CSCE 815 Network Security Lecture 24 Your Jail and HoneyNets April 17, 2003.

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
SYSTEM ADMINISTRATION Chapter 19
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
System and Network Security Practices COEN 351 E-Commerce Security.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
Honeywall CD-ROM. 2 Developers and Speakers  Dave Dittrich University of Washington  Rob McMillen USMC  Jeff Nathan Sygate  William Salusky AOL.
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
CSCE 815 Network Security Lecture 23 Jails and such April 15, 2003.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
CSCE 815 Network Security Lecture 25 Data Control in HoneyNets SSH April 22, 2003.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Operating System Security Fundamentals Dr. Gabriel.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Honeypots and Honeynets Alex Dietz. To discover methods used to breach a system To discover new root kits To learn what changes are made to a system and.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Retina Network Security Scanner
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
CompTIA Security+ Study Guide (SY0-401)
Click to edit Master subtitle style
CompTIA Security+ Study Guide (SY0-401)
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Backtracking Intrusions
Honeypots and Honeynets
Intrusion Detection Systems (IDS)
Operating System Security
Network hardening Chapter 14.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

CSCE 815 Network Security Lecture 24 Your Jail and HoneyNets April 17, 2003

– 2 – CSCE 815 Sp 03 Network Administrator Tools Network Administration tools (MSDOS/Windows) ipconfig ifconfig netstat /etc/… not really tools as much as files /sbin/… Find ethernet/IP addresses More tools

– 3 – CSCE 815 Sp 03 Chroot Jails References: general purpose security/Linux site chroot environment:

– 4 – CSCE 815 Sp 03 Chroot Implementation

– 5 – CSCE 815 Sp 03 The Hacker Community The Black Hat Community Facts 20 Unique Scans a day Fastest Compromise – 15 minutes Default RH 6.2 life expectancy is 72 Hrs % increase in activity from 2000 to 2001 Source:

– 6 – CSCE 815 Sp 03 What needs to be done? Awareness : To raise awareness about new and existing threats and attacks Information: Collect information about attacks and people who cause them, their tools and techniques Analysis: Assess vulnerabilities in the system

– 7 – CSCE 815 Sp 03 Deploying a Gen II Honeynet Objective: To learn about threats and attacks on the most vulnerable Unix and Windows based applications To learn about tools and techniques used by the attackers To collect and analyze attack data

– 8 – CSCE 815 Sp 03 Honeypot Operating system with applications vulnerable to attacks Designed to capture all activities generated by an intruder Types: Production Honeypot-Low Interaction- Simulated Environment Eg. Specter, BOF Research Honeypot- High Interaction-Learning purposes

– 9 – CSCE 815 Sp 03 Honeynet Comprised of high interaction honeypots Simulates a real/production environment Components: Data Control: Comprised honeypot should not be used to attack systems Data Capture: Capture Attacker’s activity Eg: Keystrokes Data Collection: Collecting honeynet data in a remote machine

– 10 – CSCE 815 Sp 03 Gen I Honeynet Placed on an isolated network Firewall and Router are used as Access Control Devices Better Data control than a traditional honeypot

– 11 – CSCE 815 Sp 03 Limitations of Gen I Honeypot Easily Detectable Outbound packets have TTL decrement at the routing firewall (Layer 3 device) Intruder can fingerprint the network Poor Data Control mechanism Intruder can use the system to attack other systems Absence of Content-Based detection

– 12 – CSCE 815 Sp 03 Gen II Honeynet Goals of Gen II Honeynet 1.Undetectable System 1.Undetectable System  Placed in a production network  Access control implemented by a gateway device (layer 2 device)  Absence of TTL decrement 2.Efficient Data Control mechanisms

– 13 – CSCE 815 Sp 03 Deploying a Gen II Honeynet

– 14 – CSCE 815 Sp 03 How to do implement the Honeynet Building the Honeypots Building the Sensor Bridge Construction Kernel Hardening Data Control Data Capture Data Collection

– 15 – CSCE 815 Sp 03 Building Honeypots Cleaning the machine FWipe (Linux) Eraser (Windows) Linux Honeypot Redhat7.3, Kernel Apache server, SSH,FTP,Telnet Windows Honeypot Default installation of Windows 2000 server IIS Web Server,IE,Microsoft SQL Server

– 16 – CSCE 815 Sp 03 Honeynet Bridge Internet Eth0-NO IP Eth1-NO IP Administrative Interface  SSH Connections  Trusted Hosts Eth xxx.yyy

– 17 – CSCE 815 Sp 03 Honeynet Communication Channel Application Presentation Session Transport Network Data Link PhysicalApplicationPresentation Session Transport Network Physical Eth1-Promiscuous ModeEth0-Promiscuous Mode IP Forwarding Source IP: Destination IP: TTL : 30 Source MAC : 07 E2 G5 89 P1 Destination MAC:0H F5 7F 2L G2 Src IP: Dest IP: TTL : 30 Src MAC:07 E2 G5 89 P1 Dest MAC:0H F5 7F 2L G2 Hub

– 18 – CSCE 815 Sp 03 Kernel Hardening Bastille Linux Non-executable IP user stack Secures /proc /var directories Prevents users from creating hard links to files that they don’t own Restricts writes into pipes

– 19 – CSCE 815 Sp 03 Data Control: Snort-Inline and IPTables Modes of Operation Modes of Operation Connection Limiting Mode: Count packets by protocol type Drop Mode: Libipq reads packets from kernel space.Packets are matched against snort signatures and dropped if there is a match Replace Mode: Packets are matched against snort signatures and if they match the harmful content of packet is scrubbed and returned to the attacker

– 20 – CSCE 815 Sp 03 Connection Limiting Mode IPTables DROP Packet No =10 IPTables

– 21 – CSCE 815 Sp 03 Snort-Inline Drop Mode IP Tables Ip_queue Snort-Inline Snort Rules=Drop IPTables Drop

– 22 – CSCE 815 Sp 03 Snort-Inline Replace Mode IP Tables Ip_queue Snort-Inline Snort Rules=Replace IPTables bin/sh->ben/sh

– 23 – CSCE 815 Sp 03 Protect the Administrator Interface Portsentry Detects SYN/Half Open, FIN, NULL scans Will block host in real time and report to the administrator

– 24 – CSCE 815 Sp 03 Data Control: Tripwire Maintains integrity of data on the system Creates cryptographic checksums of files and directories Reports when changes are made to Access permissions, inode number, Userid, groupid, date and time, size

– 25 – CSCE 815 Sp 03 Data Capture Mechanisms Snort-Inline Comlog: Log commands executed by cmd.exe (Windows) Eventlog: forwards packets to syslog server(Windows) Sebek: (Linux) Keystroke logging Uses UDP connection

– 26 – CSCE 815 Sp 03 Data Collection Syslog: To deceive intruder maintain another Syslog.conf file in a different location Remote Syslog Stored data on remote machine

– 27 – CSCE 815 Sp 03 Data Analysis Log Sentry: Audits logs and reports any violations Sleuth Kit: Analyses images generated by dd command Converts and copies a file Displays deleted files Creates timeline for file activity

– 28 – CSCE 815 Sp 03 Top 10 Attacked Services Linux Based Attack RPC Apache SSH SNMP FTP R-Services LPD Sendmail BIND/DNS Weak accounts Windows Based Attack IIS MDAC Microsoft SQL Server NETBIOS Weak LM Hashing Anonymous Logon Weak accounts IE Remote Registry Access Windows Scripting Host

– 29 – CSCE 815 Sp 03 Risk Analysis Placed on the Subnet Can be shut down in case of emergency Efficient Data Control Mechanisms Firewall (Connection Limiting Mode) Snort-Inline (Drop Mode)

– 30 – CSCE 815 Sp 03 References Librenix: types of firewalls configurations access contro Newsforge: Deploying a GenII Honeynet: MS Thesis Harish Siripurapu