A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium 2004. Presenter: Hiral Chhaya for CAP6103.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
HoneyPots Malware Class Presentation Xiang Yin, Zhanxiang Huang, Nguyet Nguyen November 2 nd 2004.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
System Security Scanning and Discovery Chapter 14.
Dec, Honeyd Virtual Honeypot Frame Work Niels Provos Presented by: Fadi MohsenSupervised by: Dr. Chow CS591 Research Project Presented by: Fadi Mohsen.
Network Security Testing Techniques Presented By:- Sachin Vador.
Intrusion Detection using Honeypots Patrick Brannan Honeyd with virtual machines.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage Presenter: Martin Krogel.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Introduction to Honeypot, Botnet, and Security Measurement
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Penetration Testing Security Analysis and Advanced Tools: Snort.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Submitted by: Shailendra Kumar Sharma 06EYTCS049.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
KFSensor Vs Honeyd Honeypot System Sunil Gurung
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
Linux Networking and Security
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Security with Honeyd By Ryan Olsen. What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored.
Slide Background Graphics by Paul Sagona. Overview Introduction Related Work Proposed Approach Experiment Results Conclusion.
Module 10: Windows Firewall and Caching Fundamentals.
DoS/DDoS attack and defense
Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade.
HoneyStat: Local Worm Detection Using Honeypots David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, et al from Georgia Institute of Technology Authors: The.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Authors: Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
CompTIA Security+ Study Guide (SY0-401)
DDoS Attacks on Financial Institutions Presentation
Domain 4 – Communication and Network Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CompTIA Security+ Study Guide (SY0-401)
Cisco Real Exam Dumps IT-Dumps
Intrusion Detection Systems (IDS)
Firewalls Purpose of a Firewall Characteristic of a firewall
OPS235: Configuring a Network Using Virtual Machines – Part 2
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
16EC Computer networks unit II Mr.M.Jagadesh
Honeyd Build it Create a script/program to simulate one
Presentation transcript:

A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103

S ECURITY S ITUATION We’re unable to make secure computer systems or even measure their security. New vulnerabilities kept being exploited Exploit automation and massive global scanning for vulnerabilities to compromise computer systems We use “Honeypot” as one way to get early warnings of new vulnerabilities

I NTRODUCTION What Is Honeypot ???? Defunation-- A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource. Has no production value; Used for monitoring, detecting and analyzing attacks Does not solve a specific problem Honeypots have a low false positive rate

C LASSIFICATION By level of interaction High Low By Implementation Virtual Physical

W HAT IS H ONEYD Honeyd Honeyd : A virtual honeypot application, which allows us to create thousands of IP addresses with virtual machines and corresponding network services.

W HAT C AN H ONEYD D O ??? Simulate TCP and UDP services Support ICMP Handle multiple IP addresses simultaneously Simulate arbitrary network topologies Support topologically dispersed address spaces Support network tunneling for load sharing

HONEYD DESIGN Receiving Network Data Architecture Personality Engine Routing Topology Logging

RECEIVING NETWORK DATA Ways for Honeyd to receives traffic for its virtual honeypots Special route lead data to honeyd host Proxy ARP for honeypots

ARCHITECTURE Configuration database Central packet dispatcher Protocol handles Personality engine Option routing component

PERSONALITY ENGIN To fool fingerprinting tools Uses fingerprint databases by Nmap, for TCP, UDP Xprobe, for ICMP Introduces changes to the headers of every outgoing packet before sent to the network

ROUTING TOPOLOGY Simulates virtual network topologies; Some honeypots are also configured as routers Latency and loss rate for each edge is configured; Support network tunneling and traffic redirection;

H OW T O CONFIGURE Each virtual honeypot is configured with a template. Commands: Create: Creates a new template Set: Assign personality (fingerprint database) to a template Specify default behavior of network protocols Block: All packets dropped Reset: All ports closed by default Open: All ports open by default Add: Specify available services Proxy: Used for connection forwarding Bind: Assign template to specific IP address

L OGGING Honeyd supports several ways of logging network activity. Honeyd creat connection logs to report attempted and completed connections for all protocols. Honeyd can be runs in conjunction with a NIDS.

APPLICATIONS Network decoys Spam Prevention

CONCLUSION Honeyd has many advantages over NIDS Collects more useful information Detects vulnerabilities not yet understood Less likely leads to high false positives Cheats the fingerprint tools Effective network decoys Detecting and immunizing new worms Spam prevention

WEAKNESSES Limit interaction only at network level Not simulate the whole OS Adversaries never gain full access to systems Limited number of simulated services and protocols What if the warm is smart to cheat us? Honeyd will become attackers.

HOW TO IMPROVE Combine Honeyd with high-interaction virtual honeypots using User Mode Linux or VMware to have a better forensic analysis of the attacker; Cheat more fingerprint tools, eg. P0f—passive analyze the network traffic; Simulate more services and protocols, eg. has a better TCP state machine.

THANK YOU !!!!!