Characterization of Attackers* Activities in Honeypot Traffic Using

Download Report

Transcript Characterization of Attackers* Activities in Honeypot Traffic Using

Using Honeypots to Improve Network
Security
Dr. Saleh Ibrahim Almotairi
Research and Development Centre
National Information Centre - Ministry of Interior
Dec 21, 2009
Content








Introduction
Defence-in-Depth Protection Strategy
Network Monitoring Methods
Honeypots
Honeypot Technologies
Existing Honeypot Soultions
Honeypot Deployment Challenges
Conclusion
2
Introduction
 Number of attacks and number of
new vulnerabilities are on the rise:
 increased financial/other incentives
 high prevalence of exploitable
vulnerabilities
 availability of vulnerability information
and attack tools
 Lack/long delay of patches from vendors
3
Introduction
 Source of vulnerabilities can be
attributed to many factors:
 the design of the protocols and services
themselves
 the flawed implementation of these
protocols and services
 To counter this advance in threats:
 security managers need to implement
multiple layers of security defence
4
Defence-in-Depth Protection
Strategy








Awareness
Policy
Patching
Firewalls
Anti-virus
Encryption
Intrusion Detection Systems
Monitoring
5
Network Monitoring Methods
 Two methods of monitoring network
traffic for malicious activities are
commonly used:
 live network monitoring such as
firewalls, network intrusion detection
systems, and NetFlow
 unsolicited traffic monitoring, such as
darknets and honeypots.
6
Firewalls
 Comprises software and hardware
that protects one network from
another network
 Make decisions at layer 3 (IP address)
and layer 4 (port) and might
incorporate IPS functionality, layer 7
 Can not see local traffic and are
vulnerable to mis-configuration
7
Intrusion Detection System
(IDS)
 An IDS is a security system that monitors
computer systems and network traffic for
attacks and anomalous activity
 Intrusion prevention system (IPS) is an
access control device, like a firewall
 IDSs are classified based on the
information source into:
 network-based
 host-based
8
Intrusion Detection System
(IDS)
 IDSs can be classified further based
on their detection methodologies
into:
 Anomaly based IDSs, which measure any
deviation from normality and raise
alarms whenever the predefined
threshold level is exceeded
 Signature based IDSs, which rely on a
knowledge base of predefined patterns of
attack or signatures
9
Anomaly detection
 Mainly based on statistical techniques
 The basic concept of the statistical
technique, in detecting anomalies, is:
 to build a profile of normal behaviours
 measure large deviations from the profile
 test them against a predefined threshold
value
 anomalous behaviours are flagged when
these deviations exceed the threshold
10
Network-based IDSs (NIDS)
 detect attacks by analysing network
packets
 do not interfere with the normal
operation of a network
 easy to deploy and manage
 operating systems independent
 are not able to analyse encrypted traffic
 are not able to cope with high traffic in
large or busy networks
11
Host-based IDSs (HIDS):
 are installed locally on host machines
 operate on information collected from
within the host system being protected
 Are more accurate
 generate fewer false positives alarms
 handle encryption
 Are harder to manage
 Are operating system dependent
 affect the performance of the host system
12
Honeypots
 First use of Honeypot concept:
 Cliff Stoll in his book “The Cuckoo's Egg” in 1986
 Bill Cheswick in his paper “An Evening with Berferd:
In Which a Cracker is Lured” in 1990
 The term Honeypot was first introduced by
Lance Spitzner in 1999
 Honeypot definition:
 a honeypot as a security resource whose value lies in
being probed, attacked, or compromised (Spitzner)
 a closely monitored computing resource that we want
to be probed, attacked, or compromised (Provos)
13
Honeypot..
 These definitions of a honeypot implies that:
 it can be of any computer resource type, such as a
firewall, a web server, or even an entire site
 it runs no real production services any contact with it
is considered potentially malicious
 traffic sent to or from a honeypot is considered either
an attack or a result of the honeypot being
compromised
14
Honeypots….
 An example of a virtual
honeypot setup that
emulates two operating
systems:


Windows Server with
open ports TCP: 80,445
UDP:37
Unix Server with open
ports,
TCP: 21, 25, 80
Host Machine
Virtual Honeypots
Internet
xx.xx.xx.02
TCP 80
TCP 445
UDP 137
Windows
Linux
xx.xx.xx.01
xx.xx.xx.03
TCP 21
TCP 25
TCP 80
Honeypot
Router
Traffic Logger
15
Honeypots….
 Notable features of honeypots include:
 collect small volumes of higher value traffic
 are capable of observing previously
unknown attacks
 detect and capture all attackers’ activities
including encrypted traffic and commands,
and
 require minimal resources
16
Honeypots Technologies
 Divided based on their level of interactions
into:
 low, response only to connections
 medium, are connected to scripts to emulate basic
protocol behaviors
 high, run real operating systems with real services
 Divided based on their intended use into:
 production honeypots (Honeynets)
 research honeypots (Leurre.com)
17
Honeypots Technologies..
 Divided based on their hardware deployment
into:
 physical honeypots (Honeynets)
 virtual honeypots (Argos)
 Divided based on their attack role into:
 server side honeypots ( Honeyd)
 client side honeypots (HoneyMonkey)
18
Some of the Existing Honeypot
Solutions
 Automatic generation of IDS
signature:
 Honeycomb
 Worm detection systems
 Honeystat
 SweetBait
 Malware Collection:
 Nepenthes
 Honeytrap
 IBM Billy Goat
19
Honeypot Deployment Challenges
 Approaches for analysing data collected
from honeypots are presently immature
 Current analysis techniques are manual
and focus mainly on identifying existing
attacks
 Honeypots will introduce medium to
high level risk to networks
 Requires continuous monitoring
20
Conclusion
 Honeypots are essential tools for
gathering useful information on a
variety of malicious activities
 Analysis of anomalous activities in
honeypot traffic present a good
research area
 deploying honeypots would improve
security of networks through:
 providing less and clean traffic data that
are not mixed with real production traffic
21
Conclusion...
 provide an early alerts of newly and
unseen attacks
 enable organizations to conduct forensics
investigations of incidents without the
need of stoping production networks
 Our ongoing research focuses on
utilizing honeypots in improving the
security of web servers, which are the
most attacked targets
22
Thank You
Questions?
23