Honey Pots
Honey Pots
Honey Pots
Abstract
For every consumer and business that is on
the Internet, viruses, worms and crackers are a few
security threats. There are the obvious tools that aid
information security professionals against these
1
problems such as anti-virus software, firewalls and WHAT IS A HONEYPOT?
intrusion detection systems, but these systems can
only react to or prevent attacks-they cannot give us A honeypot is primarily an instrument for information
information about the attacker, the tools used or even gathering and learning. A honeypot is an information
the methods employed. Given all of these security system resource whose value lies in the unauthorized zed
questions, honeypots are a novel approach to network or illicit use of that resource. More generally a honeypot
security and security research alike. is a trap set to deflect or detect attempts at unauthorized
use of information systems. Essentially; honeypots are
A honeypot is used in the area of computer resources that allow anyone or anything to access it and
and Internet security. It is a resource, which is
intended to be attacked and compromised to gain
more information about the attacker and the used
tools. It can also be deployed to attract and divert an
attacker from their real targets. One goal of this
paper is to show the possibilities of honeypots and
their use in a research as well as productive
environment.
Compared to an intrusion detection system,
honeypots have the big advantage that they do not
generate false alerts as each observed traffic is
suspicious, because no productive components are
running on the system. This fact enables the system to
log every byte that flows through the network to and
from the honeypot, and to correlate this data with
other sources to draw a picture of an attack and the
attacker. al production value. More often than not, a honeypot is
more importantly, honeypots do not have any resimply
This paper will first give an introduction to an unprotected, unpatched, unused workstation on a
honeypots-the types and uses. We will then look at the network being closely watched by administrators.
nuts and bolts of honeypots and how to put them
together. With a more advanced idea of how Its primary purpose is not to be an ambush for the
honeypots work, we will then look at the possible legal blackhat community to catch them in action and to press
ramifications for those who deploy them. Finally we charges against them. The focus lies on a silent
shall conclude by looking at what the future holds for collection of as much information as possible about their
the honeypots and honeynets. attack patterns, used programs, purpose of attack and the
blackhat community itself. All this information is used to
learn more about the blackhat proceedings and motives,
1. INTRODUCTION as well as their technical knowledge and abilities. This is
just a primary purpose of a honeypot. There are a lot
Global communication is getting more important every other possibilities for a honeypot - divert hackers from
day. At the same time, computer crimes are increasing. productive systems or catch a hacker while conducting
an attack are just two possible examples.
Countermeasures are developed to detect or prevent
attacks - most of these measures are based on known
facts, known attack patterns. As in the military, it is
important to know, who your enemy is, what kind of
strategy he uses, what tools he utilizes and what he is
aiming for. Gathering this kind of information is not easy WHAT IS A HONEYNET?
but important. By knowing attack strategies,
countermeasures can be improved and vulnerabilities can Two or more honeypots on a network form a honeynet.
be fixed. To gather as much information as possible is Typically, a honeynet is used for monitoring and/or more
one main goal of a honeypot. diverse network in which one honeypot may not be
sufficient. Honeynets (and honeypots) are usually
Generally, such information gathering should be implemented as parts of larger network intrusion-
done silently, without alarming an attacker. All the detection systems. Honeynet is a network of production
gathered information leads to an advantage on the systems. Honeynets represent the extreme of research
defending side and can therefore be used on productive honeypots. Their primary value lies in research, gaining
systems to prevent attacks. information on threats that exist in the Internet
community today.
2
The two main reasons why honeypots are deployed We will break honeypots into
are: two broad categories, as defined by Snort ,two types
of honeypots are:
1. To learn how intruders probe and attempt to gain
• Production honeypots
access to your systems and gain insight into attack
methodologies to better protect real production systems. • Research honeypots
2. To gather forensic information required to aid in the The purpose of a production honeypot is to help
apprehension or prosecution of intruders. mitigate risk in an organization. The honeypot adds
value to the security measures of an organization. Think
of them as 'law enforcement', their job is to detect and
TYPES OF HONEYPOTS: deal with bad guys. Traditionally, commercial
Honeypots came in two flavors: organizations use production honeypots to help protect
their networks. The second category, research, is
• Low-interaction honeypots designed to gain information on the blackhat
community. These honeypots do not add direct value to
• High-interaction. a specific organization. Instead they are used to research
the threats organizations face, and how to better protect
Interaction measures the amount of activity that an against those threats.
intruder may have with honeypot.In addition, honeypots
can be used to combat spam.
HONEYPOT ARCHITECTURE:
relays to
allow spammers to use their sites .This in turn allows for
identification of spammers.
3
A typical high-interaction honeypot consists of the
following elements: resource of interest, data control,
(“known
your enemy:
Learning
with Vmware,
DRAWBACKS:
Honeynet project”); these are also known as GEN-II
1. This architecture provides a restricted framework honeypots and started development in 2002.They
within which emulation is carried out. Due to the limited provide better data capture and control mechanisms.
number of services and functionality that it emulates, it This makes them more complex to deploy and maintain
is very easy to fingerprint. in comparison to low-interaction honeypots.
2. A flawed implementation (a behavior not shown by a High interaction honeypots are very useful in their
real service) can also render ability to identify vulnerable services and applications
itself to alerting the attacker. for a
particular
3. It has constrained applications in research, since every target
service which is to be studied will have to be re-built operating
for the honeypot. system.
Since the
honeypots
2. Structure of a HIGH INTERACTION have full
HONEYPOT (GEN-II):- fledged
operating
systems,
4
attackers attempt various attacks providing connections. This firewall would typically be configured
administrators with very detailed information on in Layer 2 bridging mode, rendering it transparent to the
attackers and their methodologies. This is essential for attacker.
researchers to identify new and unknown attack, by
studying patterns generated by these honeypots
DRAWBACKS: The final step is data capture, for which tools such as
Sebek and Term Log can be used. Once data has been
However, GEN-II honeypots do have their drawbacks as captured, analysis on the data can be performed using
well. tools such as Honey Inspector, PrivMsg and SleuthKit.
1. To simulate an entire network, with routers and Honeypot technology under development will eventually
gateways, would require an extensive computing allow for a large scale honeypot deployment that
infrastructure, since each virtual element would have to redirects suspected attack traffic to honeypot. In the
be installed in it entirely. In addition this setup is figure an external attacker: 1.penetrates DMZ and scans
comprehensive: the attacker can know that the network the network IP address 2.the redirection appliance
he is on is not the real one. This is one primary drawback 3.monitors all unused addresses, and uses Layer 2 VPN
of GEN-II. technology to enable firewall 4.to redirect the intruder to
honeypot 5.which may have honeypot computers
2. The number of honeypots in the network is limited. mirroring all types of real network devices. 6. Scanning
the network for vulnerable systems is redirected 7. By
3. The risk associated with GEN-II honeypots is higher the honeypot appliance when he probes unused IP
because they can be used easily as launch pads for addresses
attacks.
To build a honeypot, a set of Virtual Machines are 2. Honeypots are designed to capture any activity and
created. They are then setup on a private network with can work in encrypted networks.
the host operating system. To facilitate data control, a
stateful firewall such as IP Tables can be used to log 3. They can lure the intruders very easily.
5
4. Honeypots are relatively simple to create and 3. LIABILITY:
maintain.
Is the owner of the honeypot liable for any damage done
by that honeypot? They will be safe as long as honeypots
are used for directly securing the network.
DISADVANTAGES OF HONEYPOTS:
SOME COMMERCIAL HONEYPOTS AND
1. Honeypots add complexity to the network. Increased HELPFUL SOFTWARE:
complexity may lead to increased exposure to
exploitation.
Most of the research found in this area concluded that This product is designed to emulate a Back Orifice
there are three major legal spectrums concerning server. BOF (as it is commonly called) is a very simple
honeypots: but highly useful honeypot developed by Marcus Ranum
and crew at NFR. It is an excellent example of a low
• Entrapment, interaction honeypot. . It is a great way to introduce a
beginner to the concepts and value of honeypots. BOF is
• Liability a program that runs on most Windows based operating
system. All it can do is emulate some basic services,
• Privacy. such as http, ftp, telnet, mail, or BackOrrifice.
1. ENTRAPMENT:
6
determine who is looking for what. As a honeypot, it concept is especially useful in preventing larger classes
reduces both of attacks.
2. HONEY TOKENS:
Honeypots have gained a significant place in the overall
It is a data entity whose value lies in the inherent use of intrusion protection strategy of the enterprise. Security
data. Honey tokens are entities such as false medical experts do not recommend that these systems replace
records, incorrect credit card numbers and invalid social existing intrusion detection security technologies; they
security numbers. The very act of accessing these see honeypots as complementary technology to network-
numbers, even by legitimate entities is suspect. This and host-based intrusion protection.
7
The advantages that honeypots bring to intrusion
protection strategies are hard to ignore. In time, as
security managers understand the benefits, honeypots
will become an essential ingredient in an enterprise-level
security operation.
BIBLIOGRAPHY:
1)<http://www.macom.com/
2)<http://www.enteract.com/honepot.html
3)<http://project.honeypot.org/