Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

OUTLINE

1. Introduction

1.1 Background
1.2 Relation to Information Security
1.3 Honeypot Basics

Deception Techniques, Methods, 2. Deceptive Networks, Honeypots and Honeynets


Honeypots, Honeynets and Usage 2.1 Honeypot/Deception Objectives
2.2 Honeypot/Deception Design Goals
2.3 Honeypot/Deception Deployment
CMPT 495 2.4 Sample Honeypot Deployment

Ilker Tanli 3. Conclusion and Future Work


Turgut Kolcalar

PART I 1.1 Background

Deception is an important tool and technique for


success when efficiently used in all kinds of
Introduction warfare.
It is the art of making the enemy believe in what
we want to believe.
1.1 Background
Deception can be seen used even by animals
1.2 Relation to Information Security like octopus that change colors to look like a
1.3 Honeypot Basics rock when scared.
It wasn’t until early 1990s when deception was
thought to be used in IT for defensive purposes.
1.1 Background 1.2 Relation to Information Security

Honeynets are networks consisting of


Example of these types of defense are: honeypots. Honeypots are eventually
monitored resources of which its value lies
in being attacked, compromised or probed,
that rely on deception heavily.
Noise Injection
False Information Feeding In any kind of warfare, having the most
Spread Spectrums Traps information about the enemy or attacker
Steganography increases the chance of being successful.
This tends to give the defender an early
warning of new attacks.

1.2 Relation to Information Security 1.3 Honeypot Basics

There are two types of honeypots,


Deception has several other advantages: research and production. Research
honeypots require a lot of work, but in
It increases the attackers workload because the
return keystrokes, tools, conversations,
attacker cannot tell which of the attack attempts and methods can be learned.
work and which fail.
On the other hand production honeypots
are more similar to IDS’s where they
It exhausts attacker resources, increases the
sophistication for an attack. identify hostile activity, generate alerts and
capture minimum amount of data.
PART II 2.1 Honeypot/Deception Objectives

Honeypots collect little data of high value.


2. Deceptive Networks, Honeypots and Honeynets All traffic that leaves and enters the
honeypot is suspect by nature and should
be analyzed.
2.1 Honeypot/Deception Objectives
The honeypot systems should appear as
2.2 Honeypot/Deception Design Goals generic as possible.
2.3 Honeypot/Deception Deployment One detail that needs to be looked into is
2.4 Sample Honeypot Deployment to make sure that the attacker should not
be able to use the honeypot as a lunch
point for further attacks.

2.2 Honeypot/Deception Design


2.3 Honeypot/Deception Deployment
Goals

We have to make sure that the likelihood of any There are several ways to set up a
individual intelligence probe encountering a real honeypot. It can be set in front of a
vulnerability low. Increasing the total size of the firewall, in the DMZ or behind a firewall.
space to be searched by the attacker, and It is best to deploy the honeypot closer to
making the vulnerabilities small in that space the server, as it is more tempting for the
can do this. attacker.
Time to defeat a deception should be as high as
Another way to deploy a honeypot would
possible, which requires the deceptions are
be to place it in between servers, but this
realistic and defeating a deception does not
method is not very effective. It would only
reveal any additional paths.
prove use mostly against sweep scans.
2.4 Sample Honeynet Deployment 2.4 Sample Honeynet Deployment

We will now try to deploy a sample honeynet. We will also use Arpd, which is a daemon that
For this we will use a Linux box, a daemon listens to ARP requests and answers for IP
called Honeyd, and Arpd. addresses that are unallocated.
Honeyd is a daemon that works under UNIX Using Arpd in conjunction with Honeyd, it is
systems that creates virtual hosts on the
network. possible to populate the unallocated address
space in a production network with virtual
Virtual networks require less hardware and thus
cost much less. A single host can maintain up to honeypots.
65535 hosts. After installing both daemons on a valid Linux
All hosts can be individually configured for machine (IP 155.246.23.69), we run Arpd to
requested services to show as running. force unused IP’s to resolve to the MAC that the
daemon is on.

2.4 Sample Honeynet Deployment Sample Honeyd Configuration File

Using the configuration file for Honeyd Sample Configureation File Used For Honeyd
three virtual machines are created
(237,238 and 239), of which seem to have [root@twister Honeyd]# more config
different operating systems of which were # Amiga Box
configured as AmigaOS, DEC OpenVMS create amigabox
and MS NT 4.0 respectively. (Machines set amigabox personality "AmigaOS Miami 3.0"
are referred with their last octets.) add amigabox tcp port 80 "sh scripts/web.sh"
After set up, fingerprinting and scans were add amigabox tcp port 23 proxy155.246.23.238:23
run from a MS Windows 2000 operating set amigabox default tcp action reset
system. bind 155.246.23.237 amigabox
Scan Results for 155.246.23.237 Scan Results for 155.246.23.238

Figure 1 Figure 2

Scan Results for 155.246.23.239 PART III

3. Conclusion and Future Work

Figure 3
3. Conclusion and Future Work 3. Conclusion and Future Work

It can be seen that honeypots that are Since all traffic through the honeypot is
configured correctly can increase our chances to considered suspicious, activity should be logged
secure our production servers, as well as and viewed.
maintain information about the black hat Legal concerns should also be addressed.
community. Information obtained through honeypots might or
Once again, the deceptive network whether might not be able to be used in court, due to
virtual or not should try to reflect a real network other laws.
in all aspects. This is why honeypots and honeynets should not
Building extensive virtual honeynets are not as be advertised. Legal perspective of the issue
easy as they seem, and require extensive should be discussed and clarified.
planning and deployment.

You might also like