first Peer Review
Download
Report
Transcript first Peer Review
1. Introduction
Goal of this Presentation:
To give a better understanding of the
overview of our project. Such as:
Researches
Project Plans
Customer Expectations
Business Case
Cost Budget
Unsolved Issues, etc
2.0 Project Assumptions and
Objectives
Project Explanation
Track attacks and log their paths
Create a complete package
Background
1990, first concepts of Honeypot by Clifford Stolls
1997, first toolkit released: Fred Cohen’s Deception
Toolkit
Other releases: CyberCop, Back Officer Friendly and
Honeynet Project
“Know Your Enemy”, publications
2.0 Project Assumptions and
Objectives
Scope
Raytheon allows a great deal of freedom
Add, modify and combine individual
components
Wireless Linksys router
Honeypot software
Logging station
Create automatic script for setup
2.0 Project Assumptions and
Objectives
Major Objectives
Modify wireless Linksys router
Modify honeypot open source
Project
Assumptions
Objectives
Add unique
element
to open and
source
Add logging station
Add authentication capability to router
Separate logging from the honeypot to eliminate the chance
of logging being compromised
Hack our system
Try hack our system and then fix and upgrade features
throughout the process
2.0 Project Assumptions and
Objectives
Expectations
Unique modification to honeypot open source
code
Slow down attacks in real-time to limit their
bandwidth
Provide a quick and easy setup
Annual Quantity
Raytheon may possibly continue this project
in house and sell it as a package to
customters
3.0 Customer Expectations
Wants and Needs of the customer:
The wants and needs of the customer are exactly the
results of the effort that our team puts in.
Not usually the norm, but its Raytheon’s only expectation that
we create a working honeypot that shows off our team’s
imagination and innovation.
Relative importance:
Strong research and development into creating a unique
honeypot (priority 1)
Creating a bundled software and hardware product that reflects
our R & D. (priority 2)
3.0 Customer Expectations
Product Specifications
Technical
Performance
Emulation of all the traffic directed through the router as though it
was traveling through the actual production network.
Quality
Creating a functioning honeypot, that can be used on an
infrastructure network and can effectively log and divert intruders
from the production network.
An effective logging system to monitor which parts of the
production network are being attacked.
Overall Goal
Provide a product that slows down an attacker by creating a
simulated network environment, applicable in real world scenarios,
which can log an attacker’s intentions and paths, with the potential
for collecting materials able to be admissible in a court of law .
3.0 Customer Expectations
Measurable Engineering Characteristics
based on customer expectations
Accuracy of logging software
Assumptions andalgorithm
Objectives
Speed Project
of packet-sniffing
Size of logged information storage
Speed & Accuracy of IDS (Intrusion
Detection System)
Reliability of logged information (Spoofing
detection)
3.0 Customer Expectations
Relationship of product specifications to customer’s
wants and needs:
Difficult to define since the customer in this case is allowing the
product specifications to be their “wants and needs”.
Specifics:
Technical aspect of our product specification is the creation of a
functioning honeypot. (high priority)
The performance of our system should be similar to existing
honeypot and honeynet systems, but different in that ours adds
some innovative and unique designs (which our ad-hoc application
should provide). (medium priority)
The product being created, although not explicitly manufactured for
future retail value, should be a finished product complete with
bundled hardware and software. While this is not a “need” of the
customer, it could potentially be a “want”. (low priority)
4.0 Analysis of Competitive Products
To our knowledge, there are no products that
are similar enough to ours to be considered
competitors. our system is in its own class
because of the features that will be
implemented with it.
4.0 Analysis of Competitive Products
However, we have looked at other products that
have some of our product’s functionalities,
such as:
Symantec Mantrap
monitor intrusions instantly
look and act exactly like full-function servers
Snort
traffic analysis and packet logging on IP networks
5.0 Concept Selection and
Description
Slow down an attack
the honeypot will act as a diversion to provide time to take the
appropriate measures and keep harmful traffic away from the
production network
Simulate a real network environment
create the illusion of a real network so outsiders are none the
wiser
Log incoming and outgoing data
determine vulnerabilities in our own network and prevent
future attacks
Do not interfere with production network
keep honeypot separate to avoid complications with production
network in case the honeypot is compromised
5.0 Concept Selection and
Description
Setup Of A Honeypot:
6.0 Project Plan, Resources,
Schedules
Major Check Points and Deliverables
Setup Network (10/4 - 10/11)
Comprehensive Plan (10/22 - 11/2)
Prototypes Plan (10/12 – 10/27)
Modify Linksys BIOS (10/22 – 11/30)
Configure dedicated machines for specific use
(11/15 – 12/09)
Project Plan Review (01/3 – 01/10)
Prototype Results (01/3 – 01/10)
6.0 Project Plan, Resources,
Schedules
Major Check Points and Deliverables (con.)
Stimulate Real World Attacks (01/5 – 02/16)
Code integration and test/build (02/07 – 02/14)
Modification to system (02/07 – 02/14)
Final Packaging and Documentation (02/23 – 03/29)
6.0 Project Plan, Resources,
Schedules
Responsibilities for each member
We are at the point that we feel it’s better to
work as a team
More specific tasks will be assigned later in the
project to pairs of members as needed.
7.0 Business Case
With industrial espionage and particularly, computer
based industrial espionage on the rise, companies are
all going many steps further to protect their
information. The most commonly seen threat to a
company’s computer network is something as simple
as a virus or worm. While these scripts do cause
slow downs in production and monetary loss, another
threat that is not as often thought about is theft of
intellectual property. The wireless honeypot
appliance is part of a solution to curb the efforts of
outsiders wanting to gain access to our corporate
network, be it for malicious or theft reasons.
7.0 Business Case
Assumptions:
Internal use only – Not for sale
Still has (positive) financial impact by
preventing unauthorized information from
being “stolen” from Raytheon.
Estimated Product Cost:
$20,000.00 in R&D
Approximately $100.00 to replicate
All software either developed in-house or
under the GPL license
Support Costs:
Low support costs
“Setup and Go”
Costs may increase if threat is found as a
matter of protection
Return on Investment
As stated before, no actual dollar amount
can be assigned to the value of this
project, however the liability that
Raytheon employees assume will be
greatly decreased.
8. Issues
list of areas in the design that are not too
well understood
• parts, components, subsystem sourcing for
prototypes
• prototype testing
•
List of areas in the design that are
not too well understood
- Flashing the BIOS of the linksys router.
- General knowledge of hacking to simulate an
attack on the honeypot
- Adding to the kernel of a linux operating
system
- Using IDS and logging tools to record
information from attacks
- An understanding of networking in general
(packets, ports, protocols, etc)
- Legal Issues regarding honeypots
Parts, Components, Subsystem
sourcing for prototypes
- Linkysys Wireless Router with Speedbooster
WRT54GS (Speedbooster model provides double
flash memory)
- 3 Computers
1-Running Honeypot "Usermode Linux, Honeyd"
2-Running Snort "Logs Activity from Router",
3-Running System logger "Logs activity in honeypot“
A wireless network to implement our honeypot
system
Other Computers to simulate attacks on the
honeypot
Prototype testing
Evolutionary Prototyping
Build a bicycle first, then build a car
Start with barebone honeypot system
Test
Implement additions one by one from a list of
prioritized features
Repeat until features or time run out