SlideShare a Scribd company logo
Modern Honey Network (MHN) 
Open Source Honeynet Management Platform 
Colby DeRodeff 
Chief Technology Officer 
Jason Trost 
@jason_trost 
jason.trost [AT] threatstream [DOT] com
Who am I 
• Jason Trost (@jason_trost) 
• Director of ThreatStream Labs 
• Formerly at Endgame, Booz Allen, Dept. of Defense, Sandia Nat’l Labs 
• Background in Big Data Security Analytics 
• Big advocate of open source and open source contributor 
– Binary Pig – framework for large-scale static analysis using Hadoop 
– Apache Accumulo – Pig integration, Python integration, Analytics 
– Apache Storm 
– Elasticsearch plugins 
– Honeynet Project 
www.threatstream.com © 2014 threatstream Confidential 2
ThreatStream 
• Cyber Security company founded in 2013 and venture 
backed by Google Ventures and Paladin Capital Group. 
• SaaS based enterprise security software that provides 
actionable threat intelligence to large enterprises and 
government agencies. 
• Our customers hail from the financial services, retail, 
energy, and technology sectors. 
www.threatstream.com © 2014 threatstream Confidential 3
Agenda 
• Background 
• The Problem 
• What is MHN 
• MHN Architecture 
• Demo 
• Wrap-up 
www.threatstream.com © 2014 threatstream Confidential 4
Background 
• Honeypots can be very useful 
– Esp. if deployed behind your firewall 
– Catch internal scanning hosts 
– Early warning system 
• Honeypot and network sensor data is useful, esp. at scale 
– Threat feeds 
– Reputation engine 
– Attack trends 
– Is this IP only attacking me? Or others? 
www.threatstream.com © 2014 threatstream Confidential 5
The Problem 
• Deploying/Managing Honeypots is difficult 
• These activities are harder than they should be: 
– Installing Honeypot packages 
– Managing Honeypot sensors 
– Setting up data flows 
– Analyzing the collected data 
• Because of this, honeypots are not used as much as they 
could be in production 
• We hope to change that 
www.threatstream.com © 2014 threatstream Confidential 6
What is MHN 
• Modern Honey Network 
• Open source platform for managing honeypots, collecting and analyzing 
their data 
• Makes it very easy to deploy new honeypots and get data flowing 
• Leverages some existing open source tools 
– hpfeeds 
– nmemosyne 
– honeymap 
– MongoDB 
– Dionaea, Conpot, Snort, Kippo 
– Glastopf, Amun, and Wordpot 
www.threatstream.com © 2014 threatstream Confidential 7
Honeypot Management 
• MHN Automates management tasks 
• Deploying new honeypots 
• Setting up data flows using hpfeeds 
• Store and index the resulting data 
• Correlate with IP Geo data 
• Real-time visualization 
www.threatstream.com © 2014 threatstream Confidential 8
Architecture 
MH 
N 
Mnemosyne 
honeymap Webapp REST API 
3rd party 
apps 
hpfeeds 
snort conpot dionaea 
snort conpot dionaea 
snort conpot dionaea 
Sensors 
Kippo 
Kippo 
Kippo 
Glastop 
f 
Glastop 
f 
Glastop 
f 
Amun 
Amun 
Amun 
www.threatstream.com © 2014 threatstream Confidential 9
Demo 
www.threatstream.com © 2014 threatstream Confidential 10
Open Source (GPLv3) 
github.com/threatstream/MHN 
www.threatstream.com © 2014 threatstream Confidential 11
Questions 
www.threatstream.com © 2014 threatstream Confidential 12
Contact 
• Jason Trost 
• @jason_trost 
• jason.trost [AT] threatstream [DOT] com 
• github.com/jt6211 
www.threatstream.com © 2014 threatstream Confidential 13

More Related Content

PPTX
Modern Honey Network (MHN)
PPTX
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
PPTX
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
PPTX
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
PPTX
Anomali Detect 2016 - Borderless Threat Intelligence
PPTX
R-CISC Summit 2016 Borderless Threat Intelligence
PPTX
SANS CTI Summit 2016 Borderless Threat Intelligence
PPTX
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Modern Honey Network (MHN)
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
Anomali Detect 2016 - Borderless Threat Intelligence
R-CISC Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares

What's hot (20)

PDF
Fighting cybersecurity threats with Apache Spot
PPTX
BSidesNYC 2016 - An Adversarial View of SaaS Malware Sandboxes
PPTX
Episode IV: A New Scope
PDF
Honeynet architecture
PPTX
Open Source Malware Lab
PDF
Fighting cyber fraud with hadoop v2
PDF
Reducing Mean Time to Know
PPTX
Hadoop and Big Data Security
PDF
Save Time and Act Faster with Playbooks
PDF
Big Data Security Intelligence and Analytics for Advanced Threat Protection
PPTX
Advanced Threat Hunting - Botconf 2017
PPTX
Threat Hunting for Command and Control Activity
PDF
Managing Indicator Deprecation in ThreatConnect
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PDF
Sqrrl May Webinar: Data-Centric Security
PDF
Avoiding the Pitfalls of Hunting - BSides Charm 2016
PDF
October 2014 Webinar: Cybersecurity Threat Detection
PDF
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
PDF
The Art and Science of Alert Triage
PPTX
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Fighting cybersecurity threats with Apache Spot
BSidesNYC 2016 - An Adversarial View of SaaS Malware Sandboxes
Episode IV: A New Scope
Honeynet architecture
Open Source Malware Lab
Fighting cyber fraud with hadoop v2
Reducing Mean Time to Know
Hadoop and Big Data Security
Save Time and Act Faster with Playbooks
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Advanced Threat Hunting - Botconf 2017
Threat Hunting for Command and Control Activity
Managing Indicator Deprecation in ThreatConnect
Combating Insider Threats – Protecting Your Agency from the Inside Out
Sqrrl May Webinar: Data-Centric Security
Avoiding the Pitfalls of Hunting - BSides Charm 2016
October 2014 Webinar: Cybersecurity Threat Detection
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
The Art and Science of Alert Triage
Next generation storage: eliminating the guesswork and avoiding forklift upgrade

Viewers also liked (11)

PDF
Pengamanan Jaringan dengan Honeynet-Charles Lim
PDF
Modul metasploit
PDF
05 tk3193-sniffing & dos
PDF
13. representasi data 1 julv1
PDF
17. representasi data 5 julv2
PDF
4. alat input output jul
PDF
14. representasi data 2 jul
PDF
Jurnal metasploit(revisi)
PDF
15. representasi data 3 jul
PDF
16. representasi data 4
PDF
Jurnal modul 3 vpn
Pengamanan Jaringan dengan Honeynet-Charles Lim
Modul metasploit
05 tk3193-sniffing & dos
13. representasi data 1 julv1
17. representasi data 5 julv2
4. alat input output jul
14. representasi data 2 jul
Jurnal metasploit(revisi)
15. representasi data 3 jul
16. representasi data 4
Jurnal modul 3 vpn

Similar to Modern Honey Network at Bay Area Open Source Security Hackers (20)

PDF
Hortonworks sqrrl webinar v5.pptx
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PDF
Security Breakout Session
PPTX
Preparing for the Cybersecurity Renaissance
PPTX
Supporting Financial Services with a More Flexible Approach to Big Data
PPTX
2016 Cybersecurity Analytics State of the Union
PDF
Big data beyond the hype may 2014
PPTX
Make Streaming Analytics work for you: The Devil is in the Details
PDF
C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...
PDF
Ciso executive forum 2013
PDF
Enterprise Apache Hadoop: State of the Union
PDF
System Security on Cloud
PDF
HP Enterprise Software: Making your applications and information work for you
PDF
Open Blueprint for Real-Time Analytics in Retail: Strata Hadoop World 2017 S...
PDF
Spark in the Hadoop Ecosystem-(Mike Olson, Cloudera)
PPTX
S2DS London 2015 - Hadoop Real World
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PPTX
big data and cloud computing
PDF
Enterprise Hadoop with Hortonworks and Nimble Storage
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Hortonworks sqrrl webinar v5.pptx
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Security Breakout Session
Preparing for the Cybersecurity Renaissance
Supporting Financial Services with a More Flexible Approach to Big Data
2016 Cybersecurity Analytics State of the Union
Big data beyond the hype may 2014
Make Streaming Analytics work for you: The Devil is in the Details
C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...
Ciso executive forum 2013
Enterprise Apache Hadoop: State of the Union
System Security on Cloud
HP Enterprise Software: Making your applications and information work for you
Open Blueprint for Real-Time Analytics in Retail: Strata Hadoop World 2017 S...
Spark in the Hadoop Ecosystem-(Mike Olson, Cloudera)
S2DS London 2015 - Hadoop Real World
Combating Insider Threats – Protecting Your Agency from the Inside Out
big data and cloud computing
Enterprise Hadoop with Hortonworks and Nimble Storage
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada

Recently uploaded (20)

PDF
Microsoft Core Cloud Services powerpoint
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPTX
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
PDF
Microsoft 365 products and services descrption
PPTX
retention in jsjsksksksnbsndjddjdnFPD.pptx
PPTX
Pilar Kemerdekaan dan Identi Bangsa.pptx
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PDF
Global Data and Analytics Market Outlook Report
PPTX
Business_Capability_Map_Collection__pptx
PPTX
Leprosy and NLEP programme community medicine
PPTX
Managing Community Partner Relationships
PPTX
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
PDF
Transcultural that can help you someday.
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
modul_python (1).pptx for professional and student
PPTX
New ISO 27001_2022 standard and the changes
PPT
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
PPTX
Introduction to Inferential Statistics.pptx
Microsoft Core Cloud Services powerpoint
Optimise Shopper Experiences with a Strong Data Estate.pdf
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
Microsoft 365 products and services descrption
retention in jsjsksksksnbsndjddjdnFPD.pptx
Pilar Kemerdekaan dan Identi Bangsa.pptx
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
STERILIZATION AND DISINFECTION-1.ppthhhbx
Global Data and Analytics Market Outlook Report
Business_Capability_Map_Collection__pptx
Leprosy and NLEP programme community medicine
Managing Community Partner Relationships
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
Transcultural that can help you someday.
Qualitative Qantitative and Mixed Methods.pptx
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
modul_python (1).pptx for professional and student
New ISO 27001_2022 standard and the changes
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
Introduction to Inferential Statistics.pptx

Modern Honey Network at Bay Area Open Source Security Hackers

  • 1. Modern Honey Network (MHN) Open Source Honeynet Management Platform Colby DeRodeff Chief Technology Officer Jason Trost @jason_trost jason.trost [AT] threatstream [DOT] com
  • 2. Who am I • Jason Trost (@jason_trost) • Director of ThreatStream Labs • Formerly at Endgame, Booz Allen, Dept. of Defense, Sandia Nat’l Labs • Background in Big Data Security Analytics • Big advocate of open source and open source contributor – Binary Pig – framework for large-scale static analysis using Hadoop – Apache Accumulo – Pig integration, Python integration, Analytics – Apache Storm – Elasticsearch plugins – Honeynet Project www.threatstream.com © 2014 threatstream Confidential 2
  • 3. ThreatStream • Cyber Security company founded in 2013 and venture backed by Google Ventures and Paladin Capital Group. • SaaS based enterprise security software that provides actionable threat intelligence to large enterprises and government agencies. • Our customers hail from the financial services, retail, energy, and technology sectors. www.threatstream.com © 2014 threatstream Confidential 3
  • 4. Agenda • Background • The Problem • What is MHN • MHN Architecture • Demo • Wrap-up www.threatstream.com © 2014 threatstream Confidential 4
  • 5. Background • Honeypots can be very useful – Esp. if deployed behind your firewall – Catch internal scanning hosts – Early warning system • Honeypot and network sensor data is useful, esp. at scale – Threat feeds – Reputation engine – Attack trends – Is this IP only attacking me? Or others? www.threatstream.com © 2014 threatstream Confidential 5
  • 6. The Problem • Deploying/Managing Honeypots is difficult • These activities are harder than they should be: – Installing Honeypot packages – Managing Honeypot sensors – Setting up data flows – Analyzing the collected data • Because of this, honeypots are not used as much as they could be in production • We hope to change that www.threatstream.com © 2014 threatstream Confidential 6
  • 7. What is MHN • Modern Honey Network • Open source platform for managing honeypots, collecting and analyzing their data • Makes it very easy to deploy new honeypots and get data flowing • Leverages some existing open source tools – hpfeeds – nmemosyne – honeymap – MongoDB – Dionaea, Conpot, Snort, Kippo – Glastopf, Amun, and Wordpot www.threatstream.com © 2014 threatstream Confidential 7
  • 8. Honeypot Management • MHN Automates management tasks • Deploying new honeypots • Setting up data flows using hpfeeds • Store and index the resulting data • Correlate with IP Geo data • Real-time visualization www.threatstream.com © 2014 threatstream Confidential 8
  • 9. Architecture MH N Mnemosyne honeymap Webapp REST API 3rd party apps hpfeeds snort conpot dionaea snort conpot dionaea snort conpot dionaea Sensors Kippo Kippo Kippo Glastop f Glastop f Glastop f Amun Amun Amun www.threatstream.com © 2014 threatstream Confidential 9
  • 10. Demo www.threatstream.com © 2014 threatstream Confidential 10
  • 11. Open Source (GPLv3) github.com/threatstream/MHN www.threatstream.com © 2014 threatstream Confidential 11
  • 12. Questions www.threatstream.com © 2014 threatstream Confidential 12
  • 13. Contact • Jason Trost • @jason_trost • jason.trost [AT] threatstream [DOT] com • github.com/jt6211 www.threatstream.com © 2014 threatstream Confidential 13

Editor's Notes

  • #2: Good evening welcome to our talk on the Modern Honey Network, an open source platform managing Honeynets
  • #7: have you tried setting up hpfeeds based data flows? It is a kind of a pain
  • #12: also open sourced a small supporting project https://github.com/threatstream/snort_hpfeeds