Posted by : Unknown Friday, July 26, 2013


HONEYPOT
AND
INTRUSION DETECTION

Abstract

                   The Internet has undoubtedly become the largest public data network in the world, enabling and facilitating both personal and business communications worldwide. Widespread use of the Internet has opened the door to an increasing number of security threats. Intrusion Detection is the art of detecting inappropriate, incorrect, or anomalous activity. Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of defense, which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. This paper deals with one of such systems, which uses 'Honeypots' for Intrusion Detection.
                    The paper helps to learn what a honeypot is and how it can help safeguard your network from internal intruders. A honeypot is a tool that can help protect for network from unauthorized access. It is a system that is designed specifically to look vulnerable so that attacker thinks it's easy prey. Attackers who probe the machine find a system that's easy to attack and that they believe might contain sensitive information. On the back end, the system logs all the intruders' probes and attacks. A honeypot can lure attackers so that administrator can study their methods of operation and resource integrity tools can tell whether a user or possibly an intruder has altered the files or other system resources.
                   Honey Pots do not replace other traditional Internet security systems; they are an additional level or system. The goals behind setting up a honeypot, the advantages and disadvantages of honeypot solutions are also discussed.
                   Honey Pots can be setup inside, outside or in the DMZ of a firewall design or even in all of the locations although they are most often deployed inside of a firewall for control purposes. In a sense, they are variants of standard Intruder Detection Systems (IDS) but with more of a focus on information gathering and deception. The paper also discusses about the different levels or layers of tracking.
                   The honeypot solutions discussed in the paper explain how to build a honeypot, what all features a honeypot should have. Also some commercial honeypot systems are discussed.

Introduction

                   With the current growth of the Internet and e-commerce, networks are becoming increasingly vulnerable to damaging attacks. At the same time, downtime from networks that carry critical business applications can result in production losses and directly affect a company's bottom line. The volume of traffic moving over the Internet and corporate networks is expanding exponentially every day as mobile workers, telecommuters, and branch offices use e-mail and the Internet to remotely connect to corporate networks. No individual-whether a noncomputer user, a casual Internet surfer, or even a large enterprise-is immune to network-security breaches. With proper planning, however, network security breaches can often be prevented. General fear and suspicion of computers still exists and with that comes a distrust of the Internet. This distrust can limit the business opportunities for companies, especially those that are completely Web-based.

                   Simply put, an intrusion can be defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. An intrusion detection system, or IDS for short, attempts to detect an intruder breaking into the system or a legitimate user misusing system resources. The IDS will run constantly on the system, working away in the background, and only notifying when it detects something it considers suspicious or illegal.
                   There are two types of potential intruders, Outside Intruders and Inside Intruders. Despite the fact that most security measures are put in place to protect the inside from a malevolent outside world, most intrusion attempts actually occur from within an organization. A mechanism is needed to detect both types of intrusions - a break-in attempt from the outside, or a knowledgeable insider attack. An effective intrusion detection system detects both types of attacks.
                   Several species of butterfly have developed "eyes" on their wings. These fools predators into thinking it's looking in a direction it isn't, and gives them a "target" that isn't really there. (Big eyes mean a big body behind it.)
                   Some forms of protection for computers follow the same principle - giving the illusion of common vulnerabilities, appearing to have a port active when it isn't, or even pretending to be an entire network, just waiting to be portscanned - none of it real. Since any activity on these "non-existent" ports or networks has to be from an intruder, it becomes trivial to identify when an attack is taking place, and much easier to identify which packets are from the intruder and which are innocent.
                   The world of computer hackers is a constant cat-and-mouse game between "white hats" and "black hats." Some white hats use "honeypots" to learn about their enemy. Honeypots look like normal Web servers to a black hat, but they are really traps with special software that allow white hats to track every step a computer vandal takes.

Topic Details

What is a honeypot?

                   Honey Pot Systems are decoy servers or systems setup to gather information regarding an attacker or intruder into your system. These are programs that simulate one or more network services that you designate on your computer's ports. An attacker assumes you're running vulnerable services that can be used to break into the machine. A honeypot can be used to log access attempts to those ports including the attackers' keystrokes.
                    A honeypot is a network server designed to trap would-be attackers before they invade the real servers and services. The honeypot contains no data or applications critical to the company but has enough interesting data to lure a hacker. It is a system designed to teach how black-hats probe for and exploit a system.
                   The idea behind a honey pot is to setup a "decoy" system that has a non-hardened operating system or one that appears to have several vulnerabilities for easy access to its resources. The decoy system should be loaded with numerous fake files, directories, and other information that may look real. By making the honey pot appear to be a legitimate machine with legitimate files, it leads the hacker to believe that they have gained access to important information. With a little luck the intruder will stay around in an attempt to collect data while the honey pot collects information about the intruder and the source of his or her attack.
                   Ideally honey pots provide an environment where intruders can be trapped or vulnerabilities accessed before an attack is made on real assets. Decoys are setup not to capture the bad guy but to monitor and learn from their moves, find how they probe and exploit the system and how those exploitations can be prevented in production systems and doing this all without detection from the hacker.

How do honey pots work?

                   Honey pots work on the idea that all traffic to a honeypot should be deemed suspicious. As stated before honey pots are generally based on a real server, real operating system, and with data that appears to be real. One of the main differences is the location of the machine in relation to the actual servers. The decoy machine are usually placed somewhere in the DMZ. This ensures that the internal network is not exposed to the hacker. Honey pots work by monitoring the intruder during their use of the honeypot. This can done whether the attack came from the outside or the inside of the network, depending on the location of the decoy system. Honey pots are generally designed to audit the activity of an intruder, save log files, and record such events as the processes started, compiles, file adds, deletes, changes, and even key strokes. By collecting such data the honey pots work to improve a corporation’s overall security system. If enough data is collected it may be used to prosecute in serious situations. In cases where you do not wish to prosecute the data collected can be used to measure the skill level of hackers, their intent, and in some cases, even their identity. All in all the honey pot helps a company prepare for attacks and respond to those attacks by learning from information gathered
Classification of Honeypots

                  Honepots can be break up into two broad categories, as "production" and "research". The purpose of a production honeypot is to help mitigate risk in an organization. The honeypot adds value to the security measures of an organization. The second category, research, is honeypots designed to gain information on the blackhat community. These honeypots do not add direct value to a specific organization. Instead they are used to research the threats organizations face, and how to better protect against those threats. This information is then used to protect against those threats.
                   The honeypots can also be categorized as Hardware-based and Software-based honeypots. Hardware-based honeypots are servers, switches or routers that have been partially disabled and made attractive with commonly known misconfigurations. They sit on the internal network, serving no purpose but to look real to outsiders. The operating system of each box, however, has been subtly disabled with tweaks that prevent hackers from really taking it over or using it to launch new attacks on other servers.
                   Software emulation honeypots, on the other hand, are elaborate deception programs that mimic real Linux or other servers and can run on machines as low-power as a 233-MHz PC. Since an intruder is just dancing with a software decoy, at no time does he come close to actually seizing control of the hardware, no matter what the fake prompts seem to indicate. Even if the hacker figures out that it's a software honeypot, the box on which it's running should be so secure or isolated that he couldn't do anything but leave anyway.

Levels or Layers of tracking

                   Honey Pots can be setup inside, outside or in the DMZ of a firewall design or even in all of the locations although they are most often deployed inside of a firewall for control purposes. In a sense, they are variants of standard Intruder Detection Systems (IDS) but with more of a focus on information gathering and deception.

                   Many firewalls allow to place a network in the demilitarized zone (DMZ). This is a network added between an internal network and an external network in order to provide an additional layer of security. Sometimes it is also called a perimeter network. The other option is to place it on a separate, dedicated Internet connection. Ideally, all traffic to and from the honeypot should also be routed through its own dedicated firewall.
                    The information provided on an intruder depends on the levels of tracking that you’ve enabled on your Honey Pot. Common tracking levels include the firewall, system logs on the Honey Pot and sniffer-based tools.

Firewall Logs

                   Firewalls offer the outermost layer of protection for a network, providing a basic barrier and restricting points of access. Firewalls are useful as part of the overall Honey Pot design for many reasons. Most firewalls provide activity-logging capabilities, which can be used to identify how an intruder is attempting to get into a Honey Pot. Reviewing the order, sequence, time stamps and type of packets used by an intruder to gain access to you Honey Pot will help you identify the tools, methodology being used by the intruder and their intentions. Most firewalls can be configured to send alerts by email or pager to notify you of traffic going to or from your Honey Pot. This can be extremely useful in letting you review intruder activity while it’s happening.
              
System Logs

                   Unix and Microsoft NT seem to have the lion share of the Internet server markets and both operating systems have logging capabilities built into their operating systems, which help identify what changes or attempts have been made. There are also several tools available that greatly increase the information that can be gathered. Many of the Unix tools are public domain, while many of the Microsoft NT tools are not.

Sniffer Tools

                   Sniffer tools provide the capability of seeing all of the information or packets going between the firewall and the Honey Pot system. Using a sniffer tool allows you to interrogate packets in more detail to determine which methods the intruder is trying to use in much more detail than firewall or system logging alone. An additional benefit to sniffer tools is that they can also create and store log files. The log files can then be stored and used for forensic purposes.

Setting A Honeypot
                  
                   Implementation of a Honey Pot solution as part of a security system first involves the decision of whether to purchase a commercial solution or decide to develop your own. A Honey Pot system is setup to be easier prey for intruders than true production systems but with minor system modifications so that their activity can be logged of traced. The general thought is that once an intruder breaks into a system, they will come back for subsequent visits. During these subsequent visits, additional information can be gathered and additional attempts at file, security and system access on the Honey can be monitored and saved.

Building a Honey Pot

                   There is a variety of public domain tools and software available that can be useful to help you setup a Honey Pot. ' Set up a server and fill it with tempting files. Make it hard but not impossible to break into. Then sit back and wait for the crackers to show up. Observe them as they cavort around in the server. Log their conversations with each other. Study them like you'd watch insects under a magnifying glass' . That's the basic concept behind honeypots, systems that are set up specifically so that the security experts can secretly observe crackers in their natural habitats.
                   When setting up a Honey Pot is that certain goals have to be considered.
Those goals are:
1.   The Honey Pot system should appear as generic as possible
2.   You need to be careful in what traffic you allow the intruder to send back out to the Internet for you don’t want to become a launch point for attacks against other entities on the Internet. (One of the reasons for installing a Honey Pot inside of the firewall!)
                   You will want to make your Honey Pot an interesting site by placing "Dummy" information or make it appear as though the intruder has found an "Intranet" server, etc. Expect to spend some time making your Honey Pot appear legitimate so that intruders will spend enough time investigating and perusing the system so that you are able to gather as much forensic information as possible.
                   Any enterprise firewall package will be sufficient for building a honeypot system.. However, when setting up this firewall, you’ll want to reverse your normal rules. The goal is to allow all inbound traffic and restrict outbound traffic to the bare minimum i.e. outbound ICMP, DNS, and Telnet/FTP to a noncompromised IP address. If all outbound services are closed, intruders will lose interest and attack elsewhere.


Commercial Honey Pot Systems

                   There are a variety of commercial Honey Pot systems available. The operating systems most widely supported are Microsoft NT and Unix. Some of the commercial Honey Pot systems available are:

 Deception ToolKit (DTK)
                   It is a toolkit designed to give defenders a couple of orders of magnitude advantage over attackers.
                   The basic idea is not new. We use deception to counter attacks. In the case of DTK, the deception is intended to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities. DTK's deception is programmable, but it is typically limited to producing output in response to attacker input in such a way as to simulate the behavior of a system, which is vulnerable to the attackers method. This has a few interesting side effects:
·         It increases the attacker's workload because they can't easily tell which of their attack attempts works and which fail.
·         It allows us to track attacker attempts at entry and respond before they come across a vulnerability we are susceptible to.
·         It sours the milk - so to speak. If one person uses DTK, they can see attacks coming well ahead of time. If a few others start using it, we will probably exhaust the attackers and they will go somewhere else to run their attacks. If a lot of people use DTK, the attackers will find that they need to spend 100 times the effort to break into systems and that they have a high risk of detection well before their attempts succeed.
·         If enough people adopt DTK and work together to keep it's deceptions up to date, we will eliminate all but the most sophistocated attackers, and all the copy-cat attacks will be detected soon after they are released to the wide hacking community. This will not only sour the milk, it will also up the ante for would-be copy-cat attackers and, as a side effect, reduce the "noise" level of attacks to allow us to more clearly see the more serious attackers and track them down.
·         If DTK becomes very widespread, one of DTK's key deceptions will become very effective. This deception is port 365 - which we have staked a claim for as the deception port. Port 365 indicates whether the machine you are attempting to connect to is running a deception defense. Naturally, attackers who wish to avoid deceptive defenses will check there first, and eventually, simply running the deceptive defense notifier will be adequate to eliminate many of the attackers. Of course some of us defenders will not turn on the deception anouncement message so we can track new attack attempts by those who avoid deceptive defenses, so... the attacker's level of uncertainty rises, and the information world becomes a safer place to work.

FakeBO
                   This program fakes trojan servers and logs every attempt from client. It is possible to log attempts to file, stdout, stderr or to syslog. It can send fake pings and replies back to trojan client. The trojans supported are Back Orifice (BO)  and NetBus

 CyberCop Sting by Network Associates
This product is designed to run on Windows NT and is able to emulate several different systems including Linux, Solaris, Cisco IOS, and NT. It is made to appeal to hackers for looking as if it has several well-known vulnerabilities.
BackOfficer Friendly by NFR
This product is designed to emulate a Back Orifice server.
Tripwire
This product is for use on NT and Unix machines and is designed to compare binaries and inform the server operator, which have been altered. This helps protect machines from would be hackers and is an excellent way to determine if a system has been compromised

Value of Honeypots

                  
Honeypots have certain advantages (and disadvantages) as security tools. It is the advantages that help define the value of a honeypot. The beauty of a honeypot's lies in its simplicity. It is a device intended to be compromised, not to provide production services. This means there is little or no production traffic going to or from the device. Any time a connection is sent to the honeypot, this is most likely a probe, scan, or even attack. Any time a connection is initiated from the honeypot, this most likely means the honeypot was compromised. As there is little production traffic going to or from the honeypot, all honeypot traffic is suspect by nature. Now, this is not always the case. Mistakes do happen, such as an incorrect DNS entry or someone from accounting inputing the wrong IP address. But in general, most honeypot traffic represents unauthorized activity.
                   Because of this simplistic model, honeypots have certain inherent advantages and disadvantages. Some of them are :
1.     Advantage - Data Collection
                   Honeypots collect very little data, and what they do collect is normally of high value. This cuts the noise level down, make it much easier to collect and archive data. One of the greatest problems in security is wading through gigabytes of data to find the data you need. Honeypots can give you the exactly the information you need in a quick and easy to understand format.
2.   Advantage - Resources
                   Many security tools can be overwhelmed by bandwidth or activity. Network Intrusion Detection Devices may not be able to keep up with network activity, dropping packets, and potentially attacks. Centralized log servers may not be able to collect all the system events, potentially dropping some events. Honeypots do not have this problem, they only capture that which comes to them.

1.     Disadvantage - Single Data Point
                   Honeypots all share one huge drawback; they are worthless if no one attacks them. Yes, they can accomplish wonderful things, but if the attacker does not send any packets to the honeypot, the honeypot will be blissfully unware of any unauthorized activity.
2.     Disadvantages - Risk
                   Honeypots can introduce risk to your environment. As we discuss later, different honeypots have different levels of risk. Some introduce very little risk, while others give the attacker entire platforms from which to launch new attacks. Risk is variable, depending on how one builds and deploys the honeypot.

Honeynet Project

                   A honeypot is easy enough to build, but if an experienced cracker succeeds in compromising it, he could use it to launch other attacks. A safer option might be to create an entire network of honeypots, such as the HoneyNet. We call it a 'honeynet' because it's not a single system, it's actually a network of honeypots, full of real hardware, including Cisco switches and Windows NT, Linux and Solaris boxes, all partially disabled.

                   The Honeynet Project, a group of 30 researchers from academia and the commercial sector, is trying to change that. The group obtains information through the use of a Honeynet--a computer network on the Internet that's designed to be compromised. The network is made up of various production systems complete with sensors as well as a suitably enticing name and content. (The actual IP address changes regularly and isn't published.) Hackers' actions are recorded as they happen: how the culprits try to break in, when they're successful and what they do when they succeed.

                   A Honeynet is a type of honeypot designed specifically for research. A Honeynet is different from traditional honeypots, it is what we would categorize as a research honeypot. This does not make it a better solution then traditional honeypots, merely it has a different purpose. Instead of its value being detecting or deceiving attackers, its value is gaining information on threats. The two biggest design differences from a classic honeypot are:

·         It is not a single system but a network of multiple systems. This network sits behind an access control device where all inbound and outbound data is controlled and captured. This captured information is then analyzed to learn the tools, tactics, and motives of the blackhat community. Honeynets can utilize multiple systems at the same time, such as Solaris, Linux, Windows NT, Cisco router, Alteon switch, etc. This creates a network environment that more realistically mirrors a production network. Also, by having different systems with different applications, such as a Linux DNS server, a Windows IIS webserver, and a Solaris Database server, we can learn about different tools and tactics. Perhaps certain blackhats target specific systems, applications, or vulnerabilities. By having a variety of operating systems and applications, we are able to accurately profile specific blackhat trends and signatures.

·         All systems placed within the Honeynet are standard production systems. These are real systems and applications, the same you find on the Internet. Nothing is emulated nor is anything done to make the systems less secure. The risks and vulnerabilities discovered within a Honeynet are the same that exist in many organizations today. One can simply take a system from a production environment and place it within the Honeynet.

                   Conceptually, Honeynets are a simple mechanism. We create a network similar to a fishbowl, where we can see everything that happens inside it. Similar to fish in a fishbowl, we can watch and monitor attackers in our network. Also just like a fishbowl, we can put almost anything in there we want. This controlled network, becomes our Honeynet. The captured activity teaches us the tools, tactics, and motives of the blackhat community.

                   Like all honeypots, the Honeynet solves this problem of data overload through simplicity. A Honeynet is a network designed to be compromised, not to be used for production traffic. Any traffic entering or leaving the network is suspicious by definition. Any connection initiated from outside the Honeynet into the network is most likely some type of probe, attack, or other malicious activity. Any connection initiated from the Honeynet to an outside network indicates that a system was compromised. An attacker has initiated a connection from his newly hacked computer and is now going out to the Internet. This concept of no production traffic greatly simplifies the data capture and analysis.

                   Over the past several years the Honeynet Project has been dedicated to learning the tools, tactics, and motives of the blackhat community and sharing the lessons learned. The primary tool used to gather this information is the Honeynet.

                   Honeynets (also called honeypots) are a new tool in computer security for luring and containing a hacker. Like a surveillance camera, the honeypot allows you to observe hacker behaviour and captures every action a hacker takes. Using real examples of compromised systems, this volume shows how the bad guys accomplish what they do, and teaches technical skills to properly study an attack and how to learn from it. It explains how to build and maintain a honeynet.

Conclusion
                  
                   A honeypot are just a tool. How you use that tool is up to you. There are a variety of honeypot options, each having different value to organizations. We have categorized two types of honeypots, production and research. Production honeypots help reduce risk in an organization. While they do little for prevention, they can greatly contribute to detection or reaction. Research honeypots are different in that they are not used to protect a specific organization. Instead they are used as a research tool to study and identify the threats in the Internet community. Regardless of what type of honeypot you use, keep in mind the 'level of interaction'. This means that the more your honeypot can do and the more you can learn from it, the more risk that potentially exists. You will have to determine what is the best relationship of risk to capabilities that exist for you. Honeypots will not solve an organization's security problems. Only best practices can do that. However, honeypots may be a tool to help contribute to those best practices. Honeypots can act as decoys and can keep intruders away from your other systems.

                   While not a network security panacea, deception is another option for the security-conscious organization, especially for monitoring insider threats. Honeynets and honeypots are best used to track, trap and trace crackers who have already entered a particular system.


Leave a Reply

Subscribe to Posts | Subscribe to Comments

Blog Archive

- Copyright © Seminar Sparkz Inc -- Powered by Semianr Sparkz Inc - Designed by Shaik Chand -