24
Honeynet Introduction Honeynet Introduction Tang Chin Hooi Tang Chin Hooi APAN Secretariat APAN Secretariat

Honeynet Introduction Tang Chin Hooi APAN Secretariat

Embed Size (px)

Citation preview

Page 1: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Honeynet IntroductionHoneynet Introduction

Tang Chin HooiTang Chin Hooi

APAN SecretariatAPAN Secretariat

Page 2: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Objective of HoneynetObjective of Honeynet

To learn the tools, tactics, and motives To learn the tools, tactics, and motives of the blackhat community, and of the blackhat community, and

share the lessons learned.share the lessons learned.

Page 3: Honeynet Introduction Tang Chin Hooi APAN Secretariat

The Honeynet ProjectsThe Honeynet Projects

Volunteer organization of security Volunteer organization of security professionals researching cyber professionals researching cyber threats.threats.

Deploy networks around the world to Deploy networks around the world to be hacked.be hacked.

Have captured information primarily Have captured information primarily on threats that focus on targets of on threats that focus on targets of opportunity.opportunity.

Page 4: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Research AllianceResearch AllianceActive Member Organizations:Active Member Organizations:

Florida Florida HoneyNetHoneyNet Project Project PaladionPaladion Networks Networks HoneynetHoneynet Project - India Project - India Internet Internet SystematicsSystematics Lab Lab HoneynetHoneynet Project - Greece Project - Greece Mexico Mexico HoneynetHoneynet Project Project NetForensicsNetForensics HoneynetHoneynet Azusa Pacific University Azusa Pacific University HoneynetHoneynet Brazilian Brazilian HoneynetHoneynet Project Project Irish Honeynet Project Irish Honeynet Project Honeynet Project at the University of Texas at Austin Honeynet Project at the University of Texas at Austin Norwegian Honeynet Project Norwegian Honeynet Project UK Honeynet Project UK Honeynet Project West Point Honeynet Project West Point Honeynet Project Pakistan Honeynet Project Pakistan Honeynet Project Italian Honeynet Project Italian Honeynet Project French Honeynet Project French Honeynet Project Ga Tech Honeynet Project Ga Tech Honeynet Project

Page 5: Honeynet Introduction Tang Chin Hooi APAN Secretariat

GoalsGoals

Awareness:Awareness: To raise awareness of To raise awareness of the threats that exist.the threats that exist.

Information:Information: For those already aware, For those already aware, to teach and inform about the to teach and inform about the threats.threats.

Research:Research: To give organizations the To give organizations the capabilities to learn more on their capabilities to learn more on their own.own.

Page 6: Honeynet Introduction Tang Chin Hooi APAN Secretariat

HoneypotsHoneypots

A honeypot is an information system A honeypot is an information system resource whose value lies in resource whose value lies in unauthorized or illicit use of that unauthorized or illicit use of that resource.resource.

Has no production value, anything Has no production value, anything going to or from a honeypot is likely going to or from a honeypot is likely a probe, attack or compromise.a probe, attack or compromise.

Page 7: Honeynet Introduction Tang Chin Hooi APAN Secretariat

AdvantagesAdvantages

Collect small data sets of high value.Collect small data sets of high value. Reduce false positivesReduce false positives Catch new attacks, false negativesCatch new attacks, false negatives Work in encrypted or IPv6 Work in encrypted or IPv6

environmentsenvironments Simple concept requiring minimal Simple concept requiring minimal

resources.resources.

Page 8: Honeynet Introduction Tang Chin Hooi APAN Secretariat

DisadvantagesDisadvantages

Limited field of view (microscope)Limited field of view (microscope) Risk (mainly high-interaction Risk (mainly high-interaction

honeypots)honeypots)

Page 9: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Examples of HoneypotsExamples of Honeypots

Low Interaction honeypots:Low Interaction honeypots:- HoneydHoneyd- KFSensorKFSensor- SpecterSpecter High Interaction honeypots:High Interaction honeypots:- Symantec Decoy Server (ManTrap)Symantec Decoy Server (ManTrap)- HoneynetsHoneynets

Page 10: Honeynet Introduction Tang Chin Hooi APAN Secretariat

HoneynetHoneynet

An architecture, not a productAn architecture, not a product Type of honeypotType of honeypot High-interaction honeypot designed to High-interaction honeypot designed to

capture extensive information on threats capture extensive information on threats Provides real systems, applications, and Provides real systems, applications, and

services for attackers to interact with…services for attackers to interact with…

Page 11: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Architecture RequirementsArchitecture Requirements

Data Control Data Control Data CaptureData Capture

Page 12: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Data ControlData Control

Containment of activity. Containment of activity. Very Very important. important.

Minimize the risk.Minimize the risk. What we allow attacker to do? What we allow attacker to do?

1) The more we allow, the more we 1) The more we allow, the more we learn, the risk would rise. learn, the risk would rise.

2) Control without noticed.2) Control without noticed.

Page 13: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Data Control - MethodsData Control - Methods

Limit outbound connectionsLimit outbound connections

- Linux’s iptables, FreeBSD’s ipfw- Linux’s iptables, FreeBSD’s ipfw NIPS (drop/modify packets)NIPS (drop/modify packets)

- snort-inline- snort-inline Bandwidth restrictionsBandwidth restrictions

- FreeBSD’s Dummynet, Linux’s Advanced - FreeBSD’s Dummynet, Linux’s Advanced Routing and Traffic Control (tc), Cisco’s Routing and Traffic Control (tc), Cisco’s Committed Access Rate, Juniper’s Traffic Committed Access Rate, Juniper’s Traffic PolicingPolicing

Page 14: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Data CaptureData Capture

Monitoring and logging of Monitoring and logging of balckhat’s activities within balckhat’s activities within honeynethoneynet

Multiple layer/mechanisms Multiple layer/mechanisms

1) Few modification to honeypot1) Few modification to honeypot

2) Log and store on separate, secured 2) Log and store on separate, secured machine machine

Page 15: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Data Capture - MethodsData Capture - Methods

Multiple layers Multiple layers

1) Firewall logs – var/log/messages, etc1) Firewall logs – var/log/messages, etc

2) Network traffic – snort, addition to 2) Network traffic – snort, addition to snort-inline snort-inline

3) System Activity – Sebek2 (key 3) System Activity – Sebek2 (key loggers, file,log SSH,SSL,IPsec loggers, file,log SSH,SSL,IPsec communication..) communication..)

4) New tools… 4) New tools…

Page 16: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Example: GEN I HoneynetExample: GEN I Honeynet

Page 17: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Example: GEN II HoneynetExample: GEN II Honeynet

Page 18: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Virtual HoneynetVirtual Honeynet

Running multiple OS on a single Running multiple OS on a single computercomputer

Virtualization software (UML, Virtualization software (UML, VMware)VMware)

Type: Type:

1) Self Contained Virtual Honeynet1) Self Contained Virtual Honeynet

2) Hybrid Virtual Honeynet2) Hybrid Virtual Honeynet

Page 19: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Self Contained Virtual Self Contained Virtual HoneynetHoneynet

Page 20: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Hybrid Virtual HoneynetHybrid Virtual Honeynet

Page 21: Honeynet Introduction Tang Chin Hooi APAN Secretariat

RisksRisks HarmHarm Risk of detectionRisk of detection Risk of disabling Honeynet Risk of disabling Honeynet

functionalityfunctionality ViolationViolation

Solutions: Solutions:

1) Human Monitoring 1) Human Monitoring

2) customization 2) customization

Page 22: Honeynet Introduction Tang Chin Hooi APAN Secretariat

Legal IssuesLegal Issues Consult with local council before Consult with local council before

deploying it deploying it

Page 23: Honeynet Introduction Tang Chin Hooi APAN Secretariat

ReferencesReferences

http://www.honeynet.org/http://www.honeynet.org/ http://www.tracking-hackers.com/papers/honeypots.htmlhttp://www.tracking-hackers.com/papers/honeypots.html http://www.citi.umich.edu/u/provos/honeyd/http://www.citi.umich.edu/u/provos/honeyd/

Page 24: Honeynet Introduction Tang Chin Hooi APAN Secretariat

THE ENDTHE END

Thank You Thank You