Download presentation
Presentation is loading. Please wait.
Published byHector Farmer Modified over 9 years ago
2
HoneyD (Part 2)
3
Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct intrusion detection of incoming network traffic. Most small businesses look at cost as a primary factor when implementing a computer network. This factor influenced our decision to look for a turn-key solution that was open source and freely available to use with little or no cost to the user.
5
Snort + HoneyD = Low Cost NIDS solution Empowers Small Businesses to secure network assets and resources at very low costs. Simple to setup and operate. Several application configurations are available and customizable according to user requirements.
7
HoneyD defined: 1. Open Source software framework (It’s free!). 2. Derived from the Honeynet project in 1999. 3. Originally developed by Dr. Neil Provos. 4. Large community of support. 5. Emulates various virtual Operating Systems (OS) called virtual Honeypots.
9
Let’s clarify all this honey terminology. Honeypot: A security resource whose value value lies in being probed, attacked, or compromised High-Interaction Honeypot: Uses real OS or service like File Transfer Protocol or Web Server. Low-Interaction Honeypot: Emulates OS or service HoneyFarm: Centralized architecture of Honeypots & Analysis tools. Honeynet: One or more High-interaction Honeypots HoneyD: One or more Low-interaction Honeypots
11
HoneyD 1. Monitors unused IP addresses 2. Detects Attacker probes on unused IP and takes over IP via ARP spoofing. 3. Creates and routes attacker to virtual Honeypot. 4. Creates multiple honeypots that fool attacker sinto believing they are interacting with hacked system.
12
HoneyD - main features FEATUREDESCRIPTION Simulation of thousands of virtual hosts Simultaneous interaction with a multitude of various virtual honeypots exhibiting different behaviors. Configuration of arbitrary services Responds to network connections and provides for interaction with attackers such as passive fingerprinting. Simulation of various OS at the TCP/IP stack level Feature increases realism of emulation by deceiving attacker fingerprinting tools like Nmap and Xprobe. Simulation of arbitrary routing topologies Topologies can be simulated with latency, packet loss, and various bandwidth characteristics. Subsystem virtualizationExamples: Web servers, FTP Servers, Email Servers.
14
Example Network Configuration Example of a fully integrated network utilizing a HoneyD computer, virtual Honeypots, and real systems.
16
Known Issues Naturally vulnerable to sophisticated attackers. Requires additional software to ensure security and provide tools for analysis. Configuration needs might require monitoring of network activity which increases cost of labor. Since HoneyD is classified as low- interaction, only limited amounts of information can be collected on attacker.
17
SUMMARY MAIN POINTS TO REMEMBER Open Source = low cost. Large community of support. Inherently vulnerable to attacks but simple to setup and operate. Should be installed on a secure network to prevent exploitation. Allows for network intrusions to be easily detected. In addition to HoneyD & Snort, ensure you install the following software to help with analysis and security tasks: Systrace, Honeycomb, ACID In this presentation, we covered the following topics: Why we chose Snort & HoneyD NIDS solution Clarified HoneyD & related terminology Explained how HoneyD functions. Explain known issues.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.