SlideShare a Scribd company logo
Honeypots
Computer Network Security 2
Agenda
What are honeypots
What honeypots are not
Advantages and disadvantages
Comparison of products
Honeyd
Honeynets
Computer Network Security 3
Honeypots
“The secret to good defence is good offence”
Unlike firewalls or Intrusion Detection Systems,
honeypots do not solve a specific problem.
Instead, they are a highly flexible tool that comes in many
shapes and sizes. They can do everything from detecting
encrypted attacks in IPv6 networks to capturing the latest
in on-line credit card fraud.
Its is this flexibility that gives honeypots their true power.
“A security resource whose value lies in being probed,
attacked or compromised”
(Larry Spitzner)
They are a resource that has no authorized activity, they do
not have any production value.
Computer Network Security 4
Honeypots:
Theoreticlly, a honeypot should see no traffic
because it has no legitimate activity. This means
any interaction with a honeypot is most likely
unauthorized or malicious activity.
Any connection attempts to a honeypot are most
likely a probe, attack, or compromise.
A tool for:
Detecting attackers
Observing and monitoring attack methods
Potentially trapping a prospective attacker
Providing early warning of attacker
Can capture known as well as unknown attacks.
Computer Network Security 5
Honeypots: what they are not
A security fix
A barrier to attacks
A substitute for securing your host and
network
Computer Network Security 6
Advantages
Small data sets of high value:
Honeypots collect small amounts of information.
Instead of logging a one GB of data a day, they can log
only one MB of data a day. Instead of generating
10,000 alerts a day, they can generate only 10 alerts a
day.
As such, honeypots reduce 'noise' by collectin only
small data sets, but information of high value
Minimal resources:
Honeypots require minimal resources, they only
capture bad activity.
This means an old Pentium computer with 128MB of
RAM can easily handle an entire class B network
Computer Network Security 7
Advantages
Encryption or IPv6:
Unlike most security technologies (such as IDS
systems) honeypots work fine in encrypted or IPv6
environments.
It does not matter what the bad guys throw at a
Honeypot, the Honeypot will detect and capture it.
Simplicity:
Finally, honeypots are conceptually very simple.
There are no fancy algorithms to develop, state tables
to maintain, or signatures to update.
Computer Network Security 8
Disadvantages
Value if not attacked:
None
Limited view:
Honeypots can only track and capture activity
that directly interacts with them.
Honeypots will not capture attacks against
other systems
Fingerprinting:
an incorrectly implemented honeypot can
identify itself and others
Computer Network Security 9
Comparison of 6 honeypots
Computer Network Security 10
Honeyd
Open source
Runs on Unix
Low interaction
Emulated services to deceive attacker and
capture activity
Highly customizable (open source)
Detects activity on any TCP port
Can monitor millions of non-existent IP
addresses
Computer Network Security 11
Honeyd
Can simultaneously assume IP addresses of
thousands of victims and actively interact with
attackers (has been tested with 60,000)
Can emulate many different OSs at the same time
(Specter can emulate 13 different OSs, but only
one at a time)
Emulates not only OS but also the proper TCP/IP
stack unlike BOF and Specter
Computer Network Security 12
Honeyd Disadvantages
Only TCP services, not UDP
ICMP, echo request and response only
Honeynets
Computer Network Security 14
Honeynets
Honeynets are a prime example of high-interaction
honeypot
Honeynets are an architecture, an entire network of
Honeypots.
Due to the size of a production network and the
amount of traffic, extensive logging can not be
deployed
We can use honeynets instead
A network of actual systems running real operating
systems
Not a single product but composed of multiple
technologies and tools
Computer Network Security 15
Honeynets
Data control:
managing or tracking traffic to and from a honeynet. You
don’t want complaints about malicious activity from your
honeynet.
But we don’t want attackers to know that they are in a
controlled environment either
Techniques for data control:
• Connection control: limit the outbound connections
• Bandwidth control: set a limit on the bandwidth
Data capture:
logging of entire attacker activity
Computer Network Security 16
Honeynets
Data collection:
collecting data from multiple honeynets to a central
location
Honeynet architectures:
Gen I
Gen II
Computer Network Security 17
Gen I Honeynets
Simple architecture
Simple data capture and data control
techniques make it detectable by attackers
sometimes
Places a layer 3 firewall in front of the
honeynet for data control and capture.
Logs are available from multiple levels:
Firewall logs
IDS logs
System logs
Computer Network Security 18
Gen II Honeynets
Gateway is layer 2 device which makes it
harder to detect
Firewall works in bridge mode
Also has IPS capability
Sebek client/server tool which is a kernel
module for logging to a remote syslog
server using UDP and hides its activity
from the attacker
Also have data collection capability
Also provide alerts when an attack occurs

More Related Content

PPTX
Honeypot ss
PPT
Honeypots
PPT
Honeypot
PPTX
PPT
Honey pots
PPTX
Honeypot based intrusion detection system PPT
PPTX
Honey po tppt
PPTX
honey pots introduction and its types
Honeypot ss
Honeypots
Honeypot
Honey pots
Honeypot based intrusion detection system PPT
Honey po tppt
honey pots introduction and its types

What's hot (20)

PPT
All about Honeypots & Honeynets
PDF
Virtual honeypot
PPTX
Honeypots
PPTX
Honeypots and honeynets
PDF
Honeypots
PPTX
IDS+Honeypots Making Security Simple
ODP
Honeypot Presentation - Using Honeyd
PPTX
Honeypots (Ravindra Singh Rathore)
PPTX
Honeypots
PPT
Honeypot-A Brief Overview
PPT
PPT
Honey Pot
PPTX
HONEYPOTS: Definition, working, advantages, disadvantages
PPTX
PPTX
Honeypot
PDF
Honeypot 101 (slide share)
PPTX
Honeypots.ppt1800363876
PPT
Honeypot Project
PPTX
Honey pots
All about Honeypots & Honeynets
Virtual honeypot
Honeypots
Honeypots and honeynets
Honeypots
IDS+Honeypots Making Security Simple
Honeypot Presentation - Using Honeyd
Honeypots (Ravindra Singh Rathore)
Honeypots
Honeypot-A Brief Overview
Honey Pot
HONEYPOTS: Definition, working, advantages, disadvantages
Honeypot
Honeypot 101 (slide share)
Honeypots.ppt1800363876
Honeypot Project
Honey pots
Ad

Viewers also liked (17)

PDF
Honeypots
PPTX
Honeypots
PPTX
Honeypot
PPT
Honeypot honeynet
DOC
Honeypot seminar report
PPTX
Honeypot ppt1
PPTX
Interactive presentation screen format 16-9 - minimal for slideshare
PDF
CDE future sonar webinar
PPTX
GIS for Defence
PDF
Honeypot Social Profiling
PDF
Honeypots for Active Defense
PPT
Honeypots - Tracking the Blackhat Community
PPT
Honeypot Basics
PPT
Anton Chuvakin on Honeypots
PPTX
PPTX
Honey pots
Honeypots
Honeypots
Honeypot
Honeypot honeynet
Honeypot seminar report
Honeypot ppt1
Interactive presentation screen format 16-9 - minimal for slideshare
CDE future sonar webinar
GIS for Defence
Honeypot Social Profiling
Honeypots for Active Defense
Honeypots - Tracking the Blackhat Community
Honeypot Basics
Anton Chuvakin on Honeypots
Honey pots
Ad

Similar to Lecture 7 (20)

PDF
The use of honeynet to detect exploited systems (basic version)
DOCX
Honeypots
PDF
Paper id 312201513
DOC
Honeypot Essentials
PDF
Intrusion Detection System Project Report
PPT
Intrusiond and detection
PDF
A virtual honeypot framework
PPTX
Basic Dynamic Analysis of Malware
PPTX
honeypotss.pptx
PPTX
Honey pot in cloud computing
PDF
honeypots-140921060716-phpapp01 (1).pdf
PPTX
Honeypot2
PDF
IS - Firewall
PPTX
honeypots-1409210990716-phpapp01 (2).pptx
PPT
Lecture 5
PPTX
HoneyPots.pptx
PDF
Honeypots for Network Security
PDF
Detection &Amp; Prevention Systems
The use of honeynet to detect exploited systems (basic version)
Honeypots
Paper id 312201513
Honeypot Essentials
Intrusion Detection System Project Report
Intrusiond and detection
A virtual honeypot framework
Basic Dynamic Analysis of Malware
honeypotss.pptx
Honey pot in cloud computing
honeypots-140921060716-phpapp01 (1).pdf
Honeypot2
IS - Firewall
honeypots-1409210990716-phpapp01 (2).pptx
Lecture 5
HoneyPots.pptx
Honeypots for Network Security
Detection &Amp; Prevention Systems

More from Education (11)

PDF
A friendly introduction to differential equations
PDF
High-order Assembly Language/Shuttle (HAL/S)
PDF
assembly language programming and organization of IBM PC" by YTHA YU
PDF
Program security chapter 3
PDF
Network security chapter 1,2
PPT
Lecture 6
PPT
Lecture 4
PPT
Lecture 3
PPT
Lecture 2
PPT
Lecture 1
PDF
Data warehousing labs maunal
A friendly introduction to differential equations
High-order Assembly Language/Shuttle (HAL/S)
assembly language programming and organization of IBM PC" by YTHA YU
Program security chapter 3
Network security chapter 1,2
Lecture 6
Lecture 4
Lecture 3
Lecture 2
Lecture 1
Data warehousing labs maunal

Recently uploaded (20)

PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
DOCX
573137875-Attendance-Management-System-original
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Well-logging-methods_new................
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Sustainable Sites - Green Building Construction
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Internet of Things (IOT) - A guide to understanding
bas. eng. economics group 4 presentation 1.pptx
Foundation to blockchain - A guide to Blockchain Tech
Arduino robotics embedded978-1-4302-3184-4.pdf
Digital Logic Computer Design lecture notes
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
573137875-Attendance-Management-System-original
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Structs to JSON How Go Powers REST APIs.pdf
Well-logging-methods_new................
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Sustainable Sites - Green Building Construction

Lecture 7

  • 2. Computer Network Security 2 Agenda What are honeypots What honeypots are not Advantages and disadvantages Comparison of products Honeyd Honeynets
  • 3. Computer Network Security 3 Honeypots “The secret to good defence is good offence” Unlike firewalls or Intrusion Detection Systems, honeypots do not solve a specific problem. Instead, they are a highly flexible tool that comes in many shapes and sizes. They can do everything from detecting encrypted attacks in IPv6 networks to capturing the latest in on-line credit card fraud. Its is this flexibility that gives honeypots their true power. “A security resource whose value lies in being probed, attacked or compromised” (Larry Spitzner) They are a resource that has no authorized activity, they do not have any production value.
  • 4. Computer Network Security 4 Honeypots: Theoreticlly, a honeypot should see no traffic because it has no legitimate activity. This means any interaction with a honeypot is most likely unauthorized or malicious activity. Any connection attempts to a honeypot are most likely a probe, attack, or compromise. A tool for: Detecting attackers Observing and monitoring attack methods Potentially trapping a prospective attacker Providing early warning of attacker Can capture known as well as unknown attacks.
  • 5. Computer Network Security 5 Honeypots: what they are not A security fix A barrier to attacks A substitute for securing your host and network
  • 6. Computer Network Security 6 Advantages Small data sets of high value: Honeypots collect small amounts of information. Instead of logging a one GB of data a day, they can log only one MB of data a day. Instead of generating 10,000 alerts a day, they can generate only 10 alerts a day. As such, honeypots reduce 'noise' by collectin only small data sets, but information of high value Minimal resources: Honeypots require minimal resources, they only capture bad activity. This means an old Pentium computer with 128MB of RAM can easily handle an entire class B network
  • 7. Computer Network Security 7 Advantages Encryption or IPv6: Unlike most security technologies (such as IDS systems) honeypots work fine in encrypted or IPv6 environments. It does not matter what the bad guys throw at a Honeypot, the Honeypot will detect and capture it. Simplicity: Finally, honeypots are conceptually very simple. There are no fancy algorithms to develop, state tables to maintain, or signatures to update.
  • 8. Computer Network Security 8 Disadvantages Value if not attacked: None Limited view: Honeypots can only track and capture activity that directly interacts with them. Honeypots will not capture attacks against other systems Fingerprinting: an incorrectly implemented honeypot can identify itself and others
  • 9. Computer Network Security 9 Comparison of 6 honeypots
  • 10. Computer Network Security 10 Honeyd Open source Runs on Unix Low interaction Emulated services to deceive attacker and capture activity Highly customizable (open source) Detects activity on any TCP port Can monitor millions of non-existent IP addresses
  • 11. Computer Network Security 11 Honeyd Can simultaneously assume IP addresses of thousands of victims and actively interact with attackers (has been tested with 60,000) Can emulate many different OSs at the same time (Specter can emulate 13 different OSs, but only one at a time) Emulates not only OS but also the proper TCP/IP stack unlike BOF and Specter
  • 12. Computer Network Security 12 Honeyd Disadvantages Only TCP services, not UDP ICMP, echo request and response only
  • 14. Computer Network Security 14 Honeynets Honeynets are a prime example of high-interaction honeypot Honeynets are an architecture, an entire network of Honeypots. Due to the size of a production network and the amount of traffic, extensive logging can not be deployed We can use honeynets instead A network of actual systems running real operating systems Not a single product but composed of multiple technologies and tools
  • 15. Computer Network Security 15 Honeynets Data control: managing or tracking traffic to and from a honeynet. You don’t want complaints about malicious activity from your honeynet. But we don’t want attackers to know that they are in a controlled environment either Techniques for data control: • Connection control: limit the outbound connections • Bandwidth control: set a limit on the bandwidth Data capture: logging of entire attacker activity
  • 16. Computer Network Security 16 Honeynets Data collection: collecting data from multiple honeynets to a central location Honeynet architectures: Gen I Gen II
  • 17. Computer Network Security 17 Gen I Honeynets Simple architecture Simple data capture and data control techniques make it detectable by attackers sometimes Places a layer 3 firewall in front of the honeynet for data control and capture. Logs are available from multiple levels: Firewall logs IDS logs System logs
  • 18. Computer Network Security 18 Gen II Honeynets Gateway is layer 2 device which makes it harder to detect Firewall works in bridge mode Also has IPS capability Sebek client/server tool which is a kernel module for logging to a remote syslog server using UDP and hides its activity from the attacker Also have data collection capability Also provide alerts when an attack occurs