160 likes | 222 Views
Explore the world of honeypots with Javier Garcia in this presentation from April 21, 2010. Learn about characteristics, approaches, types, cautions, and real-world examples of using honeypots in cybersecurity defense strategies.
E N D
Honeypots Presented by Javier Garcia April 21, 2010
Outline • Introduction • Characteristics • Approaches • Types • Word of Caution • Examples
Introduction • A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems
Characteristics • Most often a computer • No production value • Any traffic or activity is considered malicious or unathorized • Appealing to attackers • Dummy programs • Fake data
Approaches • Keep intruders occupied or distracted • So they don’t go after important systems • Gather information on intruders • Used to make important systems on the network less vulnerable
Types • Production honeypots • Used by companies or corporations • Research honeypots • Used by volunteer, non-profit research organizations
Types: Production Honeypots • Capture limited information • Placed inside the production network • Low interaction and easier to deploy • Give less information
Types: Research Honeypots • Gathers information on motives and tactics of hacker community • Research threats organizations face • Information is used to protect against threats • More complex than production honeypots • Capture extensive information
Word of Caution • Isolate the honeypot from your production systems • The attacker shouldn’t be able to use the honeypot as a launching point to attack your valuable systems • Also monitor outgoing traffic • The attacker shouldn’t be able to launch an attack on other organizations from the honeypot or send spam • Be careful when setting up monitoring of a honeypot • The attacker shouldn’t realize he or she is accessing a honeypot as opposed to a valuable system
Examples • Project Honeypot - http://www.projecthoneypot.org/ • Used to identify spammers who harvest e-mail addresses from websites • Custom-tagged e-mail addresses are installed on websites • Contain time and IP address of visitor • If any e-mail is received, it is spam
Examples (continued) • Honeyd - http://www.honeyd.org/ • Open source program • Allows user to set up and run multiple virtual hosts on a computer network • The virtual hosts can be configured to mimic different types of servers • There could appear to be many servers and the attacker would need to research to find out which are the real servers
References • SANS Institute http://www.sans.org/security-resources/idfaq/honeypot3.php • Security in Computing pages 468 - 469 • Wikipedia, Honeypot (computing) http://en.wikipedia.org/wiki/Honeypot_(computing)