honeypots presentation

12
Honeypots and Network Security Research by: Christopher MacLellan Project Mentor: Jim Ward EPSCoR and Honors Program

Upload: hayumbe08

Post on 13-Feb-2016

9 views

Category:

Documents


0 download

DESCRIPTION

teyhg

TRANSCRIPT

Page 1: Honeypots Presentation

Honeypots and Network Security

Research by: Christopher MacLellanProject Mentor: Jim Ward

EPSCoR and Honors Program

Page 2: Honeypots Presentation

Honeypot? What is it?

Name originates from pots of honey used to trap unsuspecting wasps.

This same concept can be applied to computers to catch unsuspecting malicious computer users.

Page 3: Honeypots Presentation

Honeypot? What is it? (cont.)

Honeypot Components

Fake computer system (virtual or physical)

No legitimate production usage or traffic

Looks like a tantalizing production system

Logging and alert mechanisms in place

Page 4: Honeypots Presentation

Physical vs. Virtual Honeypots

• Physical Honeypots are actual (physical) computers that are set up with additional logging and security mechanisms.

• Virtual Honeypots are a software package that allows you to fake numerous computer distributions at various places over the network from one computer.

Page 5: Honeypots Presentation

Hybrid System

• This is the system I recommend. It uses virtual Honeypots to direct traffic to the physical Honeypots.

Page 6: Honeypots Presentation

Honeypot Implementations

Commercial Honeypots Cost Money Easy to use but not easy to modify

Open Source Honeypots Free Difficult to use Poor documentation

Page 7: Honeypots Presentation

Research Objectives

Configure and run an open source honeypot (honeyd).

Build a live linux cd containing this already configured open source honeypot.

Analyze the cost and security benefits of this implementation.

Page 8: Honeypots Presentation

Honeyd Honeypot

Was able to configure and run a honeyd honeypot.

Discovered issues with honeyd that optimally would need to be fixed. New scanner signature methods allows

malicious users to detect the honeypot.

Page 9: Honeypots Presentation

KNOPPIX live CD

Used the KNOPPIX live CD framework to build a custom live CD.

Was able to get this working and deploy honeyd on computers with CD drive in under 5 minutes.

Page 10: Honeypots Presentation

Cost and Security Benefits

Benefits

Cost

Easy and versatile to deploy

Read-only makes reseting safe and easy

Make a mistake? Simply reboot.

Page 11: Honeypots Presentation

Conclusions

The implementation I created addressed the problems with open source Honeypots.

Honeyd needs some improvements to make this system as complete and functional as it could be.

Moving Honeypot technology to easy to deploy read-only mediums is the best implementation.

Page 12: Honeypots Presentation

Thank you

Thanks to the Wyoming EPSCoR program for the funding to work on this project.

Thanks to the UW Honors Program for all their support and guidance.

Thanks to Jim Ward being my project mentor.