Using Honeypots Network Intrusion Detection
Using Honeypots Network Intrusion Detection
Using Honeypots Network Intrusion Detection
Intrusion Detection
10/22/2020
Report #: 202010221030
Agenda
• Introduction
• Honeypot History
• Honeypot Characteristics
• Honeypot Types
• Honeypot Goals
• Honeypots for Intrusion Detection
• Honeypot Logging and Monitoring
• Honeypot Risks and Mitigations
• Conclusion
• References
• Questions
Slides Key:
Non-Technical: Managerial, strategic and high-
level (general audience)
What is a honeypot?
Source: EC Council
Honey System
• Honey System Ubuntu Linux 18.04
o Imitates operating system and
services.
Honey Service
Attacker HTTP Server
• Honey Service
o Imitates software or protocol
functions.
Honey Service
SSH Server
• Honey Tokens
o Imitates data.
Source Public Domain Vectors Honey Service Honey Token
SMB Share Word Doc
Deception-
“The The based
Cuckoo’s Deception Honeynet Technology
Egg” Toolkit Project Boom
1989 1997 2000 2014
Honeypots are:
• Deceptive
o They appear to be something they are not.
Source: StickPNG
• Discoverable
o Located on a network where an attacker is
likely to find them.
• Interactive
Source: Photos.com
o The honeypot will respond to a range of
stimuli from low to high interactivity.
Honeypot Discoverability
Attacker
Outside Network Inside Network
Attacker
Endpoint
Attacker
Honey Systems
High Interaction
Honey Services
Medium Interaction
Honey Systems
Honey Services
Honey Tokens Low Interaction
Questions to ask…
3. What tool will I use to send logs over the network from
the honeypot?
5. How will I filter and parse the honeypot logs for useful
analysis? Log Server
• Research
• Goal is to learn about attackers’ tactics,
techniques and procedures
• Intrusion Detection
• Goal is to be alerted to an attacker’s
presence on the network, as nothing Source: National Geographic
legitimate should be interacting with it
Source: WebStockReview
Research Honeypots
• See
o The attacker needs to see
the honey system, service,
or token
• Think
o The attacker must think the
honey system, service, or
token is worth taking the
time to explore or interact
with
• Do
o The attacker must do
something with the honey
system, service, or token,
generating an alert Source: JP 3-13.4, Military Deception
• See
o Where will an attacker be to see a honeypot?
o Where will they want to pivot to and find more
honeypots waiting for them?
o What would they consider valuable in the
network where additional honeypots could be
placed?
• Think
o How do you make a honeypot important enough
to interact with?
o Do you make it stand out, or blend in?
• Do
o How much functionality do you give the
honeypot so the attacker will interact with it? Source: Wikimedia Commons
Honeypots 10
Risk Mitigation
Using honeypots in place of other Use with other enterprise security tools
security tools
Honeypots aren’t alerting on intruders Use with other enterprise security tools
• Sanders, C. (2020). Intrusion Detection Honeypots: Detection Through Deception. Chris Sanders.
• Intrusion Detection Honeypots: Detection Through Deception - Chris Sanders – PSW #668
o https://www.youtube.com/watch?v=m8i02Hr_g6s
• Stoll, C. (1990). The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket
Books.
• An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied.
o http://cheswick.com/ches/papers/berferd.pdf
• Joint Publication 3-13.4, Military Deception
o https://info.publicintelligence.net/JCS-MILDEC.pdf
• Strand, J. (2017). Offensive Countermeasures: The Art of Active Defense. John Strand
• Black Hills Information Security – Projects
o https://www.blackhillsinfosec.com/projects/
• Active Defense Harbinger Distribution
o https://www.activecountermeasures.com/free-tools/adhd/
• Canary Tokens
o https://docs.canarytokens.org/guide/
• OpenCanary
o https://opencanary.readthedocs.io/en/latest/
Upcoming Briefs
• QakBot/Qbot Malware (10/29)
• SMB-Based Attacks Targeting Healthcare (11/05)
Product Evaluations
Recipients of this and other Healthcare Sector Cybersecurity Coordination Center (HC3) Threat Intelligence
products are highly encouraged to provide feedback to HC3@HHS.GOV.
HC3 works with private and public sector partners to improve cybersecurity
throughout the Healthcare and Public Health (HPH) Sector
Products
Sector & Victim Notifications White Papers Threat Briefings & Webinar
Directed communications to victims or Document that provides in-depth information Briefing document and presentation that
potential victims of compromises, vulnerable on a cybersecurity topic to increase provides actionable information on health
equipment or PII/PHI theft and general comprehensive situational awareness and sector cybersecurity threats and mitigations.
notifications to the HPH about currently provide risk recommendations to a wide Analysts present current cybersecurity topics,
impacting threats via the HHS OIG audience. engage in discussions with participants on
current threats, and highlight best practices
and mitigation tactics.
Need information on a specific cybersecurity topic or want to join our listserv? Send your request for information (RFI) to
HC3@HHS.GOV or call us Monday-Friday, between 9am-5pm (EST), at (202) 691-2110.