Download presentation
Presentation is loading. Please wait.
Published byJulie Parks Modified over 9 years ago
1
HoneyComb HoneyComb Automated IDS Signature Generation using Honeypots Prepare by LIW JIA SENG 124862 Supervisor : AP. Dr. Mohamed Othman
2
Introduction Honeycomb is a system for automated generation of signatures for network intrusion detection systems (NIDSs). Applies protocol analysis and pattern- detection techniques to traffic captured on honeypots. Honeycomb is good at spotting worms.
3
Problem Statement Manually creation of Intrusion Detection Signatures is a tedious, inefficiency process. There are more and more malware variants and self-propagating malware can spread very rapidly. We need fast, automatic detection.
4
Objective To extend the open source honeypot honeyd by honeycomb plug-in. To implement the honeycomb on real environment. Evaluate honeycomb on controlled environment. Measure the system performance and quality of signatures.
5
Scope Re-implements the research for automated generation attack signatures for NIDSs using Honeypots. Setting up a Honeypots extended system. Conduct experiments on the system. Measure system performance.
6
Literature Review Internet Worms : Worm Propagation Behavior Morris Worm Code Red I Code Red II SQL Slammer Nimda
7
Literature Review Intrusion Detection System : Signature Based Anomaly Detection Snort Bro Related Works : Sweetbait PAYL Autograph
8
Honeycomb Architecture
9
Signature Creation Algorithm
10
Pattern Detection Horizontal detection Comparing all messages at the same depth. Messages are passed as input to the LCS algorithm in pairs.
11
Pattern Detection Vertical detection Concatenating several messages into a string. Comparing this with a corresponding concatenated string.
12
Signature Lifecycles Relational operators on signatures: sig 1 = sig 2 : all elements equal sig 1 sig 2 : elements differ sig 1 sig 2 : sig 1 contains subset of sig 2 ’s facts sig new = sig pool : sig new ignored sig new sig pool : sig new added sig new sig pool : sig new added sig pool sig new : sig new augments sig pool
13
System Framework
14
HoneyComb Network Diagram
15
Experiments Controlled Environment Experiments : Evaluate the effectiveness and the quality of the worm signature created by the HoneyComb Live Traffic Experiments.: Determine what kind of signatures those generate by HoneyComb in the real traffic environment.
16
Controlled Environment Experiments
17
TCP worm – Code Red II UDP worm – SQL Slammer Actual worms packet payload used. Sent worms packets from compromise host to HoneyComb machine.
18
Controlled Environment Experiments
19
Result : TCP Worms – Code Red II alert tcp 192.168.1.15/24 any -> 10.2.0.0/16 80 (msg: "Honeycomb Sat Apr 7 13h51m47 2007 "; ) alert tcp 192.168.1.15/24 any -> 10.2.0.0/16 80 (msg: "Honeycomb Sat Apr 7 14h21m47 2007";flags: PA+; flow: established; content: "GET/default.ida?XXXX XX XX (...) 00|CodeRedII|…";)
20
Controlled Environment Experiments Result : UDP Worms – SQL Slammer alert udp 192.168.1.15/32 256 -> 10.2.0.0/24 1434 (msg: "Honeycomb Sat Apr 7 14h51m47 2007 "; content: "|04 01 01(...)|Qh.dllhel32hkernQhounthickChGetT f| (…) D6 EB|"; )
21
Controlled Environment Experiments A comparison of the signature content and the worm payload sent to the honeypots shows that HoneyComb generates a good quality of signatures in controlled environment. HoneyComb able to detect the TCP and UDP worm efficiency.
22
Live Traffic Experiment
23
Generated Signatures : 18,288 signatures had been generated by HoneyComb. 9,473 signatures were containing flow content strings. HoneyComb able to generate the Slammer signatures precisely. No any Code Red II signature created since it reported died in October 2001
24
Live Traffic Experiment Generated Signatures : alert udp any any -> 10.2.0.0/24 1434 (msg: "Honeycomb Sat Apr 7 14h51m47 2007 "; content: "|04 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 DC C9 B0|B|EB 0E 01 01 01 01 01 01 01|p|AE|B|01|p|AE|B|90 90 90 90 90 90 90 90|h|DC C9 B0|B|B8 01 01 01 01|1|C9 B1 18|P|E2 FD|5|01 01 01 05|P|89 E5|Qh.dllhel32hkernQhounthickChGetTf|B9|llQh32.dhws2_f|B9|etQhsockf| B9|toQhsend|BE 18 10 AE|B|8D|E|D4|P|FF 16|P|8D|E|E0|P|8D|E|F0|P|FF 16|P|BE 10 10 AE|B|8B 1E 8B 03|=U|8B EC|Qt|05 BE 1C 10 AE|B|FF 16 FF D0|1|C9|QQP|81 F1 03 01 04 9B 81 F1 01 01 01 01|Q|8D|E|CC|P|8B|E|C0|P|FF 16|j|11|j|02|j|02 FF D0|P|8D|E|C4|P|8B|E|C0|P|FF 16 89 C6 09 DB 81 F3|<a|D9 FF 8B|E|B4 8D 0C|@|8D 14 88 C1 E2 04 01 C2 C1 E2 08"; )
25
Live Traffic Experiment Generated Signatures : alert tcp any any -> 10.2.0.0/24 80,135,8080 (msg: "Honeycomb Thu Apr 19 05h28m19 2007 "; flags: FRAU21!; flow: established; content of signature 908 : "CONNECT smtp.pchome.com.tw:25 HTTP/1.0|0D 0A 0D 0A|HTTP/1.1 400 Bad Request|0D 0A|Server: Microsoft-IIS/5.0|0D 0A|Date: Tue, 17 Apr 2007 03:57:30 GMT|0D 0A|Content- Type: text/html|0D 0A|Content-Length: 87|0D 0A 0D 0A| Error The parameter is incorrect. CONNECT smtp.pchome.com.tw:25 HTTP/1.0|0D 0A 0D|"; )
26
Honeycomb Performance Benchmarking
27
Discussion HoneyComb v0.7 compiled with Honeyd v1.5b without error, but it provided a strange and useless result when running HoneyComb. The source code in hc_udp.c and hc_tcp.c had been modified and recompiled to fix this error.
28
Discussion -- Problem Unable to generate the signatures for the polymorphic worms. Honeycomb can be fooled by attackers, to generate signatures for legitimate traffic. Consuming a large amount of memory to perform the packets pattern matching. Lost the memory when the system restart, thus, the same signatures will be generated.
29
Conclusion Pattern matching worm detection mechanism of HoneyComb able to produce good quality signatures for worms. Signatures created by HoneyComb can be converted into a format suitable for both Snort and Bro NIDS.
30
Conclusion Honeypot offer an offensive approach to intrusion detection and prevention. HoneyComb suggest that automated signature creation on honeypot is feasible and effectiveness. This automated signature creation system is a first step towards integrating honeypots more closely into security infrastructure.
31
Future Works Working to reducing the effort spent per arriving packets by the HoneyComb. Solve the drawback on unable to generate signature for the polymorphic worms. Provide a better tool to analyze the signatures created. Implication IPv6 to existing HoneyComb architecture.
32
Question and Answer
33
Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.