Honeypots as a Security Honeypots as a Security Mechanism - - PowerPoint PPT Presentation

honeypots as a security honeypots as a security mechanism
SMART_READER_LITE
LIVE PREVIEW

Honeypots as a Security Honeypots as a Security Mechanism - - PowerPoint PPT Presentation

Monitoring, Attack Detection and Mitigation Monitoring, Attack Detection and Mitigation MonAM 2006 MonAM 2006 Honeypots as a Security Honeypots as a Security Mechanism Mechanism Presenter: merson Virti Authors: merson Virti, Liane


slide-1
SLIDE 1

Honeypots as a Security Mechanism Honeypots as a Security Mechanism

Presenter: Émerson Virti Authors: Émerson Virti, Liane Tarouco, João Ceron, Leandro Bertholdo, Lisandro Granville

Monitoring, Attack Detection and Mitigation MonAM 2006 Monitoring, Attack Detection and Mitigation MonAM 2006

slide-2
SLIDE 2

MonAM – September - 2006 Honeypots as a Security Mechanism

Index Index

  • 1. Honeypots
  • 1. Honeypots
  • 2. Principle of the Proximity
  • 2. Principle of the Proximity
  • 3. Experiment
  • 3. Experiment
  • 4. Conclusion
  • 4. Conclusion
slide-3
SLIDE 3

MonAM – September - 2006 Honeypots as a Security Mechanism

Honeypot Concept Honeypot Concept

  • Experiment of Lancer Sptizner
  • 1999
  • RedHat 5.1
  • Concept:

A network resource whose function is to be attacked and compromised. Sptizner

slide-4
SLIDE 4

MonAM – September - 2006 Honeypots as a Security Mechanism

IPS

Honeypots

IDS

Sniffers DarkNet

Security Mechanisms

Cooperation for Security Cooperation for Security

slide-5
SLIDE 5

MonAM – September - 2006 Honeypots as a Security Mechanism

Importance of the Honeypot Importance of the Honeypot

Prevention Prevention Detection Detection Reaction Reaction Prevention to the same attack already destined to

  • ne

honeypot All traffic destined to

  • ne

honeypot is malicious Depends on the institution security politics

slide-6
SLIDE 6

MonAM – September - 2006 Honeypots as a Security Mechanism

Honeyd Software Honeyd Software

slide-7
SLIDE 7

MonAM – September - 2006 Honeypots as a Security Mechanism

Principle of the Proximity Principle of the Proximity

The majority of malwares tries to attack targets next to its addressing space.

“New Fields of Application for Honeypots” – Thorsten Holz

slide-8
SLIDE 8

MonAM – September - 2006 Honeypots as a Security Mechanism

Experiment Experiment

Used blocks IPV4: Academic /17 Academic /18 Comercial /18 Cable Modem /20

69.632 emulated computers

slide-9
SLIDE 9

MonAM – September - 2006 Honeypots as a Security Mechanism

Experiment - Results Experiment - Results

Traffic – bit/s

slide-10
SLIDE 10

MonAM – September - 2006 Honeypots as a Security Mechanism

Experiment - Results Experiment - Results

Traffic – package/s

slide-11
SLIDE 11

MonAM – September - 2006 Honeypots as a Security Mechanism

Experiment - Results Experiment - Results

Statistics

Address Space X Number of Access Access Per day Access per IP per day Acces per IP per min Academic /18 32.145.835 1977,48 2,75 Comercial /18 3.838.989 236,16 0,38 Academic /17 3.941.556 121,23 0,17 Cable Modem /20 5.172.852 1272,85 1,76

slide-12
SLIDE 12

MonAM – September - 2006 Honeypots as a Security Mechanism

Experiment - Results Experiment - Results

Attack Origin – IP source nationality

2%

98%

50% Honeypot Brazilian Block Honeypot before CIDR Block 2%

98%

Honeypot Brazilian Block Honeypot before CIDR Block 2%

98%

Honeypot Brazilian Block Honeypot before CIDR Block 2%

98%

Honeypot Brazilian Block Honeypot before CIDR Block 50%

slide-13
SLIDE 13

Experiment - Results Experiment - Results

slide-14
SLIDE 14

MonAM – September - 2006 Honeypots as a Security Mechanism

Conclusion Conclusion

  • Prevention, Detection and Reaction
  • Principle of Proximity
  • Honeypots as a security mechanism
slide-15
SLIDE 15

MonAM – September - 2006 Honeypots as a Security Mechanism

References References

  • T. Holz, "New Fields of Application for Honeynets" Diploma

Thesis, Department for Computer Science of Aachen University, Germany, 2005

  • L. Spitzner, Honeypots: Tracking Hackers. Addison-

Wesley, 2003. [Online]. http://www.tracking-hackers.com/book/

  • B. Schneier. "Secrets and lies: digital security in a

networked world", Willey & Sons , 2000.

slide-16
SLIDE 16

MonAM – September - 2006 Honeypots as a Security Mechanism

Questions? Questions?

Émerson Virti emerson@tche.br Federal University of Rio Grande do Sul – Brazil - UFRGS