honeynets and honeypots: companion technology for ... · overview • some definitions • types...

41
Honeynets and Honeypots: Companion Technology for Detection and Response Cristine Hoepers [email protected] NIC BR Security Office – NBSO Brazilian Computer Emergency Response Team http://www.nbso.nic.br/ Honeynet.BR & Brazilian Honeypots Alliance http://www.honeynet.org.br/ AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.1/41

Upload: others

Post on 10-Aug-2020

1 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Honeynets and Honeypots:Companion Technology for Detection

and Response

Cristine [email protected]

NIC BR Security Office – NBSOBrazilian Computer Emergency Response Team

http://www.nbso.nic.br/

Honeynet.BR & Brazilian Honeypots Alliancehttp://www.honeynet.org.br/

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.1/41

Page 2: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Overview

• Some definitions

• Types of Honeypots

– differences– possible uses

• Types of data gathered

– in a Honeynet– in a network of distributed honeypots

• Additional Information

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.2/41

Page 3: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Honeypot Definition

“A honeypot is a security resource whosevalue lies in being probed, attacked orcompromised.”

Lance Spitzner,Honeypots: Tracking Hackers.

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.3/41

Page 4: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Advantages

• There is no “normal” traffic. Everything issuspicious and potentially malicious.

• Less data to analyse than in IDS systems

• Can provide valuable information aboutattackers

• Can capture new types of malware

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.4/41

Page 5: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Disadvantages

• There are potential risks for your network(depending on the type)

• Can be time consuming to maintain

• Narrow view – sees only what is directed to it

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.5/41

Page 6: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

What honeypots aren’t

• Honeypots are not replacements for:

– security best practices

– security policies

– firewalls

– IDS

– patch management

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.6/41

Page 7: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Types of Honeypots

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.7/41

Page 8: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Low-interaction Honeypots

• Easy to install and maintain

• Low risk

• Limited information gathering

• Examples:

– listeners, service emulators, honeyd, TinyHoneypot.

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.8/41

Page 9: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Low-Interaction Honeypots (cont.)

• Emulate some parts of services and systems

• The attacker does not have access to the realoperating system

• The attacker can’t compromise the honeypot(in theory)

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.9/41

Page 10: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

High-interaction Honeypots

• More difficult to install and maintain

• High risk

• Need containment mechanisms

• Extensive information gathering

• Example:

– honeynets, virtual honeynets

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.10/41

Page 11: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Honeynet Definition (1)

“A Honeynet is nothing more than onetype of honeypot. Specifically, it is a highinteraction honeypot designed primarily forresearch, to gather information on theenemy. [...] A Honeynet is different fromtraditional honeypots, it is what we wouldcategorize as a research honeypot.”

Lance Spitzner,Know Your Enemy: Honeynets

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.11/41

Page 12: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Honeynet Definition (2)

“A honeynet is a research tool consistingof a network specifically designed for thepurpose of being compromised, withcontrol mechanisms that prevent thisnetwork from being used as a base forlaunching attacks against other networks.”

Cristine Hoepers, Klaus Steding-Jessen, Antonio Montes,Honeynets Applied to the CSIRT Scenario

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.12/41

Page 13: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Honeynets Characteristics

• A network of multiple systems andapplications

• Robust containment mechanism

– may have multiple layers of control

– sometimes called “honeywall”

• Data capture and alerting mechanisms

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.13/41

Page 14: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Honeynet Requirements

• No data pollution (i.e. no test or trafficgenerated by non-blackhats)

• Data control

• Data capture

• Data collection

• Alerting mechanism

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.14/41

Page 15: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Risks

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.15/41

Page 16: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Low-Interaction Honeypots Risks

• Compromise of the real operating systemrunning the honeypot

• The honeypot software may havevulnerabilities

• Attract attackers to your network

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.16/41

Page 17: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Honeynets Risks

• A mistake in containment or configuration can

– permit your honeynet to be used to harmother networks

– open a port to your organization’s network

• A compromise associated with yourorganization can affect its image

• Your honeynet being identified

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.17/41

Page 18: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Honeynets Risks (cont.)

Why they are so risky:

• Level of interaction – the attacker has fullcontrol of the machine

• Complex to deploy and maintain

– variety of technologies working together

– multiple points of failure

• New attacks and unexpected threats may notbe contained or seen

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.18/41

Page 19: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Possible Uses

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.19/41

Page 20: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Possible Uses

• Detect automated probes and attacks

• Capture tools, new worms, etc

• Identify insider’s attacks (internal honeypots,honeytokens)

• Compare with IDS and Firewall logs

• Raise awareness

• Identify infected/compromised machines

– use the data to generate reports

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.20/41

Page 21: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

When to Use

Low-Interaction Honeypots

• There is insufficient hardware to set up ahoneynet

• The risk of another type of honeypot is notacceptable

• The purpose is:

– identify scans and automated attacks– fool script kiddies– distract attackers from important systems– collect attack signatures and trends

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.21/41

Page 22: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

When to Use (cont.)

High-Interaction Honeypots

• The purpose is to observe the intrudersactivities and behavior:

– observe a real compromise– IRC conversations

• Need material for research and training in:

– artifact analysis– forensic analysis

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.22/41

Page 23: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Low x High-Interaction Honeypots

Low-Interaction High-Interaction

Installation Easy More difficult

Maintenance Easy Time consuming

Risk Low High

Need Control No Yes

Data gathering Limited Extensive

Interaction Emulated services Full control

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.23/41

Page 24: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Some Results

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.24/41

Page 25: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered

Show some types of data gathered:

• In a Honeynet of the Honeynet.BR Projecthttp://www.honeynet.org.br/

• In a Network of Distributed Honeypotshttp://www.honeypots-alliance.org.br/

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.25/41

Page 26: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeynets

Honeynet.BR Topology

Honeypot 1

IDSHub

Honeypot 2

INTERNET

Honeypot n

Administrative Network

Router

Honeynet

FirewallHogwash

. . .

Switch

Forensics

����

���

����

���

����

����

���

��

� � � � � � � � �� � � � � � � � � � �� � � �

� � � �

� � � � � � � � � � �� � �

� � �

� �� �

��

� � � � � � � � �� � � � � � � � � � �� � � �

� � � �� � � �

� � � �� � � �

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.26/41

Page 27: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeynets (cont.)

• Network traces of successful attacks

– update IDS signatures

– understand attacks

• Profile of intruders

– modus operandi

– IRC conversations, motives

– possible origin

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.27/41

Page 28: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeynets (cont.)

• Rootkits, exploits, etc

– Used to update the chkrootkit tool

http://www.chkrootkit.org/

• New worms

– Scan of the Month Challenge 25 – Analyze a worm

recovered by a Honeynet.

http://www.honeynet.org/scans/scan25/

– Propagation of "Slapper" OpenSSL/Apache Worm

Variants

http://xforce.iss.net/xforce/alerts/id/advise134

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.28/41

Page 29: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots

Brazilian Honeypots Alliance

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.29/41

Page 30: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

• Low-interaction honeypots distributed overmulitple networks

• Configuration of each honeypot:

– OpenBSD– Honeyd– listeners

• Data collection in 2 central points:

– NBSO/Brazilian CERT– CenPRA Research Center

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.30/41

Page 31: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

• Malware and spybot samples collected usinglisteners

– mydoom– kuang– subseven

• All traffic is logged (not only “SYN” packets)

– able to see signatures of attacks, scansand worms

– reduce false positives

• Observe the “noise” of malware activity

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.31/41

Page 32: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

• Sanitized data is being used by NBSO to:

– notify Brazilian networks involved inmalicious activity

– donate data to other CSIRTs interested innotifying their constituents

• Virus and malware are being sent to some AVvendors

The following graphics are based on reports sentby NBSO to Brazilian Networks, in the firstquarter of 2004.

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.32/41

Page 33: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

0

50

100

150

200

250

10/Jan 24/Jan 07/Feb 21/Feb 06/Mar 20/Mar

Rep

orts

(cu

mul

ativ

e)

2004

DCOM RPC (Blaster)

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.33/41

Page 34: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

0

20

40

60

80

100

10/Jan 24/Jan 07/Feb 21/Feb 06/Mar 20/Mar

Rep

orts

(cu

mul

ativ

e)

2004

Kuang (17300/TCP)

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.34/41

Page 35: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

0

500

1000

1500

2000

2500

3000

3500

4000

07/Feb 14/Feb 21/Feb 28/Feb 06/Mar 13/Mar 20/Mar 27/Mar

Rep

orts

(cu

mul

ativ

e)

2004

Code Red

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.35/41

Page 36: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

0

50

100

150

200

250

300

350

400

450

10/Jan 24/Jan 07/Feb 21/Feb 06/Mar 20/Mar

Rep

orts

(cu

mul

ativ

e)

2004

openproxy scans

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.36/41

Page 37: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

0

500

1000

1500

2000

2500

3000

3500

4000

06/Mar 13/Mar 20/Mar 27/Mar

Rep

orts

(cu

mul

ativ

e)

2004

Dameware (6129/TCP)Mydoom

Possible Agobot/Phatbot side effect

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.37/41

Page 38: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

1K

10K

100K

1M

10M

Windowsunknown

LinuxNetApp

SolarisOpenBSD

NMAPFreeBSD

CiscoNovell

SY

N p

acke

ts r

ecei

ved

(log

scal

e)

Src Operating Systems

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.38/41

Page 39: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Data Gathered by Honeypots (cont.)

0

50000

100000

150000

200000

250000

300000

350000

US CN JP KR CA BR FR DE TW UK

Uni

que

src

IPs

Src IPs Origin

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.39/41

Page 40: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Additional Information

• Honeynet.BR Projecthttp://www.honeynet.org.br/

• Brazilian Honeypots Alliancehttp://www.honeypots-alliance.org.br/

• The Honeynet Projecthttp://www.honeynet.org/

• Honeynet Research Alliancehttp://www.honeynet.org/alliance/

• Honeypots: Tracking Hackershttp://www.tracking-hackers.com/book/

• Know Your Enemy, 2nd Editionhttp://www.honeynet.org/book/

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.40/41

Page 41: Honeynets and Honeypots: Companion Technology for ... · Overview • Some definitions • Types of Honeypots – differences – possible uses • Types of data gathered – in

Additional Information

• Honeydhttp://www.honeyd.org/

• Honeyd: A Virtual Honeypot Daemon (Extended

Abstract)http://www.citi.umich.edu/u/provos/papers/honeyd-eabstract.pdf

• Honeynets Applied to the CSIRT Scenariohttp://www.honeynet.org.br/papers/hnbr-first2003.pdf

• Honeynet Challengeshttp://www.honeynet.org/misc/chall.html

• SecurityFocus Honeypots Mailinglisthttp://www.securityfocus.com/archive/

AusCERT2004 Conference, Technical Stream – May 24, 2004 – p.41/41