Abstract A Honeypot is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and the used tools. It can also be deployed to attract and divert an attacker from their real targets. One goal of this paper is to show the possibilities of honeypots and their use in a research as well as productive environment. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as each observed traffic is suspicious, because no productive components are running on the system. This fact enables the system to log every byte that flows through the network to and from the honeypot, and to correlate this data with other sources to draw a picture of an attack and the attacker. . Chapter 1 Introduction Global communication is getting more important every day. At the same time, computer crimes are increasing.That the Internet security is very important, it is necessary to have tools for detecting and preventing attacks. It is interesting to know these artifacts, which gains more information about attackers. A popular myth about preventing attacks is to know their attacking strategies. By knowing attack strategies counter measures can be improved. A perfect tool for this can be a Honeypot. Basicaly it is used to gather as much information as possible about attackers. Here we will have look at Honeypot concept, their level of involvement, topologies, and the Honeynet. 1.1 Overview In this chapter in section 1.2, the requirement of Internet security is being discussed. Problems associated with available tools for Internet security .In section 1.3, by considering these problems let us recognize the fundamental importance of Honeypot. Role of Honeypot in Internet security. Section 1.4 gives an overview of the whole report. In this section we have focused our attention on main points covered in the report in abbreviation. 1.2 Internet security Usually, the Internet security is a complex task. The computer crimes are increasing day by day. It is very important to have attention to these crimes and the net Hackers- Crackers. These are the peoples having great influence on the Internet. We must have tools to detecting these people and preventing attacks As in the military, it is important to know, who your enemy is, what kind of strategy he uses, what tools he utilizes and what he is aiming for. Gathering this kind of information is not easy but important. Generally, such information gathering should be done silently, without alarming an attacker. All the gathered information leads to an advantage on the defending side and can therefore be used on productive systems to prevent attacks. 1.3 Role of Honeypot in Internet security A honeypot is primarily an instrument for information gathering and learning. Its primary purpose is not to be an ambush for the blackhat community to catch them in action and to press charges against them. The focus lies on a silent collection of as much information as possible about their attack patterns, used programs, purpose of attack and the blackhat community itself. All this information is used to learn more about the blackhat proceedings and motives, as well as their technical knowledge and abilities. This is just a primary purpose of a honeypot. There are a lot of other possibilities for a honeypot - divert hackers from productive systems or catch a hacker while conducting an attack are just two possible examples. Honeypots are not the perfect solution for solving or preventing computer crimes. Honeypots are hard to maintain and they need operators with good knowledge about operating systems and network security. In the right hands, a honeypot can be an effective tool for information gathering. In the wrong, unexperienced hands, a honeypot can become another infiltrated machine and an instrument for the blackhat community. 1.3 Outline of the Report The remainder of this report is organized as follows. In chapter 2, a defination of honeypot is given and discussed too. The value of Honeypot, what can a honeypot provide, what can it be used for? In chapter 3, preliminaries of honeypot such as level of involvement is discussed these will as benchmark of our further study in latter chapters. In chapter 4, we focus our attention on different Honeypot topologies and honeynets. In this chapter we discuss the placement of Honeypot in a network as well as a special more complex version of honeypots- a so called honeynet. In chapter 5 our secondary attention on the honeynet.Here we will discuss honeynet, value of honeynet how it works and different information gathering methods. Chapter 6 highlights care, feeding and risk in Honeypot as well as in honeynet. Finally, I summarized the report in chapter 7, in which the summary of the report is given. Chapter 2 Overview of Honeypot A honeypot is any system designed for the sole purpose of being exploited. This is a broad definition that can be implemented in many ways. Some honeypot systems use software, some use actual production machines, and some even use virtual machines such as with VMware. Whichever honeypot design method is chosen, the underlying goal is to create a system that appears to be vulnerable. What makes a honeypot different from other vulnerable computer systems is its extensive logging capability. The systems most often include at least four layers of logging to capture attacker activity. Every file accessed, every connection made, every keystroke an attacker makes on a honeypot is logged to a secure location. 2.1 Overview This chapter is organized as follows. In section 2.2 how the Honeypot is organized & defined, the uses of Honeypot and what is Honeypot is discussed in brief. Later in section 2.3 the value of Honeypot is discussed, so what can Honeypot provide, what can it be used for? Each available honeypot has different strengths. The comparison of Honeypot is there in section 2.4 here short overview of the available Honeypots. 2.2 Honeypot Definition Honeypots are an exciting new technology. They allow us to turn the tables on the bad guys, we can take the initiative. In the past several years there has been growing interest in exactly what this technology is and how it works. The purpose of this paper is to introduce you to honeypots and demonstrate their capabilities. We will begin by discussing what a honeypot is and how it works The buzz word “Honeypot” is spooking around. Different vendors claim that they offer honeypot products, people are arguing about honeypots without having a clear image of what a honeypot is. To clarify this issue, a definition of what is meant when talking about honeypots is provided. L. Spitzner1 defines the term honeypot as follows: A honeypot is a resource whose value is being in attacked or compromised. This means, that a honeypot is expected to get probed, attacked and potentially exploited. Honeypots do not fix anything. They provide us with additional, valuable information. In this chapter, a slightly different definition is proposed: A honeypot is a resource which pretends to be a real target. A honeypot is expected to be attacked or compromised. The main goals are the distraction of an attacker and the gain of information about an attack and the attacker. Honeypots do not help directly in increasing a computer network’s security. On the contrary, they do attract intruders and can therefore attract some interest from the Blackhat community on the network where the honeypot is located. 2.2 Strengths of Honeypot Now that we have understanding of two general categories of honeypots, we can focus on their value. Specifically, how we can use honeypots. The two general categories in which honeypots can be used are production purposes or research. When used for production purposes, honeypots are protecting an organization. This would include preventing, detecting, or helping organizations respond to an attack. When used for research purposes, honeypots are being used to collect information. This information has different value to different organizations. Some may want to be studying trends in attacker activity, while others are interested in early warning and prediction, or law enforcement. In general, low-interaction honeypots are often used for production purposes, while high-interaction honeypots are used for research purposes. However, either type of honeypot can be used for either purpose. When used for production purposes, honeypots can protect organizations in one of three ways; prevention, detection, and response. We will take a more in-depth look at how a honeypot can work in all three. A honeypot is a resource, which is intended to get compromised. Every traffic from and to a honeypot is suspicious because no productive systems are located on this resource. In general, every traffic from and to a Honeypot is unauthorized activity. All data collected by a honeypot is therefore interesting data. A honeypot will in general not produce an awful lot of logs because no productive systems are running on that machine which makes analyzing this data much easier. Data collected by a honeypot is of high value and can lead to a better Understanding and knowledge, which in turn can help to increase overall network security. One can also argue hat a honeypot can be used for prevention because it can deter attackers from attacking other systems by occupying them long enough and bind their resources. Against most attacks nowadays (which are based on automated scripts) a honeypot does not help deceiving individuals, as there are no persons to deceive. 2.3 Value Of Honeypot Now that we have understanding of two general categories of honepyots, we can focus on their value. Specifically, how we can use honeypots. Once again, we have two general categories; honeypots can be used for production purposes or research. When used for production purposes, honeypots are protecting an organization. This would include preventing, detecting, or helping organizations respond to an attack. When used for research purposes, honeypots are being used to collect information. This information has different value to different organizations. Some may want to be studying trends in attacker activity, while others are interested in early warning and prediction, or law enforcement. In general, low-interaction honeypots are often used for production purposes, while high-interaction honeypots are used for research purposes. However, either type of honeypot can be used for either purpose. When used for production purposes, honeypots can protect organizations in one of three ways; prevention, detection, and response. Up to this point we have been talking about how honeypots can be used to protect an organization. We will now talk about a different use for honeypots, research. Honeypots are extremely powerful, not only can they be used to protect your organization, but they can be used to gain extensive information on threats, information few other technologies are capable of gathering. One of the greatest problems security professionals face is a lack of information or intelligence on cyber threats. How can we defend against an enemy when we don't even know who that enemy is? For centuries military organizations have depended on information to better understand who their enemy is and how to defend against them. Why should information security be any different? Research honeypots address this by collecting information on threats. This information can then be used for a variety of purposes, including trend analysis, identifying new tools or methods, identifying attackers and their communities, early warning and prediction, or motivations. One of the most well known examples of using honeypots for research is the work done by the Honeynet Project, an all volunteer, non-profit security research organization. All of the data they collect is with Honeynet distributed around the world. As threats are constantly changing, this information is proving more and more critical. 2.4 Comparison of Available Honeypots This section provides a short overview of the available products of honeypots Table 1 shows an aggregation of the most important factors. Table 1: Honeypot Comparison Table Each available honeypot has different strengths. Specter is easy to install and even easier to run due to the nice graphical user interface. Unfortunately, its value is not very high, as no real operating system is provided. But this fact does also help in reducing the risk significantly. Chapter 3 Concepts of Honeypot Honeypots come in many shapes and sizes, making them difficult to get a grasp of. To help us better understand honeypots and all the different types, we break them down into two general categories, low-interaction and high-interaction honeypots. These categories help us understand what type of honeypot you are dealing with, its strengths, and weaknesses. Interaction defines the level of activity a honeypot allows an attacker. the emulated services mitigate risk by containing the attacker's activity, the attacker never has access to an operating system to attack or harm others. 3.1 Level of Involvement One characteristic of a honeypot is its level of involvement. The level of involvement does measure the degree an attacker can interact with the operating system. 3.1.1 Low-Involvement Honeypot A low-involvement honeypot typically only provides certain fake services. A low-involvement honeypot does reduce risk to a minimum through minimizing interaction with the attacker. On a low-involvement honeypot there is no real operating system that an attacker can operate on. This will minimize the risk significantly because the complexity of an operating system is eliminated. On the other hand, this is also a disadvantage. It is not possible to watch an attacker interacting with the operating system, which could be really interesting. A low-involvement Honeypot is like a one-way connection. We only listen, but we do not ask questions ourselves. The role of this approach is very passive. Figure 1: Low-involvement honeypot: A low involvement honeypot does reduce risk to a minimum through minimizing interaction with the attacker A low-involvement honeypot can be compared to an passive IDS5, as both do not alter any traffic or interact with the attacker or the traffic flow. They are used to generate logs and alerts if incoming packets match certain patterns. 3.1.2 Mid-Involvement Honeypot A mid-involvement honeypot provides more to interact with, but still does not provide a real underlaying operating system. The fake daemons are more sophisticated and have deeper knowledge about the specific services they provide. At the same moment, the risk increases.The probability that the attacker can find a security hole or vulnerability is getting bigger because the complexity of the honeypot increases. A compromise of this system is still unlikely and certainly no goal as there are no security boundaries and logging mechanisms which are built for this kind of events. Figure 2: Mid-involvement honeypot: A midinvolvement honeypot does interact with the attacker in a minimal way Through the higher level of interaction, more complex attacks are possible and can therefore be logged and analyzed. The attacker gets a better illusion of a real operating system. He has more possibilities to interact and probe the system. Developing a mid-involvement honeypot is complex and time consuming. Special care has to be taken for security checks as all developed fake daemons need to be as secure as possible. The developed versions should not suffer the same security holes as their real counterparts because this is the main reason to substitute these with fake variants. The knowledge for developing such a system is very high as each protocol and service has to be understood in detail. 3.1.3 High-Involvement Honeypot A high-involvement honeypot has a real underlaying operating system. This leads to a much higher risk as the complexity increases rapidly. At the same time, the possibilities to gather information, the possible attacks as well as the attractiveness increase a lot. One goal of a hacker is to gain root and to have access to a machine, which is connected to the Internet 24/7. A high involvement honeypot does offer such an environment. As soon as a hacker has gained access, his real work and therefore the interesting part begins. Unfortunately the attacker has to compromise the system to get this level of freedom. He will then have root rights on the system and can do everything at any moment on the compromised system. As per se, this system is no longer secure. Even the whole machine can not be considered as secure. This does not matter if he is in a jail, a sandbox or a VMWare6 box because there could be ways to get out of these software boundaries. Figure 3: High-involvement honeypot: A high involvement honeypot has great risk as the attacker can compromise the system and use all its resources. A high-involvement honeypot is very time consuming. The system should be constantly under surveillance. A honeypot which is not under control is not of much help and can even become a danger or security hole itself. It is very important to limit a honeypot’s access to the local intranet, as the honeypot can be used by the blackhats as if it was a real compromised system. Limiting outbound traffic is also an important point to consider, as the danger once a system is fully compromised can be reduced. By providing a full operating system to the attacker, he has the possibilities to upload and install new files.This is where a highinvolvement honeypot can show its strength, as all actions can be recorded and analyzed. Gathering new information about the blackhat community is one main goal of a high-involvement honeypot and legitimates the higher risk. Chapter 4 Placement of Honeypot This chapter will discuss the placement of honeypots in a network as well as a special, more complex version of honeypots - a so called honeynet. 4.1 Honeypot Location A honeypot does not need a certain surrounding environment, as it is a standard server with no special needs. A honeypot can be placed anywhere a server could be placed. But certainly, some places are better for certain approaches as others. A honeypot can be used on the Internet as well as the intranet, based on the needed service. Placing a honeypot on the intranet can be useful if the detection of some bad guys inside a private network is wished. It is especially important to set the internal thrust for a honeypot as low as possible as this system could be compromised, probably without immediate knowledge. If the main concern is the Internet, a honeypot can be placed at two locations: ² In front of the firewall (Internet) ² DMZ7 ² Behind the firewall (intranet) Each approach has its advantages as well as disadvantages. Sometimes it is even impossible to choose freely as placing a server in front of a firewall is simply not possible or not wished. Figure 4: Placement of a honeypot By placing the honeypot in front of a firewall (see figure 4 honeypot (1)), the risk for the internal network does not increase. The danger of having a compromised system behind the firewall is eliminated. A honeypot will attract and generate a lot of unwished traffic like portscans or attack patterns. By placing a honeypot outside the firewall, such events do not get logged by the firewall and an internal IDS system will not generate alerts. Otherwise, a lot of alerts would be generated on the firewall or IDS. Probably the biggest advantage is that the firewall or IDS, as well as any other resources, have not to be adjusted as the honeypot is outside the firewall and viewed as any other machine on the external network. Running a honeypot does therefore not increase the dangers for the internal network nor does it introduce new risks. The disadvantage of placing a honeypot in front of the firewall is that internal attackers can not be located or trapped that easy, especially if the firewall limits outbound traffic and therefore limits the traffic to the honeypot. Placing a honeypot inside a DMZ (figure 4 honeypot(2)) seems a good solution as long as the other systems inside the DMZ can be secured against the honeypot.Most DMZs are not fully accessible as only needed services are allowed to pass the firewall. In such a case, placing the honeypot in front of the firewall should be favored as opening all corresponding ports on the firewall is too time consuming and risky. A honeypot behind a firewall (figure 4 honeypot (3))can introduce new security risks to the internal network,especially if the internal network is not secured against the honeypot through additional firewalls. This could be a special problem if the IPs are used for authentication.It is important to distinguish between a setup where the firewall enables access to the honeypot or where access from the Internet is denied. A honeypot does often provide a lot of services. Probably most of them are not used as exported services to the Internet and are therefore not forwarded to the honeypot by the firewall. By placing the honeypot behind a firewall, it is inevitable to adjust the firewall rules if access from the Internet should be permitted. The biggest problem arises as soon as the internal honeypot is compromised by an external attacker. He gains the possibility to access the internal network through the honeypot. This traffic will be unstopped by the firewall as it is regarded as traffic to the honeypot only, which in turn is granted. Securing an internal honeypot is therefore mandatory, especially if it is a high-involvement honeypot. With an internal honeypot it is also possible to detect a misconfigured firewall, which forwards unwanted traffic from the Internet to the internal network. The main reason for placing a honeypot behind a firewall could be to detect internal attackers. The best solution would be to run a honeypot in its own DMZ, therefore with a preliminary firewall. The firewall could be connected directly to the internet or intranet, depending on the goal. This attempt enables tight control as well as a flexible environment with maximal security. 4.2.2 Honeynets A honeypot is physically a single machine, probably running multiple virtual operating systems. Controlling outbound traffic is often not possible, as the traffic goes directly onto the network. In this case the only possibility to limit outbound traffic is to use a preliminary firewall.Such a more complex environment is often referenced as honeynet. A typical honeynet consists of multiple honeypots and a firewall (or firewalled-bridge) to limit and log network traffic. An IDS is often used to watch for potential attacks and decode and store network traffic on the preliminary system. By placing a firewall in front of a honeypot (or multiple honeypots) the risk based on the honeypot can be reduced. It is possible to control the network flow, the inbound as well as the outbound connections. Logging of network traffic is much easier as this can be done on one centralized location for all honeypots. The captured data does not have to be placed on the honeypot itself and the risk of detecting this data by an attacker is eliminated. Figure 5: Different honeypot topologies: Simple honeypot, honeynet and a virtual honeynet By introducing new machines to the honeypot itself, more hardware is required. A solution with only one machine is thinkable. By using VMWare, setting up multiple virtual systems on one physical machine is possible.Through this attempt, it is even possible to place the firewall on the same machine as all virtual honeypots however the security of this solution isn’t as good as having different physical machines. As soon as the honeynet is a virtual environment, the system could be compromised and the attacker could be able to break out of the virtual machines. Placing a bridge with firewall capabilities in front of a honeypot is much safer as the attacker can not see the bridge. Even attacking the bridge is not possible as the bridge has no IP address and therefore no attack point exists. Introducing additional hardware also raises the complexity of the environment. Understanding networking and associated tools is important as long as the best security has to be provided. Chapter 5 Honeynet A Honeynet is nothing more then one type of honeypot. Specifically, it is a high interaction honeypot designed primarily for research, to gather information on the enemy. Most traditional honeypots have been for deception or detecting attacks. They are usually single systems that emulate other systems, emulate known services or vulnerabilities, or create jailed environments. 5.1 What is Honeynet? A Honeynet is different from traditional honeypots, it is what we would categorize as a research honeypot. This does not make it a better solution then traditional honeypots, merely it has a different purpose. Instead of its value being detecting or deceiving attackers, its value is gaining information on threats. The two biggest design differences from a traditional honeypots are: It is not a single system but a network of multiple systems and applications, which are probed and attacked by blackhats. Honeynets can utilize multiple systems at the same time, such as Solaris, Linux, Windows NT, Cisco router, Alteon switch, etc. This creates a network environment that more realistically mirrors a production network. Also, by having different systems with different applications, such as a Linux DNS server, a Windows IIS webserver, and a Solaris Database server, we can learn about different tools and tactics. Perhaps certain blackhats target specific systems, applications, or vulnerabilities. By having a variety of operating systems and applications, we are able to more accurately profile specific blackhat trends and signatures. All systems placed within the Honeynet are standard production systems. These are real systems and applications, the same you find on the Internet. Nothing is emulated nor is anything done to make the systems less secure. The risks and vulnerabilities discovered within a Honeynet are the same that exist in many organizations today. One can simply take a system from a production environment and place it within the Honeynet. It is these two design differences that make a Honeynet primarily a tool for research. It can be used as a traditional honeypot, such as detecting unauthorized activity, however a Honeynet requires a great deal more work, risk and administration. Its simply not worth all the effort of building and maintaining a Honeynet just to detect attacks. 5.2 Value of Honeynet Traditionally, information security has been purely defensive. Firewalls, Intrusion Detection Systems, encryption; all of these mechanisms are used defensively to protect one's resources. The strategy is to defend one's organization as best as possible, detect any failures in the defense, and then react to those failures. The problem with this approach is it purely defensive, the enemy is on the attack. Honeynets attempt to change that. The primary purpose of a Honeynet is to gather information about threats that exist. New tools can be discovered, attack patterns can be determined, and attacker motives studied. This information that can be used to protect against threats. Honeynets are nothing more then a tool, and as such can be used for other purposes. One example, organizations can use Honeynets to test and develop their Incident Response capabilities. The advantage one has in analyzing these compromised systems is you already have most of the answers. You can then treat a compromised system as a 'challenge', where you test your abilities to determine what happened using various forensic techniques. You can then compare these results to the data captured from within the Honeynet. Examples of this are the numerous challenges sponsored by the Project. Honeynets are merely a tool, they provide value in however you choose to use them. However, their primary purpose and design is based on researching threats. 5.3 How it Works Conceptually, Honeynets are a simple mechanism. You create a network similar to a fishbowl, where you can see everything that happens inside it. Just like the fish, you can watch the hackers interact in your virtual environment. Also just like a fishbowl, you can put almost anything in there you want. This controlled network becomes your Honeynet. The captured activity teaches you the tools, tactics, and motives of the blackhat community. Traditionally, the greatest problem security professionals face in detecting and capturing blackhat activity is information overload. The challenge for most organizations is determining from vast amounts of information what is production traffic and what is malicious activity. Tools and techniques such as Intrusion Detection Systems, host based forensics, or system log analysis attempt to solve this by using a database of known signatures or algorithms to determine what is production traffic and what is malicious activity. However, information overload, data pollution, unknown activity, false positives and false negatives can make analyzing and determining activity extremely difficult. Like all honeypots, the Honeynet solves this problem of data overload through simplicity. A Honeynet is a network designed to be compromised, not to be used for production traffic. Any traffic entering or leaving the network is suspicious by definition. Any connection initiated from outside the Honeynet into the network is most likely some type of probe, attack, or other malicious activity. Any connection initiated from the Honeynet to an outside network indicates that a system was compromised. An attacker has initiated a connection from his newly hacked computer and is now going out to the Internet. This concept of no production 5.4 Requirements To successfully build your Honeynet, there are two critical requirements; Data Control and Data Capture. If there is a failure in either requirement, then there is a failure within the Honeynet. Honeynets can built and deployed a variety of different ways, almost no two Honeynets look the same. But they must all meet the requirements of Data Control and Data Capture. 5.4.1 Data Control Data Control is the containment of activity. When we are dealing with blackhats there is always risk, we must mitigate that risk. We want to ensure that once compromised, a honeypot cannot be used to harm any non-Honeynet system. However, the challenge is to control the data flow without the blackhat's getting suspicious. Once a system is compromised, blackhats will often require Internet connectivity, such as retrieving toolkits, setting up IRC connections, or sending email. We have to give them the flexibility to execute these actions, as these are the very steps we want to learn and analyze. Also, blackhats may become highly suspicious if they cannot initiate any outbound connections. We made that very same mistake with our first Honeynet. We did not allow any outbound Internet connections. It took the blackhat only fifteen minutes to figure out something was wrong, wipe the system drive, and leave the network. So, the trick is to give the blackhat flexibility to execute whatever they need, but without allowing them to use the compromised system to attacks others, such as Denial of Service attacks, system scans, and exploits. In general, the more you allow a blackhat to do outbound, the more you can learn, but the greater the risk. 5.4.2 Data Capture Data Capture is the capturing of all of the blackhat's activities. It is these activities that are then analyzed to learn the tools, tactics, and motives of the blackhat community. The challenge is to capture as much data as possible, without the blackhat knowing their every action is captured. This is done with as few modifications as possible, if any, to the honeypots. Also, data captured cannot be stored on locally on the honeypot. Information stored locally can potentially be detected by the blackhat, alerting them the system is a Honeynet. The stored data can also be lost or destroyed. Not only do we have to capture the blackhats every move without them knowing, but we have to store the information remotely. The key to this is capturing data in layers. You cannot depend on a single layer for information. You gather data from a variety of resources. Combined, these layers then allow you to paint the big picture. 5.4.3 Data Collection There is a third requirement, Data Collection, but this is only for organizations that have multiple Honeynets in distributed environments. Many organizations will have only one single Honeynet, so all they need to do is both Control and Capture data. However, organizations that have multiple Honeynets logically or physically distributed around the world, such as the Honeynet Research Alliance have to collect all of the captured data and store it in a central location. This way the captured data can be combined, exponentially increasing its value. Chapter 6 CARE, FEEDING AND RISK Honeynets are not a "fire and forget" solution. They are a complex type of honeypot that requires constant maintenance, administration and vigilance. For maximum effectiveness, you need to detect and react to incidents as soon as possible. By watching the blackhat activities in real time, you can maximize your data capture and analysis capabilities. Also, to detect the unknown, you are required to constantly review suspicious activity. This requires extensive time and analysis capabilities. For example, in just 30 minutes a blackhat do enough damage to a compromised honeypot to require 30-40 hours to fully understand what happened. Constant maintenance is also required to ensure operability of your Honeynet. If something goes wrong (and something always does) this can cause a failure within the Honeynet Your alert processes may die, disks can fill, IDS signatures become out of date, configuration files become corrupted, system logs need to be reviewed, firewalls need to be updated and patched. These represent just some of the constant care and feeding that is required for a successful Honeynet. Your work has only begun when you implement a Honeynet. Also, there are risks involved with building and implementing a Honeynet. We have blackhats attacking and compromising our systems. By setting up a network to be compromised, we expose ourselves, and others, to risk. You assume a responsibility to ensure that the Honeynet, once compromised, cannot be used to attack or harm other systems. However, with an environment like this, there is always the potential for something to go wrong. We have implemented a variety of measures to mitigate this risk. However, it is quite possible for a blackhat to develop a method or tool that allows them to bypass our access control methods. Also, one need to be constantly testing and updating the environment to ensure control measures are working effectively. Never underestimate the creative power of the blackhat community. The use of a firewall, routers, and other techniques helps mitigate the risk of the Honeynet being used to damage other systems. However, there is still risk. Last, Honeynets will not solve your security problems. We highly recommend that organizations focus on best practices first, such as strong authentication, use of encrypted protocols, reviewing system logs, and secure system builds. By prioritizing on proper policies and procedures, organizations can greatly reduce risk. Honeynets do not reduce risk, they most likely increase it. If your organization is interested in the detection or deception capabilities of honeypots. Honeynets are a honeypot designed primarily for research, to gather information on the enemy. They will not fix your unsecured server, nor fix bad process or procedures. Chapter 7 CONCLUSION Honeypots are a new field in the sector of network security. Currently there is a lot of ongoing research and discussions all around the world. rule configuration. A honeypot is a valuable resource, especially to collect information about proceedings of attackers as well as their deployed tools. No other mechanism is comparable in the effeciency of a honeypot if gathering information is a primary goal, especially if the tools an attacker uses are of interest. But nevertheless, honeypots can not be considered as a standard product with a fixed place in every security aware environment as firewalls or intrusion detection systems are today. Installing and running a honeypot is not just a matter of ”buy and go”. The involved risk and need for tight supervision as well as time intensive analysis makes them difficult to use. Honeypots are in their’s infancy and new ideas and technologies will surface in the next time. At the same time as honeypots are getting more advanced, hackers will also develop methods to detect such systems. A regular arms race could start between the good guys and the blackhat community. Bibliography [1] Reto Baumann, Christian Plattner, “White Paper: Honeypots “ , 2002. [2] Brian Scottberg , William Yurcik , David Doss ,” Internet Honeypots: Protection or Entrapment?”, 2002 [3] http://project.honeynet.org/misc/project.html [4] Jonathan Werrett “Research Proposal “, 2003