100804

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

(IJCNS) International Journal of Computer and Network Security, 27

Vol. 2, No. 8, August 2010

Low Budget Honeynet Creation and Implementation


for Nids and Nips
Aathira K. S1, Hiran V. Nath2, Thulasi N. Kutty3, Gireesh Kumar T4
1
TIFAC CORE in Cyber Security Centre,
Amrita Vishwa Vidyapeetham, Coimbatore, India
aathiramanikutty@gmail.com
2
TIFAC CORE in Cyber Security Centre,
Amrita Vishwa Vidyapeetham, Coimbatore, India
hiranvnath@gmail.com
3
TIFAC CORE in Cyber Security Centre,
Amrita Vishwa Vidyapeetham, Coimbatore, India
thulasi.nk@gmail.com
4
TIFAC CORE in Cyber Security Centre,
Amrita Vishwa Vidyapeetham, Coimbatore, India
gireeshkumart@gmail.com

set up for the purpose of monitoring and logging activities


Abstract: This paper describes Honeynet, a system for of entities that probe, attack or compromise them.
automated generation of attack signatures for network intrusion Honeypots are closely monitored network decoys serving
detection and prevention systems. A honeypot is a security several purposes. They can distract attackers from more
resource whose value lies in being probed, attacked or
valuable machines on a network; they can provide early
compromised. We examine different kinds of honeypots,
honeypot concepts, and approaches to their implementation. warning about new attack and exploitation trends; and they
Our system applies pattern detection techniques and protocol allow in-depth examination of adversaries during and after
based classification on the traffic captured on a honeypot exploitation of a honeypot. Honeypots are a technology
system. Softwares like Sun virtual box-VMware were used for whose value depends on the "bad guys" interacting with it.
this purpose so that it was not required to buy large number of All honeypots work on the same concept: nobody should be
high end systems for implementing this setup and thereby cost using or interacting with them, therefore any transactions or
was reduced in a great extend. While running Honeynet on a
WAN environment, the system successfully created precise
interactions with a honeypot are, by definition,
traffic signatures and updates the firewall that otherwise would unauthorized. “Honeynet” is a term that is frequently used
have required the skills and time of a security officer. where honeypots are concerned. A honeynet is simply a
network that contains many honeypots and the traffic to
Keywords: IDS, IPS, Honeypot, Honeynet, Snort. each honeypots is controlled using honeywall. More
precisely, it is a high-interaction honeypot that is designed
1. Introduction to capture extensive information on threats and provides real
A honeypot is tough to define because it is a new and systems, applications, and services for attackers to interact
changing technology, and it can be involved in different with.
aspects of security such as prevention, detection, and Redhat Linux machine is used for routing packets between
information gathering. It is unique in that it is more general honeypots and actual servers. It is really expensive to buy an
technology, not a solution, and does not solve a specific actual router. A firewall had been built to filter packets in
security problem. Instead, a honeypot is a highly flexible the gateway using Linux machine so that its rules could be
tool with applications in such areas as network forensics, updated and its not required to buy more number of
vulnerability analysis and intrusion detection. A honeypot is firewalls. VMware software which serves the purpose of
a security resource, whose value lies in being probed, virtual machine is used so that there is no need to buy large
attacked, or compromised. Currently, the creation of NIDS server configuration machines. Even a single machine
signatures is a tedious manual process that requires detailed resource can be shared by many hosts which are used for
knowledge of the traffic characteristics of any phenomenon making honeypots.
that is supposed to be detected by a new signature. This paper is organized as follows: In Section 2 we examine
Simplistic signatures tend to generate large numbers of false different types of honeypots and honeywall. In Section 3 we
positives; overly specific ones cause false negatives. To provide an overview of the system architecture. Section 4
address these issues, we present Honeynet, a system that presents implementation part. Section 5 shows our findings.
generates signatures for malicious network traffic We then conclude and provide our opinion on the future of
automatically. Our system applies pattern detection honeypots in section 6.
techniques and protocol based classification on the traffic
captured on honeypots. Honeypots are computer resources
28 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 8, August 2010

2.1.2. Production Honeypot


A production honeypot is what most people think of when
discussing honeypots. A production honeypot is one used
within an organization’s environment to protect the
organization and help mitigate risk [4]. It has value because
it provides immediate security to a site’s production
resources. Since they require less functionality then a
research honeypot, they are typically easier to build and
deploy. Although they identify attack patterns, they give less
information about the attackers than research honeypots.
Figure 1. Honeypot Setup using Virtualization You may learn from which system attackers are coming
from and what exploits are being launched, but may be not
who they are, how they are organized, or what tools they are
2. Types of Honeypots
using. Production honeypots tend to mirror the production
Honeypots can be classified based on their purpose network of the company (or specific services), inviting
(production, research) and level of interaction (low, attackers to interact with them in order to expose current
medium, and high). We examine each type in more detail vulnerabilities of the network. Uncovering these
below. vulnerabilities and alerting administrators of attacks can
2.1. Purpose of Honeypots provide early warning of attacks and help reduce the risk of
intrusion [3]. The data provided by the honeypot can be used
2.1.1. Research Honeypot to build better defenses and counter measures against future
A research honeypot is designed to gain information about threats.
the blackhat community and does not add any direct value to It should be pointed out that as a prevention mechanism,
an organization [4]. They are used to gather intelligence on production honeypots have minimal value. Best practices
the general threats organizations may face, allowing the should be implemented involving the use of Firewalls,
organization to better protect against those threats. Its IDS’s, and the locking down and patching of systems. The
primary function is to study the way in which the attackers most common attacks are done using scripts and automated
progress and establish their lines of attack, it helps tools. Honeypots may not work well against these since
understand their motives, behavior and organization these attacks focus on many targets of opportunity, not a
Research honeypots are complex to both deploy and single system. Their main benefit is in the area of detection.
maintain and capture extensive amounts of data. They can Due to its simplicity it addresses the challenges of IDS’s –
be very time extensive. Very little is contributed by a there are minimal false positives and false negatives. There
research honeypot to the direct security of an organization, are several situations where an IDS may not issue an alert:
although the lessons learned from one can be applied to the attack is too recent for your vendor, the rule matching it
improve attack prevention, detection, or response. They are caused too many false positives or it’s seeing too much
typically used by organizations such as universities, traffic and is dropping packets. False Positives occur when
governments, the military or large corporations interested in an untuned IDS alerts way too much on normal network
learning more about threats research. Research honeypots traffic. These alerts soon get ignored or the rules triggering
add tremendous value to research by providing a platform to them are modified, but then real attacks may be missed. In
study cyberthreats. Attackers can be watched in action and addition, there is a serious problem with the volume of data
recorded step by step as they attack and compromise the to analyze with IDS’s. They can’t cope with the network
system. This intelligence gathering is one of the most traffic on a large system. Honeypots address these
unique and exciting characteristics of honeypots [7]. It is challenges because since honeypots have no production
also a beneficial tool in aiding in the development of activity, all the traffic sent to a honeypot is almost certainly
analysis and forensic skills. Sometimes they can even be unauthorized – meaning no false positives, false negatives
instrumental in discovering new worms. or large data sets to analyze. Also, once an attack has been
detected the machine can be pulled offline and thorough
forensics performed something that is often difficult if not
impossible with a production system. In general,
commercial organizations derive the most direct benefit
from production honeypots. These categorizations of
honeypots are simply a guideline to identify their purpose,
the distinction is not absolute. Sometimes the same
honeypot may be either a production or research honeypot.
It is not as much how it is built but how it is used [6].

Figure 2. Honeypots in a production environment 2.2. Level of Interaction


In addition to being either production or research honeypots,
(IJCNS) International Journal of Computer and Network Security, 29
Vol. 2, No. 8, August 2010

honeypots can also be categorized based on the level of type of honeypot, as all actions can be logged and analyzed.
involvement allowed between the intruder and the system. Because the attacker has more resources at his disposal, a
These categories are: low-interaction, medium-interaction high interaction honeypot should be constantly monitored to
and high interaction. What you want to do with your ensure that it does not become a danger or a security hole
honeypot will determine the level of interaction that is right [2]. A honeynet is an example of a high-interaction
for you. honeypot, and it is typically used for research purposes.
2.2.1. Low-interaction Honeypots 2.3. Free and commercial honeypot solutions
A low-interaction honeypot simulates only services that 2.3.1 Nepenthes Honeypot
cannot be exploited to gain total access to the honeypot [5]. Nepenthes Honeypot is developed by SPARSA's for its
On a lowinteraction honeypot, there is no operating system ongoing viral research project. It is freely available for
for the attacker to interact with [2] (pp. 19). They can be download and use as VM from
compared to passive IDS since they do not modify network http://www.sparsa.org/node/23
traffic in any way, and do not interact with the attacker. 2.3.1.1. Features
Although this minimizes the risk associated with honeypots, Nepenthes Ampullaria acts like a honeypot to feign
it also makes low interaction honeypots very limited. vulnerability to, and download viruses / worms /Intrusions
However, they can still be used to analyze spammers and into hexdumps which can be reversed. A collection of
can also be uses as active countermeasures against worms 30,000 attacks is growing each day the nepenthes computer
[5]. Low-interaction honeypots are easy to deploy and is online, gathering data to submit to anti-virus companies
maintain. An example of a commercial low-interaction about what is in the wild. Currently SPARSA operates a
honeypot is honeyd. Honeyd is a licensed daemon that is centralized Nepenthes server out of their office in RIT's
able to simulate large network structures on a single CIMS building. A Virtual Machine running Nepenthes is
network host [3, 13]. Honeyd works by imitating computers available here for download and use by public. We need
on the unused IP address of a network, and provides the VMware Player, VMware Server, or VMware workstation in
attacker with only a façade to attack. Another example of a order to run these Virtual Machines. VMware Player and
low-interaction honeypot is Specter, which is developed and VMware Server are free to all. RIT also has a site license for
sold by NetSec. Specter has functionality like an enterprise VMware workstation you may inquire about. The Virtual
version of BOF and only affects the application layer. Machines are to be used either on their own unprotected box
2.2.2. Medium-Interaction Honeypots serving VMware images, or placed on the DMZ of a
Medium-interaction honeypots are slightly more firewalled environment. This gives the best opportunity to
sophisticated than low interaction honeypots, but less catch attack and exploits in the wild. It is SPARSA's goal to
sophisticated than high interaction honeypots [8]. Like low- set up a centralized submission and analysis cluster with
interaction honeypots they do not have an operating system help from folks like you. All VMs submit to the SPARSA
installed, but the simulated services are more complicated server where results will be analyzed and submitted to major
technically. Although the probability that the attacker AV companies and the Norman Sandbox. A copy is also
finding a security vulnerability increases, it is still unlikely kept for the local user to tinker with. Using this tactic the
that the system will be compromised [2] (pp. 20). Medium- Security Practices and Research Student Association hopes
interaction honeypots provide the attacker with a better to analyze viruses and malware in the wild by allowing
illusion of an operating system since there is more for the everyone to participate in collection and analysis. Future
attacker to interact with. More complex attacks can versions will pare down the known malware on the vm-
therefore be logged and analyzed. Some examples of clients so submission to the server is only unknown
medium-interaction honeypots include mwcollect, nepenthes malware.
and honeytrap. Mwcollect and nepenthes can be used to 2.3.2. BackOfficer Friendly:
collect autonomously spreading malware. These daemons A free win32 based honeypot solution by NFR Security (a
can log automated attacks, and extract information on how separate Unix port is available but has restricted
to obtain the malware binaries so that they can automatically functionality). It is able to emulate single services such as
download the malware. Honeytrap dynamically creates port telnet, ftp, smtp and to rudimentary
listeners based on TCP connection attempts extracted from a log connection attempts.
network interface stream, which allows the handling of 2.3.3. Deception toolkit (DTK):
some unknown attacks. A free and programmable solution intending to make it
2.2.3. High-interaction honeypots appear to attackers as if the system running DTK has a large
These are the most advanced honeypots. They are the most number of widely known vulnerabilities
complex and time-consuming to design, and involve the (http://www.all.net/dtk/dtk.html).
highest amount of risk because they involve an actual 2.3.4. HOACD:
operating system [2] (pp. 20 – 21). The goal of a high- This is a ready-to-run honeyd+OpenBSD+arpd on a
interaction honeypot is to provide the attacker with a real bootable CD (http://www.honeynet.org.br/tools)
operating system to interact with, where nothing is 2.3.5. Honeyd
simulated or restricted [8]. The possibilities for collecting In Honeyd, They expect adversaries to interact with
large amounts of information are therefore greater with this honeypots only at the network level. Instead of simulating
30 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 8, August 2010

every aspect of an operating system, they decided to network stack.


simulate only its network stack. The main drawback of this 2.3.6. HYW – Honeyweb
approach is that an adversary never gains access to a An in-depth simulation of an IIS 6.0 webserver that enables
complete system even if he compromises a simulated you to use your web content (perfect choice for capturing
service. On the other hand, we are still able to capture worms).
connection and compromise attempts. For that reason, 2.3.7. Mantrap / Decoy Server (commercial)
Honeyd is a low-interaction virtual honeypot that simulates Symantec Decoy Server sensors deliver holistic detection
TCP and UDP services. Honeyd must be able to handle and response as well as provide detailed information
virtual honeypots on multiple IP addresses simultaneously. through its system of data collection modules.
This allows us to populate the network with a number of 2.3.8. Specter
virtual honeypots that can simulate different operating SPECTER offers common Internet services such as SMTP,
systems and services. Furthermore, Honeyd must be able to FTP, POP3, HTTP and TELNET. They appear to be normal
simulate different network topologies. to the attackers but are in fact traps for them to mess around
and leave traces without even knowing they are connected to
a decoy system. It does none of the things it appears to but
instead logs everything and notifies the appropriate people.
2.4. Installing your own honeypot
Depending on the type of technology used there are different
things to consider when installing and deploying a
honeypot.
2.4.1. Low-interaction honeypot:
Make sure an attacker can’t access the underlying operating
system (especially when using plugins). If possible make use
of the honeypot’s features to emulate a more realistic
environment (e.g. traffic shaping).Make sure to use the
latest versions available.
2.4.2. Medium-interaction honeypot:
Figure 3. Honeyd receives traffic for its virtual honeypots Make sure an attacker can’t escape the jailed environment.
via a router or Proxy ARP. For each honeypot, Honeyd can Be aware of SUID or SGID files.
simulate the network stack behavior of a different operating
2.4.3. High-interaction honeypot:
system.
Use advanced network techniques to control the honeypot
2.3.5.1. Architecture (e.g. firewalls, intrusion detection systems) and make sure it
When the Honeyd daemon receives a packet for one of the can’t be used to harm third parties (e.g. legal issues of an
virtual honeypots, it is processed by a central packet open relay). If possible, poison the honeypot. Use software
dispatcher. The dispatcher checks the length of the IP that actually has vulnerabilities or your honeypot might
packet and verifies its checksum. The daemon knows only never be exploited successfully. Use tripwire or AIDE to get
three protocols: ICMP, TCP and UDP Packets for other a snapshot of the system.
protocols are discarded.
2.5. Virtual Honeywall
It's implemented in a virtual machine which has 3 network
cards. One is for the connection to the firewall, the second
to the internal network and the third is for remote
management of the honeywall itself.
2.6. Honeynet
A honeynet is made by networking these honeypots
(explained above) and the traffic to each honeypots will be
controlled with help of honeywall.

3. System Architecture

Figure 4. Overview of Honeyd’s architecture.


Incoming packets are dispatched to the
correct protocol handler. For TCP and UDP, the
configuredservices receive new data and send responses if
necessary.All outgoing packets are modified by the
personality engine to mimic the behavior of the configured Figure 5. Small Model of our Architecture
(IJCNS) International Journal of Computer and Network Security, 31
Vol. 2, No. 8, August 2010

Here the traffic will be entering the Network through the value then the source IP is tagged as a suspicious. The same
Linux firewall. Then all the traffic will be going through the process above is then done in multiple time intervals and if
honeywall. From there, honeywall will redirect the traffic the same source IP shows a similar behaviour, it will be
from each section to each honeywall. This is done since confirmed as a suspicious IP. The IP address would be
there can be tremendous connections which comes to the updated in the iptables in the Linux firewall so that further
web server. Some of these may be an attack and some may communication from the same IP Address would be blocked.
be normal ones. Here the redirected traffic which reaches In the second module, the monitored traffic is classified
the honeywall will be examined separately and those found based on protocol. Some features have been done with help
to be malicious would be spotted, their source IP address is of honeyd. Here the whole traffic would be classified based
send to the firewall by which the rules stored in the firewall on protocols and will be logged for further analysis. Here
can be updated. The outer firewall will be initially setup in a using the dynamically generated signatures, the snort
Redhat Linux machine, by updating its IPTables via database is updated in a real-time basis.
network messages. Some groups of Honeypots were created
inside a single machine using virtualisation techniques. 5. Findings
Softwares like Sun virtual box-VMWare were used for this
By implementing this system, we could implement a cost
purpose so that it was not required to buy large number of
effective Intrusion detection and prevention system. Here,
high end systems for implementing this setup and thereby
since the signatures for snort database is updated in a real
cost was reduced in a great extend.
time basis, it would also work as a prevention system. Since
these VMware’s are running on a single hardware, we were
4. Implementation able to setup different honeypots with different interaction.
So that some would be good in capturing network attacks
and some others could be used for preventing the spread of
NoRestrictions
worms in the network.

Honeypot
6. Conclusions and Future Outlook
Internet
In this paper we have provided a brief overview of what
Honeywall honeynet are, and they are useful in NIDS and NIPS. We
have discussed the different types of honeypots, honeywall
Connections Limited Packet Scrubbed Honeypot
and how to combine and set up a honeynet. We also looked
at factors that should be considered when implementing a
honeypot. Here we have used it along with a firewall and an
Figure 6. Communication Architecture IPS module which updates the rules in firewall. VMware
software which serves the purpose of virtual machine is used
so that there is no need to buy large server configuration
FORWARD machines. Even a single machine resource can be shared by
CHAIN many hosts which are used for making honeypots thereby
bringing out cost effectiveness.
We are planning to use the honeypots or honeynet for
INPUT OUTPUT vulnerability analysis in a network to find out both host
CHAIN CHAIN based vulnerability and network based vulnerability. Also
these honeynets could be used to find out the spread of
IPTABLES FIREWALL worm in a network and prevent it from spreading to the
entire network by creating and updating the signature
automatically.
Figure 7. Implemented Routing of packets
We are using two types of attack detection techniques – one References
is Threshold based classification and another one is protocol [1] I. Mokube, M. Adams. “White paper: Honeypots:
based classification. The first one mainly monitors the Concepts, Approaches, and Challenges,” ACMSE 2007,
traffic and if the traffic exceeds the defined threshold for a March 23-24, 2007,Winston-Salem, North Carolina,
particular Source IP address. The occurrence of each source USA
IP in a flow is determined and the total number of unique [2] R. Baumann, C. Plattner, “White Paper: Honeypots,
destinations and unique ports accessed by the IP is Swiss,” Federal Institute of Technology, Zurich, 2002.
determined. The ratio of the number of destination IPs to the [3] K. Gubbels “Hands in the Honeypot,” GIAC Security
number of destination ports is determined (IP/Port ratio). Essentials Certification (GSEC), 2002.
This IP/Port ratio is compared with the threshold value and [4] Karthik S, Samudrala B, Yang AT. “Design of Network
if the value is far greater than or far less than the threshold Security Projects Using Honeypots,” Journal of
32 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 8, August 2010

Computing Sciences in Colleges, 20(4), pp. 282-293.


2005
[5] N. Provos, “Honeypot Background, ”
http://www.honeyd.org/background.php.
[6] L. Spitzner, “Honeypots: Tracking Hackers,” Addison-
Wesley Pearson Education, Boston, MA, 2002.
[7] L. Spitzner, “The Value of Honeypots, Part One:
Definitions and Values of Honeypots,” Security Focus,
2001.
[8] Jr, Sutton, R.E. DTEC 6873 “Section 01: How to Build
and Use a Honeypot.”.

Authors Profile

Aathira K S received B.Tech in


Computer Science and Engineering from
Kerala University. Currently pursuing
M.Tech. in Cyber Security from Amrita
School of Engineering Coimbatore. Her
research interests are Intrusion Detection
and Prevention Systems, Malware
detection.

Hiran V Nath received B.Tech in


Information Technology from Kerala
University. During 2007-2009, he worked in
VSSC/ISRO, Govt of India, on contract
basis through Hi-Rel Fabs, Trivandrum.
Currently pursuing M.Tech. in Cyber
Security from Amrita School of Engineering
Coimbatore. His research interests are
Intrusion Detection and Prevention Systems,
Malware detection.

Thulasi N. Kutty received B.Tech in


Computer Science and Engineering from
Kerala University. Currently pursuing
M.Tech. in Cyber Security from Amrita
School of Engineering Coimbatore. Her
research interests are Intrusion Detection
and Prevention Systems, Malware
detection.

Gireesh Kumar T received B.Tech degree


in Mechanical Engineering from
N.S.S.college, Palghat,Kerala in 1998 .He
attained his MTech degree in Computer and
Information Science from Cochin University
of Science and Technology, Cochin, Kerala
in 2002. He is currently pursuing PhD.in
Artificial Intelligence at Anna University,
Chennai. He was Senior Lecturer with
Department of Computer Science and
Engineering at VLB Janakiammal College of Engineering,
Coimbatore, Tamilnadu from 2004 to 2008.He is now an Assistant
Professor (Sr.Grade) with Centre for Cyber at Amrita Vishwa
Vidyapeetham, Ettimadai, Tamilnadu. His research interests are in
the field of artificial Intelligence, Machine. Learning and
Algorithms. He has about 20 publications to his credit.

You might also like