SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Honeypots-the new era security tools
Gayatri Vidya Parishad College of Engineering
Ananth Kumar.G
(ananth_h16@yahoo.com)
Swetha.B
(swetha_ishita@yahoo.co.in)
Abstract:
The need to observe, analyze and understand
malicious behaviors is a well known requirement in
risk management, the protection of an environment
can't be done without the understanding of the risks
that weaken it. Security is to be provided to the
network or system to protect it form unauthorized
access to sensitive data. Security has several
different aspects: access, data, protocols,
information and transactions. All security systems
address two or more of these categories. Honeypots
are an exciting new technology with enormous
potential for the security community.
Honeypot can be defined as, an information
system resource whose value lies in unauthorized
or illicit use of that resource. A honeypot is a trap
set to detect, deflect or in some manner counteract
attempts at unauthorized use of information
systems. These are closely monitored network
decoys serving several purposes: they can distract
adversaries from valuable machines on a network,
they can provide early warning about new attack
and exploitation trends and they allow in-depth
examination of adversaries during and after
exploitation of a honeypot. A honeypot system is
designed to allure attackers. In general it consists of
a computer, data or a network site that appears to be
part of a network site that appears to be part of a
network but which is actually isolated and
protected, and which seems to contain information
or a resource that would be of value to attackers.
Honeypots can carry risks to network, and must be
handled carefully. If they are not properly walled
off, an attacker can use them to break into a system.
These are highly flexible security tools with
different applications for security. They have
multiple uses like prevention, detection and
information gathering. This paper analyzes the
importance of honeypots in providing security to a
network.
Introduction:
Honeypots all share the same concept: a security
resource that should not have any production or
authorized activity. In other words, deployment of
honeypots in a network should not affect critical
network services and applications. A honeypot is a
security resource whose value lies in being probed,
attacked, or compromised. . Theoretically, a
honeypot should see no traffic because it has no
legitimate activity. This means any interaction with
a honeypot is most likely unauthorized or malicious
activity. Any connection attempts to a honeypot are
most likely a probe, attack, or compromise. While
this concept sounds very simple, it is this very
simplicity that give honeypots their tremendous
advantages.
Types of Honeypots: Based on the level of
involvement, honeypots may be classified as:
1. Low-interaction Honeypots
2. High-interaction Honeypots
1
Honeypots come in many shapes and sizes, making
them difficult to get a grasp of. To help us better
understand honeypots and all the different types, we
break them down into two general categories, low-
interaction and high-interaction honeypots. These
categories help us understand what type of
honeypot you are dealing with, its strengths, and
weaknesses. Interaction defines the level of activity
a honeypot allows an attacker.
Low-interaction Honeypots
Low-interaction honeypots have limited interaction;
they normally work by emulating services and
operating systems. Attacker activity is limited to the
level of emulation by the honeypot. For example, an
emulated FTP service listening on port 21 may just
emulate a FTP login, or it may support a variety of
additional FTP commands. The advantages of a
low-interaction honeypot are their simplicity. These
honeypots tend to be easier to deploy and maintain,
with minimal risk.
Usually they involve installing software, selecting
the operating systems and services you want to
emulate and monitor, and letting the honeypot go
from there. This plug and play approach makes
deploying them very easy for most organizations.
Also, the emulated services mitigate risk by
containing the attacker's activity, the attacker never
has access to an operating system to attack or harm
others. The main disadvantages with low interaction
honeypots is that they log only limited information
and are designed to capture known activity. The
emulated services can only do so much. Also, its
easier for an attacker to detect a low-interaction
honeypot, no matter how good the emulation is,
skilled attacker can eventually detect their presence.
Examples of low-interaction honeypots include
Specter, Honeyd, and KFSensor.
Honeyd, a Low-interaction honeypot
Honeyd is a low-interaction honeypot. Developed
by Niels Provos, Honeyd is Open Source and
designed to run primarily on UNIX systems (though
it has been ported to Windows). Honeyd works on
the concept of monitoring unused IP space.
Anytime it sees a connection attempt to an unused
IP, it intercepts the connection and then interacts
with the attacker, pretending to be the victim. By
default, Honeyd detects and logs any connection to
any UDP or TCP port. In addition, you can
configure emulated services to monitor specific
ports, such as an emulated FTP server monitoring
TCP port 21. When an attacker connects to the
emulated service, not only does the honeypot detect
and log the activity, but it captures all of the
attacker's interaction with the emulated service. In
the case of the emulated FTP server, we can
potentially capture the attacker's login and
password, the commands they issue, and perhaps
even learn what they are looking for or their
identity. It all depends on the level of emulation by
the honeypot. Most emulated services work the
same way. They expect a specific type of behavior,
and then are programmed to react in a
predetermined way. If attack A does this, then react
this way. If attack B does this, then respond this
way. The limitation is if the attacker does
something that the emulation does not expect, then
it does not know how to respond. Most low-
interaction honeypots, including Honeyd, simply
generate an error message. You can see what
commands the emulated FTP server for Honeyd
supports by review the source code.
Some honeypots, such as Honeyd, can not only
emulate services, but emulate actual operating
systems. In other words, Honeyd can appear to the
attacker to be a Cisco router, WinXP web server, or
Linux DNS server. There are several advantages to
emulating different operating systems. First, the
honeypot can better blend in with existing networks
if the honeypot has the same appearance and
behavior of production systems. Second, you can
target specific attackers by providing systems and
services they often target, or systems and services
you want to learn about. There are two elements to
emulating operating systems. The first is with the
emulated services. When an attacker connects to an
emulated service, you can have that service behave
2
like and appear to be a specific OS. For example, if
you have a service emulating a web server, and you
want your honeypot to appear to be a Win2000
server, then you would emulate the behavior of a
IIS web server. For Linux, you would emulate the
behavior of an Apache web server. Most honeypots
emulate OS' in this manner. Some sophisticated
honeypots take this emulation one step farther (as
Honeyd does). Not only do they emulate at the
service level, but at the IP stack level. If someone
uses active fingerprinting measures to determine the
OS type of your honeypot most honeypots respond
with the IP stack of whatever OS the honeypot is
installed on. Honeyd spoof the replies, making not
only the emulated services, but emulated IP stacks
behave as the operating systems would. The level of
emulation and sophistication depends on what
honeypot technology you chose to use.
High-interaction honeypot
High-interaction honeypots are different; they are
usually complex solutions as they involve real
operating systems and applications. Nothing is
emulated, we give attackers the real thing. If you
want a Linux honeypot running an FTP server, you
build a real Linux system running a real FTP server.
The advantages with such a solution are two fold.
First, you can capture extensive amounts of
information. By giving attackers real systems to
interact with, you can learn the full extent of their
behavior, everything from new root kits to
international IRC sessions. The second advantage is
high-interaction honeypots make no assumptions on
how an attacker will behave. Instead, they provide
an open environment that captures all activity. This
allows high-interaction solutions to learn behavior
we would not expect. An excellent example of this
is how a Honeynet captured encoded back door
commands on a non-standard IP protocol. However,
this also increases the risk of the prevention
technologies. This gives the attacker the flexibility
to interact with the honeypot as attackers can use
this real operating system to attack non-honeypot
systems. As result, additional technologies have to
be implement that prevent the attacker from
harming other non-honeypot systems. In general,
high-interaction honeypots can do everything low-
interaction honeypots can do and much more.
However, they can be more complex to deploy and
maintain. Examples of high-interaction honeypots
include Symantec Decoy Server and Honeynets.
Honeynets, a High-interaction honeypot
Honeynets are a prime example of high-interaction
honeypot. Honeynets are not a product, they are not
a software solution that you install on a computer.
Instead, Honeyents are an architecture, an entire
network of computers designed to attacked. The
idea is to have an architecture that creates a highly
controlled network, one where all activity is
controlled and captured. Within this network we
place our intended victims, real computers running
real applications. The bad guys find, attack, and
break into these systems on their own initiative.
When they do, they do not realize they are within a
Honeynet. All of their activity, from encrypted SSH
sessions to emails and files uploads, are captured
without them knowing it. This is done by inserting
kernel modules on the victim systems that capture
all of the attacker's actions. At the same time, the
Honeynet controls the attacker's activity. Honeynets
do this using a Honeywall gateway. This gateway
allows inbound traffic to the victim systems, but
controls the outbound traffic using intrusion victim
systems, but prevents the attacker from harming
other non-Honeynet computers.
Architecture of Honeypots
3
Honeypots can be classified based on
their deployment and based on their
level of involvement. Based on the
deployment, honeypots may be
classified as:
1. Production Honeypots
2. Research Honeypots
Production honeypots are easy to use,
capture only limited information, and are
used primarily by companies or
corporations; Production honeypots are
placed inside the production network
with other production servers by
organization to improve their overall
state of security. Normally, production
honeypots are low-interaction honeypots
which are easier to deploy. They give
less information about the attacks or
attackers than research honeypots do.
The purpose of a production honeypot is
to help mitigate risk in an organization.
The honeypot adds value to the security
measures of an organization.
Research honeypots are run by a
volunteer, non-profit research
4
Low-interaction
Solution emulates operating
systems and services.
High-interaction
No emulation, real
operating systems
and services are
provided.
• Easy to install and
deploy. Usually
requires simply
installing and
configuring
software on a
computer.
• Minimal risk, as the
emulated services
control what
attackers can and
cannot do.
• Captures limited
amounts of
information, mainly
transactional data
and some limited
interaction.
• Can capture
far more
information,
including new
tools,
communicatio
ns, or attacker
keystrokes.
• Can be
complex to
install or
deploy
(commercial
versions tend
to be much
simpler).
• Increased
risk, as
attackers are
provided real
operating
systems to
interact with
organization or an educational institution
to gather information about the motives
and tactics of the Blackhat community
targeting different networks. These
honeypots do not add direct value to a
specific organization. Instead they are
used to research the threats organizations
face, and to learn how to better protect
against those threats. Think of them as
'counter-intelligence': their job is to gain
information on the attackers. This
information is then used to protect
against those threats. Research
honeypots are complex to deploy and
maintain, capture extensive information,
and are used primarily by research,
military, or government organizations.
Value of Honeypots
Honeypots can help prevent attacks in
several ways. The first is against
automated attacks, such as worms or
auto-rooters. These attacks are based on
tools that randomly scan entire networks
looking for vulnerable systems. If
vulnerable systems are found, these
automated tools will then attack and take
over the system (with worms self-
replicating, copying themselves to the
victim). One way that honeypots can
help defend against such attacks is
slowing their scanning down, potentially
even stopping them. Called sticky
honeypots, these solutions monitor
unused IP space. When probed by such
scanning activity, these honeypots
interact with and slow the attacker down.
They do this using a variety of TCP
tricks, such as a Windows size of zero,
putting the attacker into a holding
pattern. This is excellent for slowing
down or preventing the spread of a
worm that has penetrated your internal
organization. One such example of a
sticky honeypot is LaBrea Tarpit. Sticky
honeypots are most often low-interaction
solutions (you can almost call them 'no-
interaction solutions', as they slow the
attacker down to a crawl :). Honeypots
can also protect your organization from
human attackers. The concept is
deception or deterrence. The idea is to
confuse an attacker, to make him waste
his time and resources interacting with
honeypots. Meanwhile, your
organization has detected the attacker’s
activity and has the time to respond and
stop the attacker. This can be even taken
one step farther. If an attacker knows
your organization is using honeypots,
but does not know which systems are
honeypots and which systems are
legitimate computers, they may be
concerned about being caught by
honeypots and decided not to attack your
organizations. Thus the honeypot deters
the attacker. An example of a honeypot
designed to do this is Deception Toolkit,
a low-interaction honeypot.
The second way honeypots can help
protect an organization is through
detection. Detection is critical, its
purpose is to identify a failure or
breakdown in prevention. Regardless of
how secure an organization is, there will
always be failures, if for no other
reasons then humans are involved in the
process. By detecting an attacker, you
can quickly react to them, stopping or
mitigating the damage they do.
Traditionally, detection has proven
extremely difficult to do. Technologies
such as IDS sensors and systems logs
haven proven ineffective for several
reasons. They generate far too much
data, large percentage of false positives,
inability to detect new attacks, and the
inability to work in encrypted or IPv6
5
environments. Honeypots excel at
detection, addressing many of these
problems of traditional detection.
Honeypots reduce false positives by
capturing small data sets of high value,
capture unknown attacks such as new
exploits or polymorphic shell code, and
work in encrypted and IPv6
environments. In general, low-
interaction honeypots make the best
solutions for detection. They are easier
to deploy and maintain then high-
interaction honeypots and have reduced
risk.
The third and final way a honeypot can
help protect an organization is in
reponse. Once an organization has
detected a failure, how do they respond?
This can often be one of the greatest
challenges an organization faces. There
is often little information on who the
attacker is, how they got in, or how
much damage they have done. In these
situations detailed information on the
attacker's activity are critical. There are
two problems compounding incidence
response. First, often the very systems
compromised cannot be taken offline to
analyze. Production systems, such as an
organization's mail server, are so critical
that even though its been hacked,
security professionals may not be able to
take the system down and do a proper
forensic analysis. Instead, they are
limited to analyze the live system while
still providing production services. This
cripples the ability to analyze what
happened, how much damage the
attacker has done, and even if the
attacker has broken into other systems.
The other problem is even if the system
is pulled offline, there is so much data
pollution it can be very difficult to
determine what the bad guy did. By data
pollution, I mean there has been so much
activity (user's logging in, mail accounts
read, files written to databases, etc) it
can be difficult to determine what is
normal day-to-day activity, and what is
the attacker. Honeypots can help address
both problems. Honeypots make an
excellent incident response tool, as they
can quickly and easily be taken offline
for a full forensic analysis, without
impacting day-to-day business
operations. Also, the only activity a
honeypot captures is unauthorized or
malicious activity. This makes hacked
honeypots much easier to analyze then
hacked production systems, as any data
you retrieve from a honeypot is most
likely related to the attacker. The value
honeypots provide here is quickly giving
organizations the in-depth information
they need to rapidly and effectively
respond to an incident. In general, high-
interaction honeypots make the best
solution for response. To respond to an
intruder, you need in-depth knowledge
on what they did, how they broke in, and
the tools they used. For that type of data
you most likely need the capabilities of a
high-interaction honeypot.
Honeypots are extremely powerful, not
only can they be used to protect your
organization, but they can be used to
gain extensive information on threats,
information few other technologies are
capable of gathering. One of the greatest
problems security professionals face is a
lack of information or intelligence on
cyber threats. For centuries military
organizations have depended on
information to better understand who
their enemy is and how to defend against
them. Research honeypots address this
by collecting information on threats.
This information can then be used for a
variety of purposes, including trend
analysis, identifying new tools or
6
methods, identifying attackers and their
communities, early warning and
prediction, or motivations. One of the
most well known examples of using
honeypots for research is the work done
by the Honeynet Project, an all
volunteer, non-profit security research
organization. All of the data they collect
is with Honeynet distributed around the
world. As threats are constantly
changing, this information is proving
more and more critical.
Advantages
Honeypots are a tremendously simply
concept, which gives them some very
powerful strengths.
• Small data sets of high value:
Honeypots collect small amounts
of information. Instead of
logging a one GB of data a day,
they can log only one MB of data
a day. Instead of generating
10,000 alerts a day, they can
generate only 10 alerts a day.
Remember, honeypots only
capture bad activity, any
interaction with a honeypot is
most likely unauthorized or
malicious activity. As such,
honeypots reduce 'noise' by
collecting only small data sets,
but information of high value, as
it is only the bad guys. This
means its much easier (and
cheaper) to analyze the data a
honeypot collects and derive
value from it.
• New tools and tactics:
Honeypots are designed to
capture anything thrown at them,
including tools or tactics never
seen before.
• Minimal resources: Honeypots
require minimal resources, they
only capture bad activity. This
means an old Pentium computer
with 128MB of RAM can easily
handle an entire class B network
sitting off an OC-12 network.
• Encryption or IPv6: Unlike most
security technologies (such as
IDS systems) honeypots work
fine in encrypted or IPv6
environments. It does not matter
what the bad guys throw at a
honeypot, the honeypot will
detect and capture it.
• Information: Honeypots can
collect in-depth information that
few, if any other technologies
can match.
• Simplicity: Finally, honeypots
are conceptually very simple.
There are no fancy algorithms to
develop, state tables to maintain,
or signatures to update. The
simpler a technology, the less
likely there will be mistakes or
misconfigurations.
Disadvantages:
Like any technology, honeypots also
have their weaknesses. It is because of
this they do not replace any current
technology, but work with existing
technologies.
• Limited view: Honeypots can
only track and capture activity
that directly interacts with them.
Honeypots will not capture
attacks against other systems,
7
unless the attacker or threat
interacts with the honeypots also.
• Risk: All security technologies
have risk. Firewalls have risk of
being penetrated, encryption has
the risk of being broken, IDS
sensors have the risk of failing to
detect attacks. Honeypots are no
different, they have risk also.
Specifically, honeypots have the
risk of being taken over by the
bad guy and being used to harm
other systems. Depending on the
type of honeypot, it can have no
more risk than an IDS sensor,
while some honeypots have a
great deal of risk.
Conclusion
Honeypots can be used for research,
gathering information on threats so we
can better understand and defend against
them. The modern rapid advancements
in computer networking, communication
and mobility increased the need of
reliable ways to verify the loopholes
within the system. Honeypots pave a
significant way towards production
purposes by preventing, detecting, or
responding to attacks.
References
[1] The Honeynet project,
http://www.honeynet.org
[2] Honeypots, by Lance Spitzner,
http://www.spitzner.net/honeypots.html
8

Weitere ähnliche Inhalte

Was ist angesagt?

An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotEditor Jacotech
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networksijsrd.com
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Final presentation of IT security project
Final presentation of IT security projectFinal presentation of IT security project
Final presentation of IT security projectArmandas Rokas
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)Netwax Lab
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAparna Bhadran
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)Netwax Lab
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 

Was ist angesagt? (18)

Ns unit 6,7,8
Ns unit 6,7,8Ns unit 6,7,8
Ns unit 6,7,8
 
Honeypot
HoneypotHoneypot
Honeypot
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using Honeypot
 
Cyber security
Cyber security Cyber security
Cyber security
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
 
Unit 1
Unit 1Unit 1
Unit 1
 
Unit 7
Unit 7Unit 7
Unit 7
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Unit 1
Unit 1Unit 1
Unit 1
 
Final presentation of IT security project
Final presentation of IT security projectFinal presentation of IT security project
Final presentation of IT security project
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
1776 1779
1776 17791776 1779
1776 1779
 
intruders types ,detection & prevention
intruders types ,detection & preventionintruders types ,detection & prevention
intruders types ,detection & prevention
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Honey pots
Honey potsHoney pots
Honey pots
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 

Andere mochten auch

Honey Potz - BSides SLC 2015
Honey Potz - BSides SLC 2015Honey Potz - BSides SLC 2015
Honey Potz - BSides SLC 2015Ethan Dodge
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Hackfest Communication
 
Computing (cloude & grid) & honey pots
Computing (cloude & grid) & honey potsComputing (cloude & grid) & honey pots
Computing (cloude & grid) & honey potsVarun Sharma
 
Honeypots - November 8th Misec presentation
Honeypots - November 8th Misec presentationHoneypots - November 8th Misec presentation
Honeypots - November 8th Misec presentationTazdrumm3r
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876Momita Sharma
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Eng. Mohammed Ahmed Siddiqui
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its typesVishal Tandel
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief OverviewSILPI ROSAN
 

Andere mochten auch (18)

Honey Potz - BSides SLC 2015
Honey Potz - BSides SLC 2015Honey Potz - BSides SLC 2015
Honey Potz - BSides SLC 2015
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
 
Computing (cloude & grid) & honey pots
Computing (cloude & grid) & honey potsComputing (cloude & grid) & honey pots
Computing (cloude & grid) & honey pots
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honeypots - November 8th Misec presentation
Honeypots - November 8th Misec presentationHoneypots - November 8th Misec presentation
Honeypots - November 8th Misec presentation
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Honeypot
HoneypotHoneypot
Honeypot
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honey pots
Honey potsHoney pots
Honey pots
 

Ähnlich wie Honeypots

Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on HoneypotAmit Poonia
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot frameworkUltraUploader
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applicationsijtsrd
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deceptionmilad saber
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Tiffany Sandoval
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on HoneypotsIRJET Journal
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...IJERA Editor
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)amar koppal
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareNatraj G
 

Ähnlich wie Honeypots (20)

Honeypots
HoneypotsHoneypots
Honeypots
 
Ananth3
Ananth3Ananth3
Ananth3
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Olll
OlllOlll
Olll
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot framework
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Ananth1
Ananth1Ananth1
Ananth1
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 

Mehr von Shiva Krishna Chandra Shekar (20)

Airtel final
Airtel finalAirtel final
Airtel final
 
Airtel COMPNAY
Airtel COMPNAYAirtel COMPNAY
Airtel COMPNAY
 
Microsoft data access components
Microsoft data access componentsMicrosoft data access components
Microsoft data access components
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
Ldap
LdapLdap
Ldap
 
L2tp1
L2tp1L2tp1
L2tp1
 
Ivrs
IvrsIvrs
Ivrs
 
Ip sec
Ip secIp sec
Ip sec
 
I pod
I podI pod
I pod
 
Internet
InternetInternet
Internet
 
Image compression
Image compressionImage compression
Image compression
 
Hyper thread technology
Hyper thread technologyHyper thread technology
Hyper thread technology
 
Raju html
Raju htmlRaju html
Raju html
 
Raju
RajuRaju
Raju
 
Dba
DbaDba
Dba
 
Di splay systems
Di splay systemsDi splay systems
Di splay systems
 
Ppt
PptPpt
Ppt
 
Virtual instrumentation
Virtual instrumentationVirtual instrumentation
Virtual instrumentation
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Honeypots

  • 1. Honeypots-the new era security tools Gayatri Vidya Parishad College of Engineering Ananth Kumar.G (ananth_h16@yahoo.com) Swetha.B (swetha_ishita@yahoo.co.in) Abstract: The need to observe, analyze and understand malicious behaviors is a well known requirement in risk management, the protection of an environment can't be done without the understanding of the risks that weaken it. Security is to be provided to the network or system to protect it form unauthorized access to sensitive data. Security has several different aspects: access, data, protocols, information and transactions. All security systems address two or more of these categories. Honeypots are an exciting new technology with enormous potential for the security community. Honeypot can be defined as, an information system resource whose value lies in unauthorized or illicit use of that resource. A honeypot is a trap set to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. These are closely monitored network decoys serving several purposes: they can distract adversaries from valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. A honeypot system is designed to allure attackers. In general it consists of a computer, data or a network site that appears to be part of a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information or a resource that would be of value to attackers. Honeypots can carry risks to network, and must be handled carefully. If they are not properly walled off, an attacker can use them to break into a system. These are highly flexible security tools with different applications for security. They have multiple uses like prevention, detection and information gathering. This paper analyzes the importance of honeypots in providing security to a network. Introduction: Honeypots all share the same concept: a security resource that should not have any production or authorized activity. In other words, deployment of honeypots in a network should not affect critical network services and applications. A honeypot is a security resource whose value lies in being probed, attacked, or compromised. . Theoretically, a honeypot should see no traffic because it has no legitimate activity. This means any interaction with a honeypot is most likely unauthorized or malicious activity. Any connection attempts to a honeypot are most likely a probe, attack, or compromise. While this concept sounds very simple, it is this very simplicity that give honeypots their tremendous advantages. Types of Honeypots: Based on the level of involvement, honeypots may be classified as: 1. Low-interaction Honeypots 2. High-interaction Honeypots 1
  • 2. Honeypots come in many shapes and sizes, making them difficult to get a grasp of. To help us better understand honeypots and all the different types, we break them down into two general categories, low- interaction and high-interaction honeypots. These categories help us understand what type of honeypot you are dealing with, its strengths, and weaknesses. Interaction defines the level of activity a honeypot allows an attacker. Low-interaction Honeypots Low-interaction honeypots have limited interaction; they normally work by emulating services and operating systems. Attacker activity is limited to the level of emulation by the honeypot. For example, an emulated FTP service listening on port 21 may just emulate a FTP login, or it may support a variety of additional FTP commands. The advantages of a low-interaction honeypot are their simplicity. These honeypots tend to be easier to deploy and maintain, with minimal risk. Usually they involve installing software, selecting the operating systems and services you want to emulate and monitor, and letting the honeypot go from there. This plug and play approach makes deploying them very easy for most organizations. Also, the emulated services mitigate risk by containing the attacker's activity, the attacker never has access to an operating system to attack or harm others. The main disadvantages with low interaction honeypots is that they log only limited information and are designed to capture known activity. The emulated services can only do so much. Also, its easier for an attacker to detect a low-interaction honeypot, no matter how good the emulation is, skilled attacker can eventually detect their presence. Examples of low-interaction honeypots include Specter, Honeyd, and KFSensor. Honeyd, a Low-interaction honeypot Honeyd is a low-interaction honeypot. Developed by Niels Provos, Honeyd is Open Source and designed to run primarily on UNIX systems (though it has been ported to Windows). Honeyd works on the concept of monitoring unused IP space. Anytime it sees a connection attempt to an unused IP, it intercepts the connection and then interacts with the attacker, pretending to be the victim. By default, Honeyd detects and logs any connection to any UDP or TCP port. In addition, you can configure emulated services to monitor specific ports, such as an emulated FTP server monitoring TCP port 21. When an attacker connects to the emulated service, not only does the honeypot detect and log the activity, but it captures all of the attacker's interaction with the emulated service. In the case of the emulated FTP server, we can potentially capture the attacker's login and password, the commands they issue, and perhaps even learn what they are looking for or their identity. It all depends on the level of emulation by the honeypot. Most emulated services work the same way. They expect a specific type of behavior, and then are programmed to react in a predetermined way. If attack A does this, then react this way. If attack B does this, then respond this way. The limitation is if the attacker does something that the emulation does not expect, then it does not know how to respond. Most low- interaction honeypots, including Honeyd, simply generate an error message. You can see what commands the emulated FTP server for Honeyd supports by review the source code. Some honeypots, such as Honeyd, can not only emulate services, but emulate actual operating systems. In other words, Honeyd can appear to the attacker to be a Cisco router, WinXP web server, or Linux DNS server. There are several advantages to emulating different operating systems. First, the honeypot can better blend in with existing networks if the honeypot has the same appearance and behavior of production systems. Second, you can target specific attackers by providing systems and services they often target, or systems and services you want to learn about. There are two elements to emulating operating systems. The first is with the emulated services. When an attacker connects to an emulated service, you can have that service behave 2
  • 3. like and appear to be a specific OS. For example, if you have a service emulating a web server, and you want your honeypot to appear to be a Win2000 server, then you would emulate the behavior of a IIS web server. For Linux, you would emulate the behavior of an Apache web server. Most honeypots emulate OS' in this manner. Some sophisticated honeypots take this emulation one step farther (as Honeyd does). Not only do they emulate at the service level, but at the IP stack level. If someone uses active fingerprinting measures to determine the OS type of your honeypot most honeypots respond with the IP stack of whatever OS the honeypot is installed on. Honeyd spoof the replies, making not only the emulated services, but emulated IP stacks behave as the operating systems would. The level of emulation and sophistication depends on what honeypot technology you chose to use. High-interaction honeypot High-interaction honeypots are different; they are usually complex solutions as they involve real operating systems and applications. Nothing is emulated, we give attackers the real thing. If you want a Linux honeypot running an FTP server, you build a real Linux system running a real FTP server. The advantages with such a solution are two fold. First, you can capture extensive amounts of information. By giving attackers real systems to interact with, you can learn the full extent of their behavior, everything from new root kits to international IRC sessions. The second advantage is high-interaction honeypots make no assumptions on how an attacker will behave. Instead, they provide an open environment that captures all activity. This allows high-interaction solutions to learn behavior we would not expect. An excellent example of this is how a Honeynet captured encoded back door commands on a non-standard IP protocol. However, this also increases the risk of the prevention technologies. This gives the attacker the flexibility to interact with the honeypot as attackers can use this real operating system to attack non-honeypot systems. As result, additional technologies have to be implement that prevent the attacker from harming other non-honeypot systems. In general, high-interaction honeypots can do everything low- interaction honeypots can do and much more. However, they can be more complex to deploy and maintain. Examples of high-interaction honeypots include Symantec Decoy Server and Honeynets. Honeynets, a High-interaction honeypot Honeynets are a prime example of high-interaction honeypot. Honeynets are not a product, they are not a software solution that you install on a computer. Instead, Honeyents are an architecture, an entire network of computers designed to attacked. The idea is to have an architecture that creates a highly controlled network, one where all activity is controlled and captured. Within this network we place our intended victims, real computers running real applications. The bad guys find, attack, and break into these systems on their own initiative. When they do, they do not realize they are within a Honeynet. All of their activity, from encrypted SSH sessions to emails and files uploads, are captured without them knowing it. This is done by inserting kernel modules on the victim systems that capture all of the attacker's actions. At the same time, the Honeynet controls the attacker's activity. Honeynets do this using a Honeywall gateway. This gateway allows inbound traffic to the victim systems, but controls the outbound traffic using intrusion victim systems, but prevents the attacker from harming other non-Honeynet computers. Architecture of Honeypots 3
  • 4. Honeypots can be classified based on their deployment and based on their level of involvement. Based on the deployment, honeypots may be classified as: 1. Production Honeypots 2. Research Honeypots Production honeypots are easy to use, capture only limited information, and are used primarily by companies or corporations; Production honeypots are placed inside the production network with other production servers by organization to improve their overall state of security. Normally, production honeypots are low-interaction honeypots which are easier to deploy. They give less information about the attacks or attackers than research honeypots do. The purpose of a production honeypot is to help mitigate risk in an organization. The honeypot adds value to the security measures of an organization. Research honeypots are run by a volunteer, non-profit research 4 Low-interaction Solution emulates operating systems and services. High-interaction No emulation, real operating systems and services are provided. • Easy to install and deploy. Usually requires simply installing and configuring software on a computer. • Minimal risk, as the emulated services control what attackers can and cannot do. • Captures limited amounts of information, mainly transactional data and some limited interaction. • Can capture far more information, including new tools, communicatio ns, or attacker keystrokes. • Can be complex to install or deploy (commercial versions tend to be much simpler). • Increased risk, as attackers are provided real operating systems to interact with
  • 5. organization or an educational institution to gather information about the motives and tactics of the Blackhat community targeting different networks. These honeypots do not add direct value to a specific organization. Instead they are used to research the threats organizations face, and to learn how to better protect against those threats. Think of them as 'counter-intelligence': their job is to gain information on the attackers. This information is then used to protect against those threats. Research honeypots are complex to deploy and maintain, capture extensive information, and are used primarily by research, military, or government organizations. Value of Honeypots Honeypots can help prevent attacks in several ways. The first is against automated attacks, such as worms or auto-rooters. These attacks are based on tools that randomly scan entire networks looking for vulnerable systems. If vulnerable systems are found, these automated tools will then attack and take over the system (with worms self- replicating, copying themselves to the victim). One way that honeypots can help defend against such attacks is slowing their scanning down, potentially even stopping them. Called sticky honeypots, these solutions monitor unused IP space. When probed by such scanning activity, these honeypots interact with and slow the attacker down. They do this using a variety of TCP tricks, such as a Windows size of zero, putting the attacker into a holding pattern. This is excellent for slowing down or preventing the spread of a worm that has penetrated your internal organization. One such example of a sticky honeypot is LaBrea Tarpit. Sticky honeypots are most often low-interaction solutions (you can almost call them 'no- interaction solutions', as they slow the attacker down to a crawl :). Honeypots can also protect your organization from human attackers. The concept is deception or deterrence. The idea is to confuse an attacker, to make him waste his time and resources interacting with honeypots. Meanwhile, your organization has detected the attacker’s activity and has the time to respond and stop the attacker. This can be even taken one step farther. If an attacker knows your organization is using honeypots, but does not know which systems are honeypots and which systems are legitimate computers, they may be concerned about being caught by honeypots and decided not to attack your organizations. Thus the honeypot deters the attacker. An example of a honeypot designed to do this is Deception Toolkit, a low-interaction honeypot. The second way honeypots can help protect an organization is through detection. Detection is critical, its purpose is to identify a failure or breakdown in prevention. Regardless of how secure an organization is, there will always be failures, if for no other reasons then humans are involved in the process. By detecting an attacker, you can quickly react to them, stopping or mitigating the damage they do. Traditionally, detection has proven extremely difficult to do. Technologies such as IDS sensors and systems logs haven proven ineffective for several reasons. They generate far too much data, large percentage of false positives, inability to detect new attacks, and the inability to work in encrypted or IPv6 5
  • 6. environments. Honeypots excel at detection, addressing many of these problems of traditional detection. Honeypots reduce false positives by capturing small data sets of high value, capture unknown attacks such as new exploits or polymorphic shell code, and work in encrypted and IPv6 environments. In general, low- interaction honeypots make the best solutions for detection. They are easier to deploy and maintain then high- interaction honeypots and have reduced risk. The third and final way a honeypot can help protect an organization is in reponse. Once an organization has detected a failure, how do they respond? This can often be one of the greatest challenges an organization faces. There is often little information on who the attacker is, how they got in, or how much damage they have done. In these situations detailed information on the attacker's activity are critical. There are two problems compounding incidence response. First, often the very systems compromised cannot be taken offline to analyze. Production systems, such as an organization's mail server, are so critical that even though its been hacked, security professionals may not be able to take the system down and do a proper forensic analysis. Instead, they are limited to analyze the live system while still providing production services. This cripples the ability to analyze what happened, how much damage the attacker has done, and even if the attacker has broken into other systems. The other problem is even if the system is pulled offline, there is so much data pollution it can be very difficult to determine what the bad guy did. By data pollution, I mean there has been so much activity (user's logging in, mail accounts read, files written to databases, etc) it can be difficult to determine what is normal day-to-day activity, and what is the attacker. Honeypots can help address both problems. Honeypots make an excellent incident response tool, as they can quickly and easily be taken offline for a full forensic analysis, without impacting day-to-day business operations. Also, the only activity a honeypot captures is unauthorized or malicious activity. This makes hacked honeypots much easier to analyze then hacked production systems, as any data you retrieve from a honeypot is most likely related to the attacker. The value honeypots provide here is quickly giving organizations the in-depth information they need to rapidly and effectively respond to an incident. In general, high- interaction honeypots make the best solution for response. To respond to an intruder, you need in-depth knowledge on what they did, how they broke in, and the tools they used. For that type of data you most likely need the capabilities of a high-interaction honeypot. Honeypots are extremely powerful, not only can they be used to protect your organization, but they can be used to gain extensive information on threats, information few other technologies are capable of gathering. One of the greatest problems security professionals face is a lack of information or intelligence on cyber threats. For centuries military organizations have depended on information to better understand who their enemy is and how to defend against them. Research honeypots address this by collecting information on threats. This information can then be used for a variety of purposes, including trend analysis, identifying new tools or 6
  • 7. methods, identifying attackers and their communities, early warning and prediction, or motivations. One of the most well known examples of using honeypots for research is the work done by the Honeynet Project, an all volunteer, non-profit security research organization. All of the data they collect is with Honeynet distributed around the world. As threats are constantly changing, this information is proving more and more critical. Advantages Honeypots are a tremendously simply concept, which gives them some very powerful strengths. • Small data sets of high value: Honeypots collect small amounts of information. Instead of logging a one GB of data a day, they can log only one MB of data a day. Instead of generating 10,000 alerts a day, they can generate only 10 alerts a day. Remember, honeypots only capture bad activity, any interaction with a honeypot is most likely unauthorized or malicious activity. As such, honeypots reduce 'noise' by collecting only small data sets, but information of high value, as it is only the bad guys. This means its much easier (and cheaper) to analyze the data a honeypot collects and derive value from it. • New tools and tactics: Honeypots are designed to capture anything thrown at them, including tools or tactics never seen before. • Minimal resources: Honeypots require minimal resources, they only capture bad activity. This means an old Pentium computer with 128MB of RAM can easily handle an entire class B network sitting off an OC-12 network. • Encryption or IPv6: Unlike most security technologies (such as IDS systems) honeypots work fine in encrypted or IPv6 environments. It does not matter what the bad guys throw at a honeypot, the honeypot will detect and capture it. • Information: Honeypots can collect in-depth information that few, if any other technologies can match. • Simplicity: Finally, honeypots are conceptually very simple. There are no fancy algorithms to develop, state tables to maintain, or signatures to update. The simpler a technology, the less likely there will be mistakes or misconfigurations. Disadvantages: Like any technology, honeypots also have their weaknesses. It is because of this they do not replace any current technology, but work with existing technologies. • Limited view: Honeypots can only track and capture activity that directly interacts with them. Honeypots will not capture attacks against other systems, 7
  • 8. unless the attacker or threat interacts with the honeypots also. • Risk: All security technologies have risk. Firewalls have risk of being penetrated, encryption has the risk of being broken, IDS sensors have the risk of failing to detect attacks. Honeypots are no different, they have risk also. Specifically, honeypots have the risk of being taken over by the bad guy and being used to harm other systems. Depending on the type of honeypot, it can have no more risk than an IDS sensor, while some honeypots have a great deal of risk. Conclusion Honeypots can be used for research, gathering information on threats so we can better understand and defend against them. The modern rapid advancements in computer networking, communication and mobility increased the need of reliable ways to verify the loopholes within the system. Honeypots pave a significant way towards production purposes by preventing, detecting, or responding to attacks. References [1] The Honeynet project, http://www.honeynet.org [2] Honeypots, by Lance Spitzner, http://www.spitzner.net/honeypots.html 8