use of honey-pots to detect exploited systems across large enterprise networks

18
Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks Ashish Gupta Network Security May 2004 http://project.honeynet.org/misc/p roject.html

Upload: nolen

Post on 25-Feb-2016

30 views

Category:

Documents


2 download

DESCRIPTION

http://project.honeynet.org/misc/project.html. Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks. Ashish Gupta Network Security May 2004. Overview. Motivation What are Honeypots? Gen I and Gen II The GeorgiaTech Honeynet System Hardware/Software IDS - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Use of Honey-pots to Detect Exploited Systems Across Large

Enterprise Networks

Ashish GuptaNetwork Security

May 2004

http://project.honeynet.org/misc/project.html

Page 2: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Overview

• Motivation• What are Honeypots?

– Gen I and Gen II• The GeorgiaTech Honeynet System

– Hardware/Software– IDS– Logging and review

• Some detected Exploitations– Worm exploits– Sage of the Warez Exploit

• Words of Wisdom• Conclusions

Page 3: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Why Honeynets ?

An additional layer of security

Page 4: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Security: A serious Problem

Firewall IDS

A Traffic Cop

Problems:

Internal Threats

Virus Laden Programs

Detection and Alert

Problems:

False Positives

False Negatives

Page 5: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

The Security Problem

Firewall IDS

HoneyNets

An additional layer of security

Page 6: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

• Captures all inbound/outbound data• Standard production systems• Intended to be compromised• Data Capture

– Stealth capturing– Storage location – away from the honeynet

• Data control– Protect the network from honeynets

Page 7: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Two types

Gen I Gen II

Good for simpler attacks

Unsophisticated targets

Limited Data Control

Sophisticated Data Control : Stealth Fire-walling

Gen I chosen

Page 8: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks
Page 9: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

GATech Honeynet System

Huge network

4 TB data processing/day

CONFIG Sub-standard systems

Open Source Software

Simple Firewall Data Control

Page 10: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

IDSInvisible SNORT Monitor

Promiscuous mode

Two SNORT Sessions

Session 1 Signature Analysis Monitoring

Session 2 Packet Capture DATA CAPTURE

Page 11: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks
Page 12: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Data Analysis

One hour daily !

Requires human resources

Forensic Analysis

SNORT DATA CAPTURE

All packet logs stored

Ethereal used

Page 13: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Detected Exploitations

16 compromises detected

Worm attacks Hacker Attacks

Page 14: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Honey Net traffic is Suspicious

Heuristic for worm detection:Frequent port scans

Specific OS-vulnerability monitoring possible

Captured traffic helps signature development

DETECTING WORM EXPLOITS

Page 15: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

SAGA of the WAREZ Hacker

Helped locate a compromised host

Honeynet

IIS Exploit Warez Server

+ Backdoor

Very difficult to detect otherwise !

Page 16: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Words of Wisdom

• Start small• Good relationships help• Focus on Internal attacks• Don’t advertise• Be prepared to spend time

Page 17: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Conclusion

• Helped locate compromised systems• Can boost IDS research

– Data capture• Distributed Honey nets ?

Page 18: Use of Honey-pots to Detect Exploited Systems Across Large Enterprise Networks

Discussion

• The usefulness of the extra layer ?• Dynamic HoneyNets• Comparison with IDS: are these a

replacement or complementary ?

HONEYNET

IDS