Preview

Honeypots

Satisfactory Essays
Open Document
Open Document
702 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Honeypots
A short introduction to honeypots
Εμμανουήλ Βασιλομανωλάκης
Υποψήφιος Διδάκτωρ Telecooperation Group, Technische Universität Darmstadt Center for Advanced Security Research Darmstadt (CASED) Συνεργάτης Εργ. Δικτύων ISLAB, ΙΠΤ, ΔΗΜΟΚΡΙΤΟΣ manolis@cased.de

Outline

 Introduction  Classifications  Deployment Architectures  Open source vs. nothing  2 Honeypots  SURFcert IDS & experiences from Demokritos  Future work - ideas
4/21/2013 Telecooperation Group | CASED

Introduction
 Definition: “A security resource who's value lies in being probed, attacked or compromised”  Doesn’t have to be a system: Honeytokens  We want to get compromised!  Certainly not a standalone security mechanism.  Why? • FUN! • No false-positives! • Research: Malware analysis/reverse engineering • Reducing available attack surface/early warning system
4/21/2013 Telecooperation Group | CASED

Honeypot Classifications
 Low interaction: simulate network operations (usually at the tcp/ip stack)  [Medium interaction: simulate network operations (with more “sophisticated” ways)]  High interaction: real systems (e.g., VMs)  Other classifications: • Purpose: Generic, Malware collectors, SSH, etc. • Production – Research (not really useful)
4/21/2013 Telecooperation Group | CASED

Honeypot Deployment Architectures

4/21/2013

Telecooperation Group | CASED

Open Source vs. nothing (really!)
Honeypot Honeyd Nepenthes Dionaea Honeytrap LaBrea Tiny HP HoneyBot Google Hack HP Multipot Glastopf Kojoney Kippo Amun Omnirova BillyGoat Artemisa GHOST
4/21/2013

Type Generic Malware Malware Generic Generic Generic Malware WEB Malware WEB SSH SSH Malware Malware Malware VOIP USB

OS LINUX LINUX LINUX LINUX LINUX LINUX WINDOWS WINDOWS LINUX LINUX LINUX WINDOWS WINDOWS

Language C C PYTHON C C PERL PHP VB 6 PYTHON PYTHON PYTHON PYTHON Borland Delphi ? PYTHON C

GUI N N N N N N Y Y Y Y N N N Y ? N Y

License GNU GNU GNU GNU GNU GNU CLOSED GNU GNU GNU GNU BSD GNU

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    Honey pot is a closely monitored decoy system. It traces the network attacks. It can distract from more valuable targets and gather forensic evidence from the attackers and their techniques.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Powerful Essays

    References: Sarrel, M. (2003, December 30). Network Security: Know Your Weaknesses | Roundup | PCMag.com . Technology Product Reviews, News, Prices & Downloads | PCMag.com | PC Magazine. Retrieved January 30, 2013, from http://www.pcmag.com/article2/0,2817,140…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Investigative Programs, Cyber Investigations: Operation "Web Snare". (2005). Federal Bureau of Investigation Website. Retrieved November 12, 2005 from, www.fbi.gov/cyberinvest/websmare.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Delmonico, D., ‘‘Detect Network Intruders Before They Wreak Havoc, ' ' InternetWeek, Oct 5, 1998, pp. 38.…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Schrodel, David (2003, December 01). Network Configuration Management. Computer Technology Review, (12), 18, Retrieved from http://elibrary.bigchalk.com…

    • 3909 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    References: Bidgoli, H. (2006). Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations. John Wiley & Sons, 1008 pp. ISBN: 0470051205, 9780470051207…

    • 1068 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Best Essays

    Raymind, A. (2011, January 19). Bit-defender 's 2011E-Threat Predictions Spotlight DDoS Protests, Rogue Applications, Social Network Plug Ins, and Mobile Malware. World Market Media. Retrieved January 22, 2011, from World Market Media Web site: http:/ / worldmarketmedia.com…

    • 2198 Words
    • 9 Pages
    Best Essays

Related Topics