ppt - UCF Computer Science
Download
Report
Transcript ppt - UCF Computer Science
Honeypot, Botnet, Security
Measurement, Email Spam
Cliff C. Zou
CDA6938
02/01/07
1
What Is a Honeypot?
“A honeypot is a faked
vulnerable system used for
the purpose of being
attacked, probed, exploited
and compromised.”
2
Example of a Simple Honeypot
Install vulnerable OS and software on a
machine
Install monitor or IDS software
Connect to the Internet (with global IP)
Wait & monitor being scanned, attacked,
compromised
Finish analysis, clean the machine
3
Benefit of Deploying Honeypots
Risk mitigation:
IDS-like functionality:
A deployed honeypot may lure an attacker away from
the real production systems (“easy target“).
Since no legitimate traffic should take place to or from
the honeypot, any traffic appearing is evil and can
initiate further actions.
Attack analysis:
Binary code analysis of captured attack codes
Spying attacker’s ongoing actions
Find out reasons, and strategies why and how you are
attacked.
4
Honeypot Classification
High-interaction honeypots
A full and working OS is provided for being attacked
VMware virtual environment
Low-interaction honeypots
Only emulate specific network services
No real interaction or OS
Several VMware virtual hosts in one physical machine
Honeyd
Honeynet/honeyfarm
A network of honeypots
5
Low-Interaction Honeypots
Pros:
Easy to install (simple program)
No risk (no vulnerable software to be attacked)
One machine supports hundreds of honeypots
Cons:
No real interaction to be captured
Limited logging/monitor function
Easily detectable by attackers
6
High-Interaction Honeypots
Pros:
Real OS, capture all attack traffic/actions
Can discover unknown attacks/vulnerabilities
Cons:
Time-consuming to build/maintain/analysis
Risk of being used as stepping stone
Must have a firewall blocking all outgoing traffic
High computer resource requirement
7
Honeynet
A network of honeypots
High-interaction honeynet
Low-interaction honeynet
A distributed network composing many honeypots
Emulate a virtual network in one physical machine
Example: honeyd
Mixed honeynet
“Scalability, Fidelity and Containment in the
Potemkin Virtual Honeyfarm”, presented next
week
Reference: http://www.ccc.de/congress/2004/fahrplan/files/135honeypot-forensics-slides.ppt
8
What Is a Botnet?
A network of compromised computers controlled
by their attacker
Users on zombie machines do not know
Most home computers with broadband
The main source for many attacks now
Distributed Denial-of-Service (DDoS)
Extortion
Email spam, phishing
Ad-fraud
User information: document, keylogger, …
9
How to Build a Botnet?
Infect machines via:
Internet worms, viruses
Email virus
Backdoor left by previous malware
Trojan programs hidden in free download
software, games
…
Bots phone back to receive command
10
Botnet Architecture
Bot controller
Usually using IRC server (Internet relay chat)
Dozen of controllers for robustness
attacker
bot
controller
bot
controller
bot
bot
bot
11
Botnet Monitoring
Hijack one of the bot controller
DNS provider redirects domain name to the
monitor
Still cannot cut off a botnet (dozen of controller)
Can obtain most/all bots IP addresses
Let honeypots join in a botnet
Can monitor all communications
No complete picture of a botnet
12
Security Measurement
Monitor network traffic
to understand/track
Internet attack
activities
Monitor incoming
traffic to unused IP
space
Internet
Monitored
traffic
Local network
Unused
IP space
TCP connection requests
UDP packets
13
Refining Monitoring
TCP/SYN not enough (IP, port only)
Distinguish different attacks
Low-interaction honeypots (honeyd)
Obtain the first attack payload by replying SYN/ACK
Used by the “Internet Motion Sensor” in U. Michigan
Paper presented next…
High-interaction honeypots
14
Remote fingerprinting
Actively probe remote hosts to identify
remote hosts’ OS, physical devices, etc
OSes service responses are different
Hardware responses are different
Purposes:
Understand Internet computers
Remove DHCP issue in monitored data
Paper presented later
15
Data Sharing:
Traffic Anonymization
Sharing monitored network traffic is important
Privacy and security exposure in data sharing
Collaborative attack detection
Academic research
Packet header: IP address, service port exposure
Packet content: more serious
Data anonymization
Change packet header: preserve IP prefix, and …
Change packet content
16
Why So Many Email Spam?
No authentication/authorization in email
Receive unsolicited email by design
Sending fake email is so easy
Shown in next slide
Profit:
Takes a dime to send out millions email spam
A few effective spam give back good profit
No penalty in spam (law, out-of-country spam)
17
Sample fake email sending
Telnet longwood.cs.ucf.edu 25
S: 220 longwood.cs.ucf.edu ESMTP Sendmail 8.13.8/8.13.8; …
C: HELO fake.domain
S: 250 Hello crepes.fr, pleased to meet you
C: MAIL FROM: [email protected]
S: 250 [email protected]... Sender ok
C: RCPT TO: [email protected]
S: 250 [email protected] ... Recipient ok
C: DATA
S: 354 Enter mail, end with "." on a line by itself
C: subject: who am I?
C: Do you like ketchup?
C: .
S: 250 Message accepted for delivery
C: QUIT
S: 221 longwood.cs.ucf.edu closing connection
18
Current Major Spam Defense
Signature-based filtering
Blacklisting-based filtering
Spamassasin, etc: based on keywords, rules on header…
DNS black list, dynamically updated (Spamhaus)
Sender authentication
Caller ID (Microsoft) http://en.wikipedia.org/wiki/Caller_ID
Sender Policy Framework (SPF) http://www.openspf.org/
19