Complete Tech Sem
Complete Tech Sem
INTRODUCTION
1.1 Outline:
Global communication is getting more important every day. At the same time, computer crimes
are increasing. Countermeasures are developed to detect or prevent attacks - most of these
measures are based on known facts, known attack patterns. As in the military, it is important to
know, who your enemy is, what kind of strategy he uses, what tools he utilizes and what he is
aiming for. Gathering this kind of information is not easy but important. By knowing attack
strategies, countermeasures can be improved and vulnerabilities can be fixed. To gather as much
information as possible is one main goal of honey pots.
Generally, such information gathering should be done silently, without alarming an attacker. All
the gathered information leads to an advantage on the defending side and can therefore be used on
productive systems to prevent attacks
.
1.2 Honey Pots:
Definition:
A honeypot is an "an information system resource whose value lies in unauthorized or illicit use
of that resources".
1.4 Goals:
1
2. LITERATURE SURVEY
2.1.2Title: Paxson, Vern. "Bro: A System for Detecting Network Intruders in Real-
Time." Computer Networks. 1999. 2435-2463
Description:
Paxson's journal article describing the first system that could perform network intruder detect in real-
time. The paper introduces a language for describing high-level network use rules. The article can be
found at http://www.ece.cmu.edu /~adrian/731-sp04/readings/paxson99-bro.pdf.
2.1.3Title: Provos, Niels. "A Virtual Honeypot Framework." In Proceedings of the 13th
USENIX Security Symposium. 2004. 1-14
Description:
The paper that laid the groundwork for the honeyd project. Provos describes building virtual
honeypots which meet help honeypots meet the need to monitor a large network address space. The
paper is located at http://www.citi.umich.edu /techreports/reports/citi-tr-03-1.pdf.
2
2.2 List of Textbooks Referred:
Description:
Description:
http://www.pcmag.com/encyclopedia_term/0,2542,t=honeypot&i=44335,00.asp.PC Magazine's
encyclopedia entry for honeypot.
2.2.3Title: Provos, Niels and Thorsten Holz. Virtual Honeypots: From Botnet Tracking
to Intrusion Detection. Addison-Wesley Professional, 2007.
Description:
A comprehensive book about honeypots, including ethical and legal issues. Has a perfect "5 star"
rating on Amazon.com at the time of writing.
3
3. HONEY POTS
3.2 Classification :
There are several possible ways to classify honeypots. Some of the more popular are by the level
of interaction available to the attacker, the type of data collected, and the type of system
configuration.
3.2.3 Purpose:
Honeypots are typically used in one of two main fashions: as part of an organization’s computer
network monitoring and defense, and by security researchers who are trying to keep up with the
activities of blackhats.
1) Production environment: Honeypots deployed in a production environment serve to alert
administrators to potential attacks in real time. Because of the advanced level of logging and
information that is available on a honeypot, better defenses against the attacks may be able to
be devised for implementation on the real servers. Production honeypots tend to be reactive
in nature.
2) Research environment: In a research environment, security analysts are trying to figure out
what the next generation of attacks by malicious users will be. These honeypots can be quite
dynamic, as they are adjusted and tweaked to lure attackers and respond to new attack
strategies. Often a research honeypot is actively monitored by a person in real time.
4 HONEYPOT ARCHITECTURE
5
4.1Architecture:
Personality Engine: Used as a fingerprinting tools. It uses fingerprint databases by Nmap, for
TCP, UDP and Xprobe, for ICMP. Introduces changes to the headers of every outgoing packet
before sent to the network
Routing topology: It simulates virtual network topologies. Some honeypots are also configured
as routers. Latency and loss rate for each edge is configured .It is also used as a support network
tunneling and traffic redirection.
Configure: Each virtual honeypot is configured with a template. It uses commands like: Create,
Set ,Block, Reset, Open, Add, Proxy ,Bind.
5. IMPLEMENTATION
6
5.1 Deployment:
A honeypot does not need a certain surrounding environment as it is a standard server with no
special needs
If the main concern is the Internet, a honeypot can be placed at two locations:
• In front of the firewall (Internet)
• DMZ (De-Militarized Zone)
• Behind the firewall (intranet)
7
5.2 Block Diagram:
9
Advantages:
• Small data sets of high value
• New tools and tactics
• Minimal resources
• Encryption
• Information
• Simplicity
Disadvantages:
• Narrow Field of View
• Risk
• Expensive
• Difficult to maintain
Legal issues:
• Liability
• Privacy
• Entrapment
Applications:
• Network Decoys
• Detecting and countering worms
• Spam prevention
8. CONCLUSION
10
Honeypots are positioned to become a key tool to defend the corporate enterprise from hacker attacks
it’s a way to spy on your enemy; it might even be a form of camouflage. Hackers could be fooled into
thinking they've accessed a corporate network, when actually they're just banging around in a
honeypot -- while the real network remains safe and sound.
Honeypots have gained a significant place in the overall intrusion protection strategy of the enterprise.
Security experts do not recommend that these systems replace existing intrusion detection security
technologies; they see honeypots as complementary technology to network- and host-based intrusion
protection.
The advantages that honeypots bring to intrusion protection strategies are hard to ignore. In time, as
security managers understand the benefits, honeypots will become an essential ingredient in an
enterprise-level security operation.
We do believe that although honeypots have legal issues now, they do provide beneficial information
regarding the security of a network .It is important that new legal policies be formulated to foster and
support research in this area. This will help to solve the current challenges and make it possible to use
honeypots for the benefit of the broader internet community.
9. FUTURE HONEYPOTS
11
• Government projects
• Ease of use
• Closer integration
• Specific purpose
• More services such as ftp, messenger, p2p applications
• Allow administration of multiple servers via network
• Add the ability to answer as different ip addresses
• Emulate different kinds of web servers other than IIS
10. REFERENCES
12
1) Spitzner, Lance.“Honeypots Tracking Hackers”. Addison-Wesley: Boston,2002
2) Spitzner, Lance. ”The value of Honeypots, Part Two:Honeypot Solutions and legal Issues”
10Nov.2002
3) http://online.securityfocus.com/infocus/1498
4) Spitzner, Lance. “Know Your Enemy: Honeynets”. 18 Sep. 2002.
5) http://www.macom.com
6) http://www.enteract.com/honepot.html
7) http://project.honeypot.org/
13