SlideShare a Scribd company logo
BSA2016 - Honeypots for Network Security Monitoring
Chris Sanders (@chrissanders88)
 Find Evil @ FireEye
 Founder @ Rural Tech
Fund
 PhD Researcher
 GSE # 64
 BBQ Pit Master
 Author:
 Practical Packet Analysis
 Applied NSM
Agenda
 Security Economics
 Traditional Honeypots
 NSM Honeypots
 Honeypot Applications
“Why honeypots are a cost effective strategy for
enhancing your network security monitoring
strategy.”
BSA2016 - Honeypots for Network Security Monitoring
Economics of Security
“If you want to understand the world of nature,
master physics. If you want to understand the
world of man, master economics.” - Taufiq
Rashid
High
Demand for
Security
Expertise
Low Supply
of Security
Practitioners
Expertise
Services
Software
BSA2016 - Honeypots for Network Security Monitoring
Cost Effective NSM
C
O
S
T
EFFECTIVENESS
Analytics/ML
Antivirus
NGFW
SIEM
Endpoint
IDS/IPS
Honeypot
s
Where do most security solutions rank in
terms of cost effectiveness?
BSA2016 - Honeypots for Network Security Monitoring
Seminal Work
 Large Orgs and Defense
 Many Academic Papers
 The Honeynet Project
 Honeyd Software
Traditional Honeypots
 Designed to be
attacked
 Intentionally vulnerable
 Primarily used for
specific research
 Originally useful for
learning about
attackers
 Useful for tracking
scanning and
proliferation of worms
Honeypot Architecture
Hold Your Horses!
1. Honeypots take a
lot of time to
maintain.
2. Honeypots
introduce
tremendous risk.
3. Attackers can use
honeypots as a
foothold.
4. Honeypots are
only for the most
mature
BSA2016 - Honeypots for Network Security Monitoring
NSM Honeypots
 Premise:
 Nobody should ever talk
to a honeypot
 Attributes:
1. Placed inside the
network
2. Mimic existing systems
3. Low interaction
4. Extensive logging and
alerting
5. Goal oriented
BSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security Monitoring
Integrating NSM Honeypots
NSM
Strateg
y
Honeypot
s
Integrating NSM Honeypots
Honeypots
BSA2016 - Honeypots for Network Security Monitoring
Goal-Oriented Deception
Mimic Reality
Capture
Interaction
Generate an
Alert
Systems
UsersData
Protect the Systems
Mimic Reality
Capture
Interaction
Generate an
Alert
Protect: Windows Systems using RDP
1. Deploy an RDP Honeypot [Tom’s,
OpenCanary]
2. Capture any connection attempt
3. Generate an alert to your SIEM/SOC
Protect the Data
Mimic Reality
Capture
Interaction
Generate an
Alert
Protect: HR data in spreadsheets
1. Deploy a HoneyDoc
2. Embed web bug that phones home
3. Configure OS file access monitoring
4. Generate an alerts when doc phones home,
or when file is accessed.
Protect the Users
Mimic Reality
Capture
Interaction
Generate an
Alert
Protect: Service account credentials
1. Create limited access honeyusers [DCEPT]
2. Detect cleartext credentials in memory
3. Generate an alert to your SIEM/SOC
BSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security Monitoring
The Challenge
 Analysts…
 ...start looking for implementation opportunities.
 Managers…
 ...ensure this technique is part of your analysts
toolbelt.
 Vendors…
 ...develop affordable honeypot-based solutions.
 Open Source Contributors…
 ...drive innovation in this space.
Recommended Honeypot
Software
Honeypots
OpenCanary
Tom’s Honeypot
Cowrie (SSH)
RDPY (RDP)
CanaryTokens.org
Management
Ansible
Docker
Chef
Alerting
Snort
Suricata
Bro
SIEM
Other Honeypot Software
Conpot
Dioneae
Ensnare
ESPot
Gaspot
Glastopf
Gridpot
Honeyd
Honeyntp
HoneyPotter
HoneyPress
Honeyprint
HoneyPy
Kippo
Nodepot
NoSQLpot
Shadow Daemon
TelnetHoney
Thug
Wordpot
https://github.com/paralax/awesome-honeypots
BSA2016 - Honeypots for Network Security Monitoring

More Related Content

PPTX
2018 - Using Honeypots for Network Security Monitoring
PDF
Honeypots for Network Security
DOC
Honeypot seminar report
PPTX
Abstract Tools for Effective Threat Hunting
PPT
Honeypot honeynet
PPTX
Honeypots
PPTX
Honeypot
PPT
2018 - Using Honeypots for Network Security Monitoring
Honeypots for Network Security
Honeypot seminar report
Abstract Tools for Effective Threat Hunting
Honeypot honeynet
Honeypots
Honeypot

What's hot (20)

PPTX
Honeypots (Ravindra Singh Rathore)
PDF
Honeypots for Active Defense
PPTX
Art into Science 2017 - Investigation Theory: A Cognitive Approach
PDF
Virtual honeypot
PPT
All about Honeypots & Honeynets
PPTX
Honey pots
PPT
Honey Pot
PPTX
Honeypot based intrusion detection system PPT
PPTX
IDS+Honeypots Making Security Simple
PPTX
PPTX
PPTX
Honey pots
PPTX
Honeypots.ppt1800363876
PPTX
Honeypots
PPT
Lecture 7
PPTX
Honey po tppt
PPT
Honeypot-A Brief Overview
PPTX
HONEYPOTS: Definition, working, advantages, disadvantages
PDF
Threat Hunting
Honeypots (Ravindra Singh Rathore)
Honeypots for Active Defense
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Virtual honeypot
All about Honeypots & Honeynets
Honey pots
Honey Pot
Honeypot based intrusion detection system PPT
IDS+Honeypots Making Security Simple
Honey pots
Honeypots.ppt1800363876
Honeypots
Lecture 7
Honey po tppt
Honeypot-A Brief Overview
HONEYPOTS: Definition, working, advantages, disadvantages
Threat Hunting
Ad

Viewers also liked (19)

PPT
Using Canary Honeypots for Network Security Monitoring
PPT
Honeypots
PDF
Honeycon2016-honeypot updates for public
PPTX
Applied Detection and Analysis Using Flow Data - MIRCon 2014
PPTX
honey pots introduction and its types
PPTX
SOC2016 - The Investigation Labyrinth
PPTX
Honeypot ppt1
PPTX
Minding the Metacognitive Gap - BSides NOLA
PPT
Applied Detection and Analysis with Flow Data - SO Con 2014
PPT
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
PPT
Choice and Moral Design in Interactive Storytelling
PDF
[CLASS 2014] Palestra Técnica - Regis Carvalho
PPTX
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
PPTX
Modern Honey Network (MHN)
PDF
Honeypots
PDF
Honeypot 101 (slide share)
ODP
Honeypot Presentation - Using Honeyd
PPT
Honeypot Basics
PPTX
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Using Canary Honeypots for Network Security Monitoring
Honeypots
Honeycon2016-honeypot updates for public
Applied Detection and Analysis Using Flow Data - MIRCon 2014
honey pots introduction and its types
SOC2016 - The Investigation Labyrinth
Honeypot ppt1
Minding the Metacognitive Gap - BSides NOLA
Applied Detection and Analysis with Flow Data - SO Con 2014
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
Choice and Moral Design in Interactive Storytelling
[CLASS 2014] Palestra Técnica - Regis Carvalho
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Modern Honey Network (MHN)
Honeypots
Honeypot 101 (slide share)
Honeypot Presentation - Using Honeyd
Honeypot Basics
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Ad

Similar to BSA2016 - Honeypots for Network Security Monitoring (20)

PPTX
Honeypots for Cloud Providers - SDN World Congress
PDF
Honeypot- An Overview
PDF
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
PPT
honeypots.ppt
DOCX
CyberCore – Security Essentials_ Protecting Your Digital World.docx
PDF
Honeypot: A Security Tool in Intrusion Detection
PDF
Honeypot: A Security Tool in Intrusion Detection
PPTX
3 Tips to Stay Safe Online in 2017
PPTX
Security Analytics for Data Discovery - Closing the SIEM Gap
PDF
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
PDF
Peter Allor - The New Era of Cognitive Security
PDF
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PDF
Short Term Effects Of Cocaine Essay
PDF
Future Cybersecurity Trends: How Businesses Can Stay Ahead in 2025
PPTX
Honeypots
PDF
PaloAlto Enterprise Security Solution
PDF
Cyber Threat Hunting Workshop.pdf
PDF
Cyber Threat Hunting Workshop.pdf
PPTX
Advanced Threat Protection - Sandboxing 101
Honeypots for Cloud Providers - SDN World Congress
Honeypot- An Overview
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
honeypots.ppt
CyberCore – Security Essentials_ Protecting Your Digital World.docx
Honeypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion Detection
3 Tips to Stay Safe Online in 2017
Security Analytics for Data Discovery - Closing the SIEM Gap
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
Peter Allor - The New Era of Cognitive Security
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Short Term Effects Of Cocaine Essay
Future Cybersecurity Trends: How Businesses Can Stay Ahead in 2025
Honeypots
PaloAlto Enterprise Security Solution
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
Advanced Threat Protection - Sandboxing 101

Recently uploaded (20)

PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
August Patch Tuesday
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Hybrid model detection and classification of lung cancer
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Encapsulation theory and applications.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Heart disease approach using modified random forest and particle swarm optimi...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
MIND Revenue Release Quarter 2 2025 Press Release
August Patch Tuesday
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Programs and apps: productivity, graphics, security and other tools
cloud_computing_Infrastucture_as_cloud_p
Hybrid model detection and classification of lung cancer
A comparative analysis of optical character recognition models for extracting...
Hindi spoken digit analysis for native and non-native speakers
TLE Review Electricity (Electricity).pptx
Group 1 Presentation -Planning and Decision Making .pptx
Unlocking AI with Model Context Protocol (MCP)
Univ-Connecticut-ChatGPT-Presentaion.pdf
Encapsulation theory and applications.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A Presentation on Artificial Intelligence
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
NewMind AI Weekly Chronicles - August'25-Week II

BSA2016 - Honeypots for Network Security Monitoring

Editor's Notes

  • #6: Security is only affordable for: Military/Gov Financial Post-Breach Orgs Economics of security are heavily tilted towards the attacker. As long as this remains, we continue to lose and lose ground.
  • #7: This is why most new tech fails. We’ve had electric cars forever, they are just too expensive to operate, maintain, and charge. We can go to space, but not affordably, yet.
  • #9: TIME CHECK – 15 MINUTES
  • #14: TIME CHECK – 20 MINUTES
  • #16: If you get an alert from a honeypot, it’s worth investigating. If someone hits your sign, the honeypot, they might hit your bridge, the sensitive system.
  • #18: A great NSM strategy is like a great cheeseburger.
  • #20: TIME CHECK – 30 MINUTES
  • #22: Kippo, Tom’s Honeypot, Thinkst
  • #23: Canary docs, canary DB tables, hash changes
  • #24: Honey Accounts, Honey SIDs, social media profiles
  • #25: TIME CHECK – 45 MIN