CSCE 815 Network Security Lecture 25 Data Control in HoneyNets SSH April 22, 2003.

Slides:



Advertisements
Similar presentations
IUT– Network Security Course 1 Network Security Firewalls.
Advertisements

FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
The Honeynet Project Advancements in Honeypot Tools.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
Honeywall CD-ROM. Developers and Speakers  Dave Dittrich University of Washington  Rob McMillen USMC  Jeff Nathan Sygate  William Salusky AOL.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Honeywall CD-ROM. 2 Developers and Speakers  Dave Dittrich University of Washington  Rob McMillen USMC  Jeff Nathan Sygate  William Salusky AOL.
Poor Man’s Firewall A firewall that can be setup and implemented with a minimum amount of time and money.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
1 Guide to Network Defense and Countermeasures Chapter 6.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
A Brief Taxonomy of Firewalls
OSI Model Routing Connection-oriented/Connectionless Network Services.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Penetration Testing Security Analysis and Advanced Tools: Snort.
NetFilter – IPtables Firewall –Series of rules to govern what Kind of access to allow on your system –Packet filtering –Drop or Accept packets NAT –Network.
07/11/ L10/1/63 COM342 Networks and Data Communications Ian McCrumRoom 5B18 Tel: voice.
COEN 252 Computer Forensics
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
Common Devices Used In Computer Networks
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
CSCE 815 Network Security Lecture 23 Jails and such April 15, 2003.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Honeynets Detecting Insider Threats Kirby Kuehl
CSCE 815 Network Security Lecture 24 Your Jail and HoneyNets April 17, 2003.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE.
Firewalling With Netfilter/Iptables. What Is Netfilter/Iptables? Improved successor to ipchains available in linux kernel 2.4/2.6. Netfilter is a set.
IPtables Objectives Contents Practicals Summary
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
Networks and Protocols CE Week 7b. Routing an Overview.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
FreeS/WAN & VPN Cory Petkovsek VPN: Virtual Private Network – a secure tunnel through untrusted networks. IP Security (IPSec): a standardized set of authentication.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
1 Requirements for Internet Routers (Gateways) and Hosts Relates to Lab 3. (Supplement) Covers the compliance requirements of Internet routers and hosts.
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Module 10: Windows Firewall and Caching Fundamentals.
Introduction to Linux Firewall
A network primer (or refresher) Henning Schulzrinne (based on slides from Kurose/Ross)
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
LINUX® Netfilter The Linux Firewall Engine. Overview LINUX® Netfilter is a firewall engine built into the Linux kernel Sometimes called “iptables” for.
Cisco I Introduction to Networks Semester 1 Chapter 6 JEOPADY.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
防火牆 Firewall All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or.
Firewalls. A Firewall is: a) Device that interconnects two networks b) Network device that regulates the access to an internal network c) Program that.
Working at a Small-to-Medium Business or ISP – Chapter 8
IT443 – Network Security Administration Instructor: Bo Sheng
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Setting Up Firewall using Netfilter and Iptables
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Presentation transcript:

CSCE 815 Network Security Lecture 25 Data Control in HoneyNets SSH April 22, 2003

– 2 – CSCE 815 Sp 03 Machines to Attack NOT!!! gateway

– 3 – CSCE 815 Sp 03 Honeynet Bridge Internet Eth0-NO IP Eth1-NO IP Administrative Interface  SSH Connections  Trusted Hosts Eth xxx.yyy

– 4 – CSCE 815 Sp 03 Honeynet Communication Channel Application Presentation Session Transport Network Data Link PhysicalApplicationPresentation Session Transport Network Physical Eth1-Promiscuous ModeEth0-Promiscuous Mode IP Forwarding Source IP: Destination IP: TTL : 30 Source MAC : 07 E2 G5 89 P1 Destination MAC:0H F5 7F 2L G2 Src IP: Dest IP: TTL : 30 Src MAC:07 E2 G5 89 P1 Dest MAC:0H F5 7F 2L G2 Hub

– 5 – CSCE 815 Sp 03 What is Data Control and Why? Process used to control or contain traffic to a honeynet Upstream liability – an attck from one of your honeypots Snort-inline – South Florida Honeynet Project

– 6 – CSCE 815 Sp 03 GEN II Data Control Gen II : Incorporates a firewall and IDS in one system Provides more stealthy data control Can be implemented for layer 2 bridging or Layer 3 NAT translation Packets passed from internet to honeynet as layer 2 (datalink) layer packets  no TTL decrement

– 7 – CSCE 815 Sp 03 IPTables for GEN II Honeynet IPTables is a free, stateful, Open Source firewall for Linux 2.4.x and 2.5.x kernels Each packet header is compared to a set of “chains” Chains contain rules: ACCEPT, DROP, REJECT, Queue Custom Chains tcpHandler udpHandler icmpHandler

– 8 – CSCE 815 Sp 03 Example Rule Shell Script $IPTABLES –A tcpHandler –j LOG –log-prefix “OUTBOUND” if test $QUEUE = “yes” then $IPTABLES –A tcpHandler –j QUEUE fi $IPTABLES –A tcpHandler –j ACCEPT $IPTABLES –A tcpHandler –j ACCEPT Environment variable “$QUEUE” controls action of the rule Queueing Connection limits

– 9 – CSCE 815 Sp 03 Snort-Inline Snort: The Open Source Network Intrusion Detection System Snort-Inline: Snort + ability to retrieve packets from the Queue target Gen I : Alert.sh operated at Layer 3 (IP layer) which made it visible by TTL decrement and routing Gen II Data Control if attacker runs traceroute to view router hops then “I see nothing” Sargeant Schultz /sbin/traceroute

– 10 – CSCE 815 Sp 03 Set Up lsmod modprobe ip_queue // to load the ip_queue module into kernel space lsmod modprobe -r ip_queue // to remove

– 11 – CSCE 815 Sp 03 Data Control: Snort-Inline and IPTables Modes of Operation Modes of Operation Connection Limiting Mode: Count packets by protocol type Drop Mode: Libipq reads packets from kernel space.Packets are matched against snort signatures and dropped if there is a match Replace Mode: Packets are matched against snort signatures and if they match the harmful content of packet is scrubbed and returned to the attacker

– 12 – CSCE 815 Sp 03 Connection Limiting Mode IPTables DROP Packet No =10 IPTables

– 13 – CSCE 815 Sp 03 Snort-Inline Drop Mode IP Tables Ip_queue Snort-Inline Snort Rules=Drop IPTables Drop

– 14 – CSCE 815 Sp 03 Snort-Inline Replace Mode IP Tables Ip_queue Snort-Inline Snort Rules=Replace IPTables bin/sh->ben/sh

– 15 – CSCE 815 Sp 03 Supporting Tools for Gen II libipq – development library for iptables Netfilter provides a mechanism for passing packets out of the stack for queueing to userspace, then receiving these packets back into the kernel Netfilter provides a mechanism for passing packets out of the stack for queueing to userspace, then receiving these packets back into the kernel Libpcap libpcap is a packet capture library used by most Open Source sniffers Bridge-Utils: Bridge-Utils is used to set up the Linux Ethernet bridge Latest Snort Rules rc.firewall script: everything you need to set up the GenII data control system

– 16 – CSCE 815 Sp 03 Rc.firewall script This script uses IPTables to create a gateway that counts inbound # and outbound connections and blocks connections once a limit # has been met. Kernel must be compiled with Bridge support Modifications History 21 Apr 2003: Added STOP_OUT option to allow user to block # all outbound connections. Think of this as the # honeynet safe mode.

– 17 – CSCE 815 Sp 03 Protect the Administrator Interface Portsentry Detects SYN/Half Open, FIN, NULL scans Will block host in real time and report to the administrator

– 18 – CSCE 815 Sp 03 Data Control: Tripwire Maintains integrity of data on the system Creates cryptographic checksums of files and directories Reports when changes are made to Access permissions, inode number, Userid, groupid, date and time, sizehttp://

– 19 – CSCE 815 Sp 03 Data Capture Mechanisms Snort-Inline Comlog: Log commands executed by cmd.exe (Windows) Eventlog: forwards packets to syslog server(Windows) Sebek: (Linux) Keystroke logging Uses UDP connection USCSh – Unix keystroke logging 1984 Windows Keystroke logging PhD dissertation 1990s

– 20 – CSCE 815 Sp 03 Data Collection Syslog: To deceive intruder maintain another Syslog.conf file in a different location Remote Syslog Stored data on remote machine

– 21 – CSCE 815 Sp 03 Data Analysis Log Sentry: Audits logs and reports any violations Sleuth Kit: Analyses images generated by dd command Converts and copies a file Displays deleted files Creates timeline for file activity

– 22 – CSCE 815 Sp 03 Risk Analysis Placed on the Subnet Can be shut down in case of emergency Efficient Data Control Mechanisms Firewall (Connection Limiting Mode) Snort-Inline (Drop Mode)

– 23 – CSCE 815 Sp 03 References Librenix: types of firewalls configurations access contro Newsforge: Deploying a GenII Honeynet: MS Thesis Harish Siripurapu GenII Data Control for Honeynets – Univ South Florida