1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

F3 Collecting Network Based Evidence (NBE)
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
Network Security Testing Techniques Presented By:- Sachin Vador.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Host Intrusion Prevention Systems & Beyond
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Penetration Testing Security Analysis and Advanced Tools: Snort.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
What is FORENSICS? Why do we need Network Forensics?
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
CSCE 815 Network Security Lecture 25 Data Control in HoneyNets SSH April 22, 2003.
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Oluwatosin Oguntola Firewalls.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Cryptography and Network Security Sixth Edition by William Stallings.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Some Great Open Source Intrusion Detection Systems (IDSs)
Common System Exploits Tom Chothia Computer Security, Lecture 17.
IDS Intrusion Detection Systems
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Backdoor Attacks.
Threats to computers Andrew Cormack UKERNA.
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Firewalls.
Honeypots and Honeynets
Intrusion Detection & Prevention
Introduction to Internet Worm
Presentation transcript:

1 HoneyNets

2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of the Georgia Tech Campus Network Current Vulnerabilities on the Internet

3 Shortcomings Associated with Firewalls 1. The firewall cannot protect against attacks that bypass it, such as a dial–in or dial-out capability. 2. The firewall at the network interface does not protect against internal threats. 3. The firewall cannot protect against the transfer of virus–laden files and programs

4 Shortcomings Associated with Intrusion Detection Systems 1.Increase Complexity of Security Management of Network 2.High Level of False Positive and False Negative Alerts 3.Must Know Signature or Anomoly Detection Pattern

5 Definition of a Honeynet Network Established Behind a Reverse Firewall Captures All In-Bound and Out-Bound Traffic Any Type of System Network is Intended To Be Compromised All Honeynet traffic is suspicious

6 Data Capture and Data Control Data Capture  Collect all information entering and leaving the Honeynet covertly for future analysis Data Control  Covertly protect other networks from being attacked and compromised by computers on the Honeynet

7 Generation I vs. Generation II GEN I Honeynet  Simple Methodology, Limited Capability  Highly effective at detecting automated attacks  Use Reverse Firewall for Data Control  Can be fingerprinted by a skilled hacker  Runs at OSI Layer 3 GEN II Honeynet  More Complex to Deploy and Maintain  Examine Outbound Data and make determination to block, pass, or modify data  Runs at OSI Layer 2

8 Georgia Tech Campus Network Students, 5000 Staff, 69 Departments networked computers on campus Average data throughput 600Mbps/4 terabytes per day NO FIREWALL BETWEEN CAMPUS & INTERNET!  Why? Requirement for Academic Freedom, high throughput  However, individual enclaves within Georgia Tech use firewalls IDS is run at campus gateway  Out of band monitoring and follow-on investigation

9 Establishment of the Honeynet on the Georgia Tech Campus Established in Summer of 2002 Uses Open Source Software Initially Established As One Honeynet Machine behind the firewall IP Address Range Provided by Georgia Tech Office of Information Technology (OIT)

10 Georgia Tech Honeynet

11 Hardware and Software No Requirement for State of the Art Equipment (Surplus Equipment) No Production Systems Minimum Traffic Use Open Source Software (SNORT, Ethereal, MySQL DB, ACID) Use Reverse Firewall Script Developed by Honeynet.org

12 Intrusion Detection System Used with HoneyNet SNORT  Open Source  Signature-Based, with Anomaly-Based Plug-in Available  Can Write Customized Signatures Run Two Separate SNORT Sessions  One Session to Check Against Signature Database  One Session to Capture All Inbound/Outbound Traffic

13 Analysis Console for Intrusion Detection (ACID)

14 Logging and Review of Data Honeynet Data is stored in two separate locations  Alert Data is stored in SQL database  Packet Capture Data is stored in a daily archive file Data Analysis is a time consuming process In our Experience:  One hour/day to analyze traffic  One hour of attack traffic can result up to one week of analysis

15 Ethereal Analysis Tool

16 Exploitations Detected on the Georgia Tech Honeynet 36 possible exploited machines have been detected at Georgia Tech in previous 9 months (through June 2003) A report is made to OIT on each suspected compromise

17 Identification of a System with a Compromised Password Previously Compromised Honeynet Computer Continued to Operate as Warez Server Another Georgia Tech Computer Connected to the Warez Server Investigation Revealed that Password had been Compromised on Second Georgia Tech Computer

18 Detection of Worm Type Exploits GEN I Honeynet Well-Suited to Detect Worm Type Exploits  Repeated Scans targeting specific ports  Analyze captured data for time lapses Ability to Deploy Specific Operating System on Honeynet

19 Exploitation Pattern of Typical Internet Worm Target Vulnerabilities on Specific Operating Systems Localized Scanning to Propagate (Code Red)  3/8 of time within same /16 network  1/2 of time within same /8 network  1/8 of time random address Allows for Quick Infection Within Internal Networks with High Concentration of Vulnerable Hosts

20 Georgia Tech Honeynet Gen II

21 Initial Observations of Gen II Honeynet Configuration is more complex than Gen I Must use variants of Linux 2.4 kernel in order to run Sebek keystroke logger capability Data must continue to be monitored on a daily basis

22 Honeynet Portscan Activity Date Public: 7/24/02 Date Attack: 1/25/03

23 Honeynet Portscan Activity Date Public: 7/16/03 Date Attack: 8/11/03

24 Honeynet Portscan Activity Date Public: 8/15/2003 Date Attack: 8/22/03

25 Conclusions on HoneyNets Honeynet Assists in Maintaining Network Security Provides Platform for Research in Information Assurance and Intrusion Detection