Honeynet Project

Download Report

Transcript Honeynet Project

Introduction

The Honeynet Project.
Founded 1999, a non-profit (501c3) research organization.


“We raise awareness of the
threats and vulnerabilities
that exist in the Internet”.
Research Alliance.
Security research and raising awareness through
the status reports.
Honeypots

Definition
A honeypot is an information system resource whose
value lies in unauthorized or illicit use of that resource.|
Ex: Login , database entry, file ....

Technology Advantages.
Zero day, no false positives, Ipv6,
capture encrypted activity.

Risks and disadvantages.
Vulnerable to being compromised
and launch attacks to internally or externally.
Limited view of the network.

Critical requirements.

Data control & Data capture.
Low vs. High Interaction



Low interaction is
software based.

Advantages

Minimal risk.

Can prevent an attack.

Disadvantage

Capture limited amount of
information.

High interaction is an
actual operating system
or network.
Advantage

Gathers all possible
information.

Detect Unknown attacks.
Disadvantage

High risk
Virtual Honeynets

VMware and UML.

Advantages.


Less physical space and portable.

Easier to rebuild.
Disadvantages.

More vulnerable to fingerprint.

Higher risk if the host OS is compromised.
Production Environment

How your organization can benefit.
 Detecting Attacks.
 Preventing Attacks.
Stopping a scanning process using sticky honeypot
(La Brea tar pit).



Where does it fit in your security process.
Honeynet and the law.
Visit us www.honeynetproject.ca