By Daniel, Amitsinh & Alfred.  Collect small data sets which are of high value  All activity is assumed to be malicious  Able to capture encrypted.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Honeynet Introduction Tang Chin Hooi APAN Secretariat.
Honey Pot Research And Decision By Hanh Thi Hong Nguyen Venkata Krishna Mahesh Kumar Kondraju Kieran Andrews.
Uzair Masood MASYU001.  What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use.
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)
Honeypot Research Hung Nguyen Brendan Roberts Comp 4027 Forensic and Analytical Computing.
Honeypots Presented by Javier Garcia April 21, 2010.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
1 An Overview of Computer Security computer security.
Dec, Honeyd Virtual Honeypot Frame Work Niels Provos Presented by: Fadi MohsenSupervised by: Dr. Chow CS591 Research Project Presented by: Fadi Mohsen.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
T5 Program Inquiry Based Teaching Rob Schadt Jim Wolff Srikrishna S. Ramachandra June 3, 2008 Rob Schadt Jim Wolff Srikrishna S. Ramachandra June 3, 2008.
Mobile Agents for Intrusion Detection Jaromy Ward.
Intrusion Prevention System DYNAMIC HONEYNET by Rosenfeld Asaf advisor Uritzky Max.
Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Lecture 11 Intrusion Detection (cont)
6 th Annual Workshop on the Teaching Computer Forensics 6 th Annual Teaching Computer Forensics Workshop Enhancing the Experience in Network Incident Investigations.
Introduction to Honeypot, Botnet, and Security Measurement
HONEYPOT.  Introduction to Honeypot  Honeytoken  Types of Honeypots  Honeypot Implementation  Advantages and Disadvantages  Role of Honeypot in.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Honeypot and Intrusion Detection System
Honeypots. Your Speaker Lance Spitzner –Senior Security Architect, Sun Microsystems –Founder of the Honeynet Project –Author of Honeypots: Tracking Hackers.
Honeypots “The more you know about the enemy, the better you can protect about yourself” Rohan Rajeevan Srikanth Vanama Rakesh Akkera.
Honeynets Detecting Insider Threats Kirby Kuehl
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
KFSensor Vs Honeyd Honeypot System Sunil Gurung
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Introduction to Honeypot, measurement, and vulnerability exploits
Honeypots and Honeynets Alex Dietz. To discover methods used to breach a system To discover new root kits To learn what changes are made to a system and.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Engaging the Adversary as a Viable Response to Network Intrusion Sylvain P. Leblanc & G. Scott Knight Royal Military College of Canada PST 05 Workshop.
Intrusion Detection System
Forensic Computing: Tools, Techniques and Investigations Assignment 1 Seminar.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Enterprise Security Management Franklin Tinsley COSC 481.
Mystery Vocabulary Alibi: A story by an accused person of not having been at the scene of the crime.   Clue: Something that appears to give information.
Intrusion Control.
Basics of Intrusion Detection
Honeypots at CESNET/MU
Social Engineering No class today! Dr. X.
Research Recommendations:
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Honeypots.
Intrusion Detection Systems
Security Overview: Honeypots
Honeypots Visit for more Learning Resources 1.
Marcial Quinones-Cardona
Protect data in core business applications
Presentation transcript:

By Daniel, Amitsinh & Alfred

 Collect small data sets which are of high value  All activity is assumed to be malicious  Able to capture encrypted data  IDS-like functionality

 Have the risk of being taken over and used to attack other systems in the network  Need to be walled off from the legitimate system to ensure it does give access to it  Could be held liable for any damages the honeypot causes while under someone elses control

 Intruders may not even take the bait  Still need to be able to identify an individual  What if the source of the intrusion is a public network?  Evidence may not necessarily be admissible in court  May miss evidence as only records actions that interact with the honeypot itself and not over the network  FBI have used a honeypot to successfully gather evidence

 Advantages ◦ Collect small data sets which are of high value ◦ Minimal resources ◦ Reduce false positives ◦ Catching false negatives ◦ Risk mitigation ◦ Attack strategies  Disadvantages ◦ Limited view ◦ Risk of being compromised ◦ Single data point

 two types of honeypots - low-interaction and high- interaction  the main difference between the two is their complexity and interaction they allow an attacker  We recommend using a low-interaction honeypot in a networked environment  Reasons: ◦ do not give attackers much control ◦ simplicity that allows easy deployment and maintenance ◦ low risk factor because they do not work with real production system ◦ captures limited amounts of information, mainly transactional data and some limited interaction. ◦ emulate a service

 Lance Spitzner, 3 June 2003, Honeypots - Definitions and Value of Honeypots viewed 22 March  Mark Rasch, 9 May 2008, Click Crime viewed 21 March  Lance Spitzner, 17 May 2002, Honeypots - Definitions and Value of Honeypots viewed 22 March  Lance Spitzner, 30 April 2003, Honeypots: Simple, Cost-Effective Detection viewed 21 March  Niels Provos, Thorsten Holz 2007, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, Addison Wesley Professional