Download presentation
Presentation is loading. Please wait.
Published byCorey Caren Shelton Modified over 9 years ago
1
Security with Honeyd By Ryan Olsen
2
What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored network composed of thousands of virtual decoy machines to protect “real” machines on the network.
3
Why use a honeypot? ➲ Three main reasons. ● Can distract adversaries from vulnerable machine on the network. ● Gather information. ● Can be used as an early warning system. ➲ Main use today is to gather information not available using a NIDS.
4
How it Works. ➲ It's a daemon program that creates virtual machine for IP addresses within a specified net. ➲ Claims unused IP addresses on the network. ➲ Can create 65,000 virtual host from a single machine.
5
How it works (2) ➲ Simulates networking stack of OSI model. ➲ Personality can be configured to mimic different operating systems. ● Linux, Windows, Sun ➲ System virtualization. ● Allows virtual IP addresses controlled by honeyd to run regular network applications. ● Can bind ports, accept and initialize TCP and UDP connections. ● Can redirect connection requests.
6
➲ Can simulate asymmetric routing using routing tables. ➲ Can drop packets, add latency ➲ Handles ARP requests automatically.
7
Pros and Cons ➲ Can distract adversaries while gathering information. ➲ Can gain information not available using NIDS. ➲ Can run almost any TCP or UDP service. ➲ Simulates attributes of a real network accurately. ➲ Can be difficult to deploy. ➲ Adversaries can't gain access to virtual machine, so not as much info is gained as possible.
8
Conclusion ➲ Honeyd is an excellent program the allows it's users to learn and understand various patters and movements of viruses/worms or other malicious attacks that are not currently understood. And can provide information not available using NIDS helping decrease the number of false positives.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.