You are on page 1of 11

Visit: www.geocities.com/chinna_chetan05/forfriends.

html

HONEYPOTS

FOR
NETWORK SECURITY

1 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

ABSTRACT: Honeypot is used in the area


of computer and Internet security. It is a
Honeypots are an exciting
resource, which is intended to be
new technology. They allow us to
attacked and computerized to gain more
turn the tables on the bad guys. In
information about the attacker, and used
the past several years there has been
tools. One goal of this paper is to show
growing interest in exactly what this
the possibilities of honeypots and their
technology is and how it works. The
use in research as well as productive
honeypot system is designed to lure
environment.
attracters. Any attack against the
Compared to an intrusion
honey pot are made to seem
detection system, honeypots have the big
successful, giving administrators
advantage that they do not generate false
time to mobilize, log and possibly
alerts as each observed traffic is
track and apprehend the attacker
suspicious, because no productive
without exposing the production
components are running in the system.
systems.
The original honeypot
stories come from “The cuckoo’s egg”, a
INTRODUCTION:
book by Clifford Stoll. In 1980s, a Global communication is

cracker has been traced to Germany, but getting more important everyday. At the

all attempts to pinpoint him further are same time, computer crimes increasing.

frustrated by the German phone system, countermeasures are developed to detect

which is based on analog circuits. or prevent attacks-most of these

Tracing a connection takes time. To measurers are based on known facts,

keep the cracker on the line, Cliff builds known attack patterns. As in the

a series of fake computer files that military, it is important to know, who

purport to detail a new secret plane in your enemy is, what kind of strategy he

development by U.S. military. Their uses, what tools he utilizes and what he

effort pays off: the cracker is so is aiming for. Gathering this kind of

fascinated by the drawings and fake information is not easy but important.

information that he stays connected long By knowing attack strategies,

enough for his phone call to be traced. countermeasures can be improved and

2 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

vulnerabilities can be fixed. To gather as become another infiltrated machine and


much information as possible is one an instrument for the black hat
main goal of honeypot. community.
A honeypot is primarily an
instrument for the information gathering Honeypot basics:
and learning. Its primary purpose is not
A honeypot is a resource
to be ambush for the blackhat
whose value is being in attacked and
community to catch them in action and
compromised. This means, that a
to press charges against them. The lies
honeypot is expected to get probed,
on silent collection of as much
attacked and potentially exploited.
information as possible about their
Honeypot do not fix anything. They
attack patterns, used programs, purpose
provide us additional, valuable
of attack and blackhat community itself.
information.
All this information is used to learn
A honeypot is a resource, which
more about the blackhat proceedings and
pretends to be real target. A honeypot is
motives as well as their technical
expected to be attacked or compromised.
knowledge and abilities. This is just
The main goals are the distraction of an
primary purpose if honeypot. There are a
attacker and the gain of the information
lot of other possibilities for a honeypot-
about the attack and the attacker.
divert hackers form productive systems
Value of honeypots:
for catch a hacker while conducting an
There are two categories of honeypots.
attack are just two possible examples.
 Production honeypots
Honeypots are not the perfect
 Research honeypots
solution for solving or preventing
A production honeypot is used
computer crimes. Honeypots are hard to
to help migrate risk in an organization
maintain and they need the good
while the second category, is meant to
knowledge about the operating systems
gather as much information as possible.
and network security. In the right hands
These honeypots do not add any security
honeypot is effective tool for the
value to an oraganition, but they can
information gathering. In the wrong,
help to understand the blackhat
unexperienced hands, a honeypot can
community and their attacks as well as

3 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

to build some better defenses against them long enough and bind their
security threats. A properly constructed resources.
honeypot is put on a network, which
closely monitors the traffic to and from Concepts:
the honeypot. This data can be used for a
Low-involvement honey:
variety of purposes.
A low-level involvement honeypot
 Forensicsanalyzing new
typically only provides certain fake
attacks and exploits
services. In a basic form, these services
 Trend analysislook for
could be implemented by having a
changes over time of types of
listener on specific port.
attacks,techniques,etc
In such a way, all incoming traffic can
 Identificationtrack the bad
easily be recognized and stored. With
guys back to their home
such a simple solution it is not possible
machines to figure out who they
to catch communication of complex
are.
protocols. On a low-level honeypot there
 Sociologylearn about the bad
is no real operating system that attacker
guys as a group by snooping on
can operate on. This will minimize the
email,IRC traffic,etc which
risk significantly because the complexity
happens to traverse the honeypot.
of an operating system is eliminated. On
In general every traffic from
the other hand, this is also disadvantage.
and to a honeypot is unauthorized
It is not possible to watch an attacker
activity. All the data that is collected by
interacting with operating system, which
a honeypot is therefore interested data.
could be really interesting. A low-level
Data collected by the honeypot is of high
honeypot is like one-way connection.
value, and can lead to better
We only listen, we do not ask any
understanding and knowledge which in
questions.
turn can help to increase overall network
security. One can also argue that a
honeypot can be used for prevention
because it can deter attackers from
attacking other systems by occupying

4 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

. security hole or vulnerability is getting


bigger because the complexity of
honeypot is increasing.
Through the higher level of
interaction, more complexity attacks are
possible and can therefore be logged and
analysed. The attacker gets a better
illusion of a real operating system. He
has more possibilities to interact and
probe the system. Developing a mid-
involvement honeypot is complex and
time consuming. Special care has to be
taken for security check as all developed
fake daemons need to be as secure as
possible.

Mid-involvement honeypot:

A mid-involvement
honeypot provides more to interact with
but still does not provide a real
underlying operating system. The fake
daemons are more sophisticated and
have deeper knowledge about the
specific services they provide. At the
same moment, the risk increases. The
probability that attacker can find a

5 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

High-involvement honeypot:
A high-involvement honeypot has a real
underlaying operating system. This leads
to much higher risk as the complexity
increases rapidly. At the same time, the
possibilities to gather the information,
the possible attacks as well as the
attractiveness increase a lot. As soon as a
hacker has gained access, his real work
and therefore the interesting part begins.
A high-involvement honeypot is very
time consuming. The system should be
constantly under surveillance. A
honeypot which is not under control is
not of much help even become a danger
or security hole itself. It is very
important to limit a honeypot’s access to
local intranet, as the honeypot can be
used by blackhats as if it was a real
compromised system. Limiting outbound
traffic is also important point to
consider, as the danger once a system is
fully compromised can be reduced.
Honeypot location:
By providing a full operating
A honeypot does not need a
system to attacker, he has the
certain surrounding environment, as it is
possibilities to upload and install new
a standard server with no special needs.
files. This is where the high-involvement
A honeypot can be placed anywhere a
honeypot can show its strength, as all its
server could be placed. But certainly,
actions can be recorded and analyzed.
some places are better for certain
approaches as others.

6 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

A honeypot can be used for the internal network nor does it


on the Internet as well as the intranet, introduce new risks.
based on the needed service. placing a The disadvantage of placing a
honeypot on the intranet can be useful if honeypot in front of the firewall is that
the detection of some bad guys inside a internal attackers cannot be located or
private network is wished. If the main trapped that easy. Placing a honeypot
concern is the Internet, a honeypot can inside DMZ seems a good solution as
be placed at two locations: long as the other systems inside the
1.In front of DMZ can be secured against the
firewalls(Internet) honeypot.Most DMZs are not fully
2.DMZ accessible as only needed services are
3.Behind the firewall(Intranet) allowed to pass the firewall. In such a
By placing the honeypot in front of case, placing the honeypot in front of the
firewall the risk for the internal works firewall should be favored as opening all
does not increases. A honeypot will corresponding ports on the fire is too
attract and generate lot of unwished time consuming and risky.
traffic like port scans or attack patterns. A honeypot behind a firewall
By placing a honeypot outside the can introduce new security risks to the
firewall, such events do not get logged internal network, especially if the
by the firewall and an internal IDS internal network is not secured against
system will not generate alerts. the honeypot through additional
Otherwise a lot of alerts would be firewalls. This could be a special
generated on the firewall or IDS. problem if the Ips are used for
Probably the biggest advantage authentication. By placing the honeypot
is that the firewall or IDS,as well as any behind a firewall, it is inevitable to
other resources, have not to be adjusted adjust the firewall rules if access from
as the honeypot is outside the firewall internet should be permitted. The biggest
and viewed as any other machine on the problem arises as soon as the internal
external network. Running a honeypot honeypot is compromised by an external
does therefore not increase the dangers attacker. He gains the possibility to
access the internal network through the

7 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

honeypot.This traffic will be unstopped


by the firewall as it is regarded as traffic
to the honeypot only, which in turn is Host based information
granted. Securing an internal honeypot is
gathering:
therefore mandatory, especially if it is a
high-involvement honeypot. The main
This section will discussion
reason for placing a honeypot behind a
possibilities that offer gain of
firewall could be to detect internal
information about ongoing on a
attackers.
honeypot by installing information
The best solution would be to
gathering mechanisms on the honeypot
run a honeypot in its own
itself.
DMZ,therefore with a preliminary
Basic possibilities:
firewall. The firewall could be connected
Information gathering facilities can
directly to the internet or intranet,
basically be grouped into two categories;
depending on the goal. This attempt
facilities that generates streams of
enables tight control as well as flexible
information and facilities that offer the
environment with maximal security.
information to peek into the system and
get the information about a certain state
of the honeypot .

Microsoft windows
One could think the large
amount of observed attacks on systems
running ms windows operating system
makes them ideal for the honeypot, but
unfortunately the structure of these
operating system makes the data
gathering rather difficult. Until today the
source code of the operating system of
Microsoft is not freely available , which

8 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

means that changes to the operating


system are very hard to achieve.

Unix derivates:
Unix derivatives operating
system offers interesting opportunities
for deploying data gathering
mechanisms since all of their
components are available as source code.
Network based Information
Gathering:Host based information
gathering is always located at the host
itself and is therefore vulnerable to
detection and once detected it can also
be disabled. Network based information
gathering does not have to be located on
the honeypot itself. It can also be
implemented in an invisible way, as
network traffic only gets analyzed but
not manipulated. Network based
information gathering is safer as it is
harder to be detected and quiet
impossible to disable.
Dangers:
Running a honeypot or honeynet is not
something that should be
underestimated- there are some dangers
one must be aware of which basically
are:
1.Unnoticed takeover of the honeypot by
an attacker
2.Lost control over the honey pot
installation.

9 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

3.Damage done to third party. alerts,as they only capture

Attractiveness: unauthorized activity.


 Catching False

Being the owner of a honeypot NegativesHoneypots can

can be an interesting experience, but easily identify and capture new

what if the members of the blackhat attacks never seen before.

community do not find their way to the  Minimal ResourcesHoneypots


honeypot or, even more dramatically, are require minimal resources,even
not interested in the honeyot at all. on the largest of networks.This
Another approach to lure attackers is the makes them an extremely cost
offering of the interesting services on the effective solution.
honeypot. Of course the question arises,  EncryptionHoneypots can
what an interesting services is or what it capture encrypted attacks.
should look like.

Disadvantages:
Advantages:  Single Data PointHoneypots
 Small Data setsHoneypots all share one huge
only collect attack or drawback;they are worthless if
unauthorized activity, no one attacks them. Yes,they
dramatically reducing the amount can accomplish wonderful
of data they collect. things,but if the attacker does
Organizations that may log not sent any packets to the
thousands of alerts a day may honeypot,the honeypot will be
only log a hundred alerts with blissfully unware of any
honeypots. This makes the data unauthorized activity.
honeypots collect much easier to  RiskHoneypots can introduce
manage and analyze. risk to your environment.As we
 Reduced False discuss later,different honeypots

PositivesHoneypots have different levels of

dramatically reduce false risk.Some introduce very little

10 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

risk,while others give the oraganization’s security problems.Only


attacker entire platforms from best practices can do
which to launch new that.However,honeypots may be a tool to
attacks,Risk is help contribute to those best practices
variable,depending on how one
builds and deploys the honeypot.

Conclusion:
REFERENCES

A honeypot is just a tool. How you


1) Mastering Network security,
use that tool is up to you. There are a
second edition by Chries Bretlon,
variety of honeypot options, each having
Cameron hunt.
different value to organizations. We
have categorized two types of
2) Introduction to network security
honeypots, production and research.
by Richard A. Mac Mohan.
Production honeypots help reduce risk in
an organization. Research honeypots are
3) Internet Firewalls and Network
different in that they are not used to
security, Second edition by Chris Hare
protect a specific oraganization. Instead
and Karanjit Sayan.
they are used as a research tool to study
and identify the threats in the Internet
4) Network Security: A Beginner’s
community. Regardless of what type of
guide, by Eric Maiwald.
honeypot you use,keep in mind the
‘level of interaction’. This means that
the more your honeypot can do and the
more you can learn from it, the more risk
that potentially exists.You will have to
determine what is the best relationship of
risk to capabilities that exist for
you.Honeypots will not solve an

11 Email: chinna_chetan05@yahoo.com

You might also like