Presentation is loading. Please wait.

Presentation is loading. Please wait.

PNW Honeynet Overview. Agenda What is a Honeynet What is the PNW Honeynet Alliance Who is involved in the project Where to get more information.

Similar presentations


Presentation on theme: "PNW Honeynet Overview. Agenda What is a Honeynet What is the PNW Honeynet Alliance Who is involved in the project Where to get more information."— Presentation transcript:

1 PNW Honeynet Overview

2 Agenda What is a Honeynet What is the PNW Honeynet Alliance Who is involved in the project Where to get more information

3 Purpose of a Honeynet Demonstrate the feasibility to set up a domain honeynet Develop best practices for procedures, etc. Monitor misusers’ attempts to access computer resources Monitor computer network for viruses, worms, automated probes Attract users to target machines instead of real machines Automatically log info for: improving defensive measures, improving offensive measures, HR disciplinary measures, information for law enforcement

4 Components of a Honeynet Honeywall Target PCs  Windows XP  Linux  Network infrastructure  Other Management PC Hackers, Script Kiddies, etc.

5 Objectives of the Alliance Guide implementation of several GenII “Honeywalls” (honeynets)  Best Practice deployments  Best Practice on coordinating dispersed Honeynets Capture images of compromised systems Enter these (and “clean” images) into a database for retrieval and comparison Design that database Implement a client/server in FIRE for loading these images onto systems over the network Implement integrity checking functions in FIRE to simplify analysis

6 Vision of the Forensic Lab Student boots lab system using custom FIRE CD Chooses which compromised system to analyze Bits loaded to disk, verified Student performs analysis, answers specific questions (which are compared with analysis in database) Repeat…

7 Projects within PNW Honeynet Alliance UW  Creating new Honeywall  Creating target image/images SU  Creating a Database to manage compromised system images  Project management U of I  Administrative vetting  Trend Analysis

8 Project Deliverables GenII Honeywall Image Database Standard images for target machines Images of compromised images Honeywall logs of successful and unsuccessful attacks Best Practice documentation  Deployment  Coordinating Honeynets Other Documentation  Comparison of attacks on different Honeynets at different schools

9 Schools that are involved Schools deploying Honeynets Schools that will be using the images

10 Additional Information http://PNWHoneynet.Seattleu.edu “The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks” http://www.tracking-hackers.com/papers/gatech- honeynet.pdf http://www.tracking-hackers.com/papers/gatech- honeynet.pdf http://www.honeynet.org http://staff.washington.edu/dittrich/pnw- honeynet/reading http://staff.washington.edu/dittrich/pnw- honeynet/reading


Download ppt "PNW Honeynet Overview. Agenda What is a Honeynet What is the PNW Honeynet Alliance Who is involved in the project Where to get more information."

Similar presentations


Ads by Google