Development and Implementation of a Honeynet on a University Owned Subnet Erin L. Johnson, John M. Koenig, Dr. Paul Wagner (Faculty Mentor) {johnsone,

Slides:



Advertisements
Similar presentations
Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Advertisements

Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Bradley Cowie, Barry Irwin and Richard Barnett Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Honeypots and Network Security Research by: Christopher MacLellan Project Mentor: Jim Ward EPSCoR and Honors Program.
Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad.
© Prentice Hall CHAPTER 1 Managing IT in an E-World.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Worm and Botnet Trapper System Using Honeypots Yan Gao & Usman Jafarey.
Honeynet/Honeypot Project - Leslie Cherian - Todd Deshane - Patty Jablonski - Creighton Long May 2, 2006.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Accounting Management IACT 918 April 2005 Glenn Bewsell/Gene Awyzio SITACS University of Wollongong.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.
Maintaining and Updating Windows Server 2008
A Coach’s Communication Strategy and its Relationship to a Collegiate Player’s Motivation to Perform as an Athlete Dana Neil, Andrea Pendergast, Amy Schmidt,
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Test Review. What is the main advantage to using shadow copies?
Working with Workgroups and Domains
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Viewed in cross-section, daily growth increments of calcium carbonate are evident. Hatching is a physiologically stressful event, which produces a distinctive.
A Longitudinal Study of Writing by Psychology Majors: A Quantitative Text Analysis A Longitudinal Study of Writing by Psychology Majors: A Quantitative.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Advanced Attack Detection and Infrastructure Protection Sean Ensz –OU IT Security Analyst Sallie Wright –OSU IT Security Officer Dr. Mark Weiser –OSU Director.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Digitally Signed Transcripts Department of Computer Science, University of Wisconsin – Eau Claire Student Researcher: Kevin M. Spinar
A Virtual Distributed Honeynet at KFUPM: A Case Study Build a high-interaction honeynet environment at KFUPM’s two main campuses: The students’ living.
Linux Networking and Security
NETWORK OPERATING SYSTEM INTEROPERABILITY Jason Looney EKU, Department of Technology, CEN.
SARS and Information Policy: Emerging Roles for Information Practitioners Information Flow ·IPs could help in developing information policy because they.
© 2006 Property of Lancope. Proprietary and Confidential. Lancope and Emory University: Illuminating (and Securing) the Network Andy Wilson Senior Systems.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Forensic Computing: Tools, Techniques and Investigations Assignment 1 Seminar.
By: Keith Reiter COSC 356. Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary.
Maintaining and Updating Windows Server 2008 Lesson 8.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Enterprise Network Security Threats that are Overlooked.
Network - definition A network is defined as a collection of computers and peripheral devices (such as printers) connected together. A local area network.
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
Firewalls.
Java Embedded Network Intrusion Security
Honeypots and Honeynets
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Northern New Mexico College Department of Engineering
Security Overview: Honeypots
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
FIREWALL.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Honeypots Visit for more Learning Resources 1.
Presentation transcript:

Development and Implementation of a Honeynet on a University Owned Subnet Erin L. Johnson, John M. Koenig, Dr. Paul Wagner (Faculty Mentor) {johnsone, koenigjm, uwec.edu Computer Science Department – University of Wisconsin Eau Claire Background In network security there are several ways to gain information about attacks and program vulnerabilities. One way to do this is to install computers whose sole purpose is to be attacked and then passively log all activity on these computers. A honeynet is a technology that provides this functionality. From honeynet data we can study attackers’ modus operandi and motives directly, allowing for the development of better security tools. Overview The focus of our research project is to implement a honeynet at the University of Wisconsin Eau Claire (UWEC) according to the stipulations set forth by the Honeynet Research Alliance (HRA) while operating with limited resources. Our overall goal is to profile malicious activity in a class C subnet and use this data to fill a demographic gap as well as act as a base for future research. What is a Honeynet? A honeynet is a network of unsecured computers (called honeypots) whose sole purpose is to be attacked. All network activity on the honeynet is passively logged. Because there is no viable reason for anyone to be connecting to these computers, all activity can be reasonably considered malicious. To gather this activity as well as mitigate risk, there have been several tools developed, such as honeywall, which is developed by the Honeynet Research Alliance (HRA). The honeywall is between the Internet and the honeynet and fulfils all of the implementation requirement set forth by the HRA. Honeynet Research Alliance For our honeynet we followed the implementation requirements set forth by the Honeynet Research Alliance (HRA). HRA brings together other Honeynet Projects and consists of roughly 20 members world wide. Their goal is to develop honeypot/net related technologies and share data. As of right now there are no alliance members from a Tier 2 University such as UWEC. Implementation Requirements 1. Data Control: Must be passive and must be able to modify or deny malicious packets. 2. Data Capture: Log network traffic and honeypot activity 3. Data Analysis: Must have a means to extract and analyze captured data 4. Data Collection: Must have a secure location to store data Our Honeynet Our original goal was to mimic the UWEC network as closely as possible while staying cost effective. To keep costs down we decided to implement our honeypots as virtual systems. However, due to several software conflicts our honeypots are Ubuntu Edgy installations rather than Windows XP. Our Network In addition to the data control measures provided by honeywall, network traffic generated from our subnet cannot reach the primary UWEC network. The only traffic from the primary UWEC network that can reach our subnet must be using SSL or SSH. Also, all honeynet traffic must pass though a switch that systems administrators can shut down in an emergency. Acknowledgements We would like to thank our research advisor, Dr. Paul Wagner, as well as Jason Wudi, Tom Paine, and Eric Stevens for their support. Funding provided by the Office of Research and Sponsored Programs and Differential Tuition. Fig 1. A Honeynet Using Honeywall Fig 3. Our Subnet Fig 2. Our Honeynet