1 / 18

Honeyd Virtual Honeypot Frame Work

Honeyd Virtual Honeypot Frame Work. CS591 Research Project. Niels Provos. Supervised by: Dr. Chow. Presented by: Fadi Mohsen. Presented by: Fadi Mohsen. Intrusion Detection System.

jolene
Télécharger la présentation

Honeyd Virtual Honeypot Frame Work

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HoneydVirtual Honeypot Frame Work CS591 Research Project Niels Provos Supervised by: Dr. Chow Presented by: Fadi Mohsen Presented by: Fadi Mohsen

  2. Intrusion Detection System • An Intrusion Detection System (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks, as examples, by crackers, malware and/or disgruntled employees. An IDS cannot directly detect attacks within properly encrypted traffic.

  3. Intrusion Prevention System • Intrusion Prevention System is used in computer security. It provides policies and rules for network traffic along with an intrusion detection system for alerting system or network administrators to suspicious traffic, but allows the administrator to provide the action upon being alerted. Some compare an IPS to a combination of IDS and an application layer firewall for protection.

  4. So, • The efficiency of IPS depends on the IDS data and information, but the IDS does not work probably in an encrypted traffic, moreover IDS information based on an actual attacks, which means there is a lose!

  5. Honeypot • Honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network but which is actually isolated, (un) protected, and monitored, and which seems to contain information or a resource that would be of value to attackers.

  6. Honeypot Benefits • Monitoring the data that enters and leaves a honeypot lets us gather information that is not available to NIDS • Honeypots can detect vulnerabilities that are not yet understood • data collected from Honeypots is less likely to lead to false positives than data collected by NIDS

  7. Honeypot Benefits (Cot.) • Honeypots can run any operating system and any number of services • Dealing with an interactive session even if encryption is used to protect the network traffic

  8. Honeypot Types • A high-interaction honeypot simulates all aspects of an operating system. • A low-interaction honeypot simulates only some parts, for example the network stack.

  9. Also we have • A physical honeypot is a real machine on the network with its own IP address. • A virtual honeypot is simulated by another machine that responds to network traffic sent to the virtual honeypot.

  10. Honeyd • Honeyd is a framework for virtual honeypots that simulates computer systems at the network level. Honeyd supports the IP protocol suites, and responds to network requests for its virtual honeypots according to the services that are configured for each virtual honeypot.

  11. Design and Implementation • The framework allows us to instrument thousands of IP addresses with virtual machines and corresponding network services. • Instead of simulating every aspect of an operating system, it is only simulating its network stack. • Honeyd is a low-interaction virtual honeypot that simulates TCP and UDP services.

  12. Cont. • Honeyd must be able to handle virtual honeypots on multiple IP addresses simultaneously, in order to populate the network with numerous virtual honeypots simulating different operating systems and services. • the framework able to simulate arbitrary network topologies, and support network tunneling.

  13. Design • A central machine intercepts network traffic sent to the IP addresses of configured honeypots and simulates their responses. • Honeyd is designed to reply to network packets whose destination IP address belongs to one of the simulated honeypots • Honeyd, to receive the correct packets, the network needs to be configured appropriately. We can create special routes for the virtual IP addresses that point to the Honeyd host

  14. Architecture • Incoming packets are processed by the central packet dispatcher • the dispatcher must query the configuration database to find a honeypot configuration that corresponds to the destination IP address • Honeyd simulates the network stack behavior of a given operating system. We call this the personality of a virtual honeypot

  15. Performance • We analyze Honeyd’s performance on a 1.1 GHz Pentium III over an idle 100 MBit/s network. • Our performance measurements showed that a single 1.1 GHz Pentium III can simulate thousands of virtual honeypots with an aggregate bandwidths of over 30 MBit/s and that it can sustain over two thousand TCP transactions per second .

  16. References • [1] Ofir Arkin and Fyodor Yarochkin. Xprobe v2.0: A “Fuzzy” Approach to Remote Active Operating System Fingerprinting. www.xprobe2.org, August 2002. • [2] Smoot Carl-Mitchell and John S. Quarterman. Using ARP to Implement Transparent Subnet Gateways. RFC 1027, October 1987. • [3] Fred Cohen. The Deception Toolkit. http://all. net/dtk.html, March 1998. Viewed on May 12th, 2004.

  17. Cont. • [4] George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza Basrai, and Peter M. Chen. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation, December 2002. • [5] Kevin Fall. Network Emulation in the VINT/NS Simulator. In Proceedings of the fourth IEEE Symposium on Computers and Communications, July 1999. • [6] Fyodor. Remote OS Detection via TCP/IP Stack Fingerprinting. www.nmap.org/nmap/ nmap-fingerprinting-article.html, October 1998.

  18. Thank You ?

More Related