18
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium 2004. Presenter: Hiral Chhaya for CAP6103

A virtual honeypot framework

Embed Size (px)

Citation preview

Page 1: A virtual honeypot framework

A VIRTUAL HONEYPOT FRAMEWORK

Author : Niels Provos

Publication: Usenix Security Symposium 2004.

Presenter: Hiral Chhaya for CAP6103

Page 2: A virtual honeypot framework

SECURITY SITUATION

We’re unable to make secure computer systems or even measure their security.

New vulnerabilities kept being exploited Exploit automation and massive global

scanning for vulnerabilities to compromise computer systems

We use “Honeypot” as one way to get early warnings of new vulnerabilities

Page 3: A virtual honeypot framework

INTRODUCTION What Is Honeypot ????

Defunation--A honeypot is an information system resource whose value lies in

unauthorized or illicit use of that resource.

Has no production value;

Used for monitoring, detecting and analyzing attacks

Does not solve a specific problem

Honeypots have a low false positive rate

Page 4: A virtual honeypot framework

CLASSIFICATION

By level of interaction

HighLow

By Implementation

VirtualPhysical

Page 5: A virtual honeypot framework

WHAT IS HONEYD

HoneydHoneyd: A virtual honeypot application, which allows us to create thousands of IP addresses with virtual machines and corresponding network services.

Page 6: A virtual honeypot framework

WHAT CAN HONEYD DO ???

Simulate TCP and UDP services

Support ICMP

Handle multiple IP addresses simultaneously

Simulate arbitrary network topologies

Support topologically dispersed address spaces

Support network tunneling for load sharing

Page 7: A virtual honeypot framework

HONEYD DESIGN

Receiving Network Data

Architecture

Personality Engine

Routing Topology

Logging

Page 8: A virtual honeypot framework

RECEIVING NETWORK DATA

Ways for Honeyd to receives traffic for its virtual honeypots

Special route lead data to honeyd host

Proxy ARP for honeypots

Page 9: A virtual honeypot framework

ARCHITECTURE

•Configuration database

•Central packet dispatcher

•Protocol handles

•Personality engine

•Option routing component

Page 10: A virtual honeypot framework

PERSONALITY ENGIN

To fool fingerprinting tools

Uses fingerprint databases by Nmap, for TCP, UDP Xprobe, for ICMP

Introduces changes to the headers of every outgoing packet before sent to the network

Page 11: A virtual honeypot framework

ROUTING TOPOLOGY

Simulates virtual network topologies;

Some honeypots are also configured as routers

Latency and loss rate for each edge is configured;

Support network tunneling and traffic redirection;

Page 12: A virtual honeypot framework

HOW TO CONFIGURE

Each virtual honeypot is configured with a template.

Commands: Create: Creates a new template Set:

Assign personality (fingerprint database) to a template Specify default behavior of network protocols

Block: All packets dropped Reset: All ports closed by default Open: All ports open by default

Add: Specify available services Proxy: Used for connection forwarding

Bind: Assign template to specific IP address

Page 13: A virtual honeypot framework

LOGGING

Honeyd supports several ways of logging network activity.

Honeyd creat connection logs to report attempted and completed connections for all protocols.

Honeyd can be runs in conjunction with a NIDS.

Page 14: A virtual honeypot framework

APPLICATIONS

Network decoys

Spam Prevention

Page 15: A virtual honeypot framework

CONCLUSION

Honeyd has many advantages over NIDS Collects more useful information Detects vulnerabilities not yet understood Less likely leads to high false positives

Cheats the fingerprint tools Effective network decoys Detecting and immunizing new worms Spam prevention

Page 16: A virtual honeypot framework

WEAKNESSES

Limit interaction only at network level

Not simulate the whole OS

Adversaries never gain full access to systems

Limited number of simulated services and protocols

What if the warm is smart to cheat us? Honeyd will become attackers.

Page 17: A virtual honeypot framework

HOW TO IMPROVE

Combine Honeyd with high-interaction virtual honeypots using User Mode Linux or VMware to have a better forensic analysis of the attacker;

Cheat more fingerprint tools, eg. P0f—passive analyze the network traffic;

Simulate more services and protocols, eg. has a better TCP state machine.

Page 18: A virtual honeypot framework

THANK YOU !!!!!