understood list of areas in the design that are not too well understood parts, components, subsystem sourcing for prototypes parts, components, subsystem sourcing for prototypes prototype testing prototype testing

List of areas in the design that are not too well understood List of areas in the design that are not too well understood - Flashing the BIOS of the linksys router. - Flashing the BIOS of the linksys router. - General knowledge of hacking to simulate an attack on the honeypot - General knowledge of hacking to simulate an attack on the honeypot - Adding to the kernel of a linux operating system - Adding to the kernel of a linux operating system - Using IDS and logging tools to record information from attacks - Using IDS and logging tools to record information from attacks - An understanding of networking in general (packets, ports, protocols, etc) - An understanding of networking in general (packets, ports, protocols, etc) - Legal Issues regarding honeypots - Legal Issues regarding honeypots

Parts, Components, Subsystem sourcing for prototypes - Linkysys Wireless Router with Speedbooster WRT54GS (Speedbooster model provides double flash memory) - Linkysys Wireless Router with Speedbooster WRT54GS (Speedbooster model provides double flash memory) - 3 Computers - 3 Computers 1-Running Honeypot "Usermode Linux, Honeyd" 1-Running Honeypot "Usermode Linux, Honeyd" 2-Running Snort "Logs Activity from Router", 2-Running Snort "Logs Activity from Router", 3-Running System logger "Logs activity in honeypot“ 3-Running System logger "Logs activity in honeypot“ A wireless network to implement our honeypot system A wireless network to implement our honeypot system Other Computers to simulate attacks on the honeypot Other Computers to simulate attacks on the honeypot

Prototype testing Prototype testing Evolutionary Prototyping Evolutionary Prototyping Build a bicycle first, then build a car Build a bicycle first, then build a car Start with barebone honeypot system Start with barebone honeypot system Test Test Implement additions one by one from a list of prioritized features Implement additions one by one from a list of prioritized features Repeat until features or time run out Repeat until features or time run out