honeypot

advertisement
SEMINAR PRESENTATION
ON
HONEYPOT
UNDER THE GUIDANCE OF
PRESENTED BY
DEPARTMENT OF COMPUTER ENGINEERING
BE COMPUTER SEMINAR
MAIN POINTS TO BE DISCUSSED

INTRODUCTION

OVERVIEW OF HONEYPOT

CONCEPTS OF HONEYPOT

PLACEMENT OF HONEYPOT

HONEYNET

DANGERS

CONCLUSION

BIBLIOGRAPHY
2/26
BE COMPUTER SEMINAR
Honeypot Introduction




Countermeasure to detect or prevent attacks
Know attack strategies
Gather information
Divert hackers from productive systems
3/26
BE COMPUTER SEMINAR
Honeypot Introduction
• Definition
“A honeypot is an information system resource
whose value lies in unauthorized or illicit use of
that resource”
• Value of Honeypots
 Two categories of honeypots
 Production honeypots
 Research honeypots
4/26
BE COMPUTER SEMINAR
Honeypot Concepts
• Level of involvement
 Low-Involvement Honeypot
 Mid-Involvement Honeypot
 High-Involvement Honeypot
5/26
BE COMPUTER SEMINAR
Low-Involvement Honeypot
6/26
BE COMPUTER SEMINAR
Low-Involvement Honeypot
 Provides certain fake services
 No real operating system
 Not possible to watch an attacker
 Reduce risk
 Generate logs and alerts
7/26
BE COMPUTER SEMINAR
Mid-Involvement Honeypot
8/26
BE COMPUTER SEMINAR
Mid-Involvement Honeypot
 Provides more to interact
 complexity of the honeypot increases
 Fake daemons are more sophisticated
 No security boundaries and logging
mechanisms
9/26
BE COMPUTER SEMINAR
High-Involvement Honeypot
10/26
BE COMPUTER SEMINAR
High-Involvement Honeypot





Has a real underlying Operating System
Attacker has rights on the system
He is in Jail,a Sandbox
Can be Danger
All actions can be recorded and analyzed
11/26
BE COMPUTER SEMINAR
 Advantages
• Small data sets of high value
• New tools and tactics
• Minimal resources
• Simplicity
 Disadvantages
• Limited view
• Risk
12/26
BE COMPUTER SEMINAR
Placement of Honeypot
 Honeypot location
 Honeynets
13/26
BE COMPUTER SEMINAR
Locations

In front of the firewall(Internet)

DMZ

Behind the firewall
14/26
BE COMPUTER SEMINAR
Placement of Honeypot
15/26
BE COMPUTER SEMINAR
Honeypot topologies
 Simple Honeypot
 Honeynet
 Virtual Honeynet
16/26
BE COMPUTER SEMINAR
Honeynets
17/26
BE COMPUTER SEMINAR
Honeynet
 What is ?
 Value of honeynet
 How it work ?
18/26
BE COMPUTER SEMINAR
What Is Honynet ?

Specially for research

Network of Multiple Systems

Behind an Access Control Device

All Systems are Slandered Production systems

Risks and Vulnerabilities discovered
19/26
BE COMPUTER SEMINAR
Value of Honynet

Defends Organization and React

Provide an Organization Info. on their own Risk

Test your abilities

Determine System Compromised within
Production Network
20/26
BE COMPUTER SEMINAR
How It Works?




Create a Network Similar to a Fishbowl
To Be Compromised
Connection from Out side is type of Attack
Requirements
•
Data Control
•
Data Capture
•
Data Collection
21/26
BE COMPUTER SEMINAR
Dangers
 Unnoticed takeover of the honeypot by an
attacker

Lost control over the honeypot installation

Damage done to third parties
22/26
BE COMPUTER SEMINAR
Conclusion

A Valuable Resource

To be Compromised

Gains Info. About Attackers and their Strategies

Need for Tight Supervision
23/26
BE COMPUTER SEMINAR
Bibliography
1. Reto Baumann, Christian Plattner “White Paper
Honeypots” 2002
2. “Know Your Enemy: Honeynets“,
“http//project.honynet.org” 2003
3. “Honey pots - Definitions and Value of Honey
pots”
http//www.tracking-hackers.com 2003
24/26
BE COMPUTER SEMINAR
QUESTIONS?
25/26
BE COMPUTER SEMINAR
26/26
Download