60 likes | 237 Views
2004-2005 University of Florida Integrate Product and Process Design (IPPD) Program on Wireless Honeypots. Randall Brooks, CISSP, ISSEP Randall_S_Brooks@raytheon.com Matt Rixon Matthew_C_Rixon@raytheon.com September 17, 2004. Introduction. Purpose
E N D
2004-2005 University of Florida Integrate Product and Process Design (IPPD) Program on Wireless Honeypots Randall Brooks, CISSP, ISSEP Randall_S_Brooks@raytheon.com Matt Rixon Matthew_C_Rixon@raytheon.com September 17, 2004
Introduction • Purpose • This presentation will serve as a list of possible activities for research on wireless honeypots. • Target Audience • This presentation is targeted to technical forums and the IPPD team.
Raytheon Contacts • Randall Brooks • 727-302-4103 (office) • Randall_S_Brooks@raytheon.com • Matt Rixon • 727-302-2233 (office) • Matthew_C_Rixon@raytheon.com • Dr. Al Nauda • 727-302-4708 (office) • 727-302-4801 (fax) • Al_Nauda@raytheon.com • Jon Goding • 727-302-3488 (office) • 727-698-0702 (mobile) • Jon_D_Goding@raytheon.com
Wireless Honeypots • Create and setup your own wireless honeypot • What modifications did you do? Did you write any special software? • How could this be used to “slow down” an attack? • What did you see? • What scenarios could this apply to? • How could this apply to the use of autonomous drones in the military? • Legal Issues • Are banners enough? • Can you prosecute the attacker? Is the data obtained admissible in court? • How could an attacker refute the evidence? • How would you feel if you were being prosecuted with evidence collected from a wireless honeypot?
Expectations • Weekly telecons to discuss progress and issues • can be more frequent if necessary • Wed 9 a.m. • Requirements documentation • Architecture documentation • Schedule and cost reports • Data package delivery (software) • Final visit and presentation at the end of the project to be conducted here at Raytheon • The creation of at least 1 working wireless honeypot that differs than one that can be downloaded from the Internet. • Report on legal issues
Wireless Honeypot References • “Wireless Honeypot Trickery” by Laurent Oudot http://www.securityfocus.com/infocus/1761 • Honeyd Project http://honeyd.org/ • “Use a Honeypot, Go to Prison?” By Kevin Poulsen http://www.securityfocus.com/news/4004 • “Honeypots: Are They Legal?” by Lance Spitzner http://www.securityfocus.com/infocus/1703 • http://labrea.sourceforge.net/labrea-info.html