You are on page 1of 5

2019 IEEE 3rd Information Technology,Networking,Electronic and Automation Control Conference (ITNEC 2019)

SDN-based hybrid honeypot for attack capture


He Wang1,2 Bin Wu1,2
1.School of Computer Science, Beijing University of Posts 1.School of Cyberspace Security, Beijing University of
and Telecommunications Posts and Telecommunications
2.National Disaster Recovery Technology Engineering 2.National Disaster Recovery Technology Engineering
Laboratory, Beijing University of Posts and Laboratory, Beijing University of Posts and
Telecommunications Telecommunications
Beijing, China Beijing, China
wanghe0605@bupt.edu.cn binwu@bupt.edu.cn

Abstract—Honeypots have become an important tool for attack information. Therefore, we could analyze more valuable
capturing attacks. Hybrid honeypots, including the front end and traffic to strengthen the production network. However, the
the back end, are widely used in research because of the traditional hybrid honeypot architecture has difficulty in
scalability of the front end and the high interactivity of the back system flow control, and the physical machine deployment is
end. However, traditional hybrid honeypots have some problems inconvenient. In the face of a changing network environment, it
that the flow control is difficult and topology simulation is not is impossible to make targeted adjustments to network traffic
realistic. This paper proposes a new architecture based on SDN changes to obtain effective information.
applied to the hybrid honeypot system for network topology
simulation and attack traffic migration. Our system uses the Software Defined Networking (SDN) [6~8] is a new
good expansibility and controllability of the SDN controller to network architecture designed to separate the functionality that
simulate a large and realistic network to attract attackers and determines the direction of traffic (control plane) from the
redirect high-level attacks to a high-interaction honeypot for underlying systems that forward traffic to selected targets (data
attack capture and further analysis. It improves the deficiencies plane). SDN brings good traffic control and programmability to
in the network spoofing technology and flow control technology the network, and can dynamically configure the data plane
in the traditional honeynet. Finally, we set up the experimental according to the needs of network administrators. At present,
environment on the mininet and verified the mechanism. The test there are many researches on information security in SDN,
results show that the system is more intelligent and the traffic
such as intrusion detection, but the research on honeypot is still
migration is more stealthy.
in its infancy, and mostly concentrate in the research of high-
Keywords—CyberSecurity澯 Honeypot; SDN; Traffic migration;
interaction honeypots [9~10].
Topology simulation This paper gives full play to the advantages of hybrid
honeypots, and proposes a new hybrid honeypot architecture
I. INTRODUCTION based on SDN, which improves the shortcomings of network
spoofing technology and flow control technology in traditional
Honeypot [1] is a kind of active defense technology and it honeynet. Described as follows:
is a security tool that is expected to be attacked. It deploys
some hosts and network services to trick attackers into attack. x An attack traffic migrating mechanism is proposed. It
Then we capture attack behavior and analyze attack strategies classifies different attack types based on SDN. For low-
in honeypot to enhance security protection capabilities of level attacks such as scan detection, we import into low-
production network. Honeypots can be classified into two interval interactive simulation groups to attract attackers,
categories: low-interaction honeypots (LIH) like honeyd [2] and for high-level attacks, we need to further classify
and high-interaction honeypots (HIH) depending on the level and determine the location where the attack moved to.
of interaction. A low-interaction honeypot simulating some At this point we implement traffic filtering and attack
features, such as the network stack, is not a real operating directed capture.
system, so an attacker cannot fully control the system, yet it's
easy to deploy. The high-interaction honeypot is the actual x A network topology simulation model combining SDN
operating system, which can have more interaction information is proposed. The virtual Open vSwitch (OVS) is used to
with the attacker. However, the high-interaction honeypot is simulate the function of the router, which increases the
expensive to deploy and maintain, which is easy to cause network fidelity. Combined with the low-interaction
serious damage by attackers. honeypot, it solves the problem of high cost of high-
interaction honeynet deployment and large-scale
Some researchers proposed hybrid honeypot architectures simulation topology.
[3~5] combining the advantages of two honeypots. Hybrid
honeypots typically contain multiple front ends (low- The structure of this paper is organized as follows: Section
interaction honeypots) that can simulate tens of thousands of IP 2 proposes an SDN-based hybrid honeypot architecture
to attract attackers and back-ends (high-interaction honeypots) including attack traffic migration mechanism, topology
which can interact deeply with the attacker to get detailed simulation model and topology simulation algorithm. Section 3

978-1-5386-6243-4/19/$31.00 ©2019 IEEE 1602


presents the experiments and shows the testing results; finally, The cooperative relationship of each module is as shown in
section 4 presents some conclusions and suggest future work. the Fig. 2. After new attack packets reach the SDN controller,
the attack classification module which uses snort an open
II. SDN-BASED HYBRID HONEYPOT ARCHITECTURE source intrusion detection framework classifies the attack and
obtains the attack type of source IP. Snort checks the payload
The SDN hybrid honeypot architecture consists of four for the suspicious mode on the basis of its rule format, and
parts: Openflow switch and SDN controller (attack traffic outputs the alarm to the database through msg. The alarm rule
migration module), low-high interactive simulation group format is as shown in the Fig. 3. Then, the honeypot selection
(topology simulation model) and high-interaction honeypot module distinguishes the attack type according to the output
group, as shown in Fig. 1. The Openflow switch and SDN information of the msg. If the attack is low-level, such as
controller implement the attack migration mechanism to make scanning and detecting, it is forwarded to low-high interaction
decisions on attack traffic. The low-high interactive simulation honeypots by modifying the flow table to cope with the
group implements a topology simulation model that uses maximum resource saving; if it is high-level attack, the SDN
virtual OVS nodes and controllers to simulate the main controller need to judge which kind of attack is to determine
functions of the router. The high-interaction honeypot group is which specific honeypot enabled according to the configuration
configured with honeypots with specific services to record file. In this process, corresponding IP and mac addresses are
attacks and alerts. The attack traffic migration mechanism and needed to be modified in the flow table to migrate traffic to an
topology simulation model will be introduced below. environment that the attacker wants.澳
Ċ low-high interactive
Ċ simulation group

Fig. 3. Snort alarm format


LIH
topology simulation model
Topology The flow table lifecycle management module determines
management

Packet parsing/
the effective time of the flow table in the OpenFlow switch.
generation This module maintains the flow table meta information that is
HIH
Protocol
resolution in effect. Meta information includes the flow table valid time,
Virtual controller
Flow table
generation
the number of hit flow tables, and the protocol type. When a
Attacker
Openflow switch flow table exceeds the threshold set in the flow table meta
SDN controller
high-interaction information, the SDN controller deletes or changes the flow
honeypot
entry to prevent the expired flow table from affecting the
Attack traffic migration
HTTP1
normal attack and migration process.
Flow table life
Attack HTTP2
cycle
class ifi cation
management
OVS
B. SDN-based topology simulation model
Ss h1
SDN controller
OVS
topology management module
Ss h2
Routing info Device manager
Link manager
calculation
Fig. 1. SDN-based hybrid honeypot architecture Bandwid
Loss
th Timer Protocol Port

A. Attack traffic migration mechanism


The attack traffic migration mechanism mainly utilizes the Packet Protocol engine Packet
flexible data control capability of the SDN controller to paser LLDP ARP generator database
achieve the redirection of attack packets. The attack traffic is ICMP RIP
determined by the SDN controller, and the Openflow switch
forwards according to the flow table. Flow
Packet in
generator Packet out
Low level attack low-high int eractive simulation
(Scan or detect) group
Fl ow m od

Openflow switch Highly int eractive


honeypot group OpenFlow switch
Attacker
Flow1
Web attack Web honeypot
High level attack receiver Flow2 sender
SM TP attack
SM TP honeypot

SDN controller
Flown
Flow table life SSH attack SSH honeypot
cycle management
Attack Fig. 4. SDN-based topology simulation model
class ification

Honeypot selection
In the SDN hybrid honey network architecture, an SDN-
based topology simulation model is proposed in the low-high
Fig. 2. Attack trafficmigration mechanism interactive simulation group, as shown in the Fig. 4. The
Openflow switch is responsible for receiving the data layer

1603
data, packaging packet that cannot match the flow table into a packet source IP (arp_spa) and MAC (arp_sha) to the
packet-in request and sending it to the controller. After the destination IP and MAC, and writing the IP and MAC of this
SDN controller finishes processing, the result is returned to the port to the source IP and MAC. Finally, newly constructed data
switch through the packet-out message. packet is returned.
The SDN controller is mainly composed of topology ICMP simulation: The processing of the ICMP protocol by
management module, packet parser, packet generator, protocol the algorithm mainly includes two aspects: one is the most
engine and flow table generator. common ICMP echo request, and the other is ICMP timeout
processing. For the ping package, the algorithm generates an
x The topology management module is responsible for Echo reply with “Type = 0” and “Code = 0”. For packets with
maintaining the virtual topology information and TTL timeout, the algorithm generates a TTL timeout reply with
managing the running topology, including the type 11 (0x0b), code 0 and the 64-byte original timeout packet.
management of the switches and the router status. The
database is used to store the port IP address, MAC RIP protocol simulation: The system provides a reply to the
address, and mask of the virtual topology switch. And it RIP protocol. A path can only be allowed up to 15 routers in
also stores packet loss rate and router status. The which is suitable for small and medium-sized networks. A
routing info calculation module calculates the timer in the controller is used to construct a RIP response
information that should be replied according to the packet for each switch running RIP in the domain every 30
content of the requested protocol and the host seconds. The controller also constructs a response packet when
information in the domain and sends the information to receiving a RIP route request packet, which is sent to the
the packet generator. Topology simulation algorithm is switch from the designated port through the packet-out
proposed in this module, and we will introduce it in message.
detail in the section II-C. At the same time, the topology
manager maintains a timer, sends out a routing status III. EXPERIMENT
notification periodically, and generates information to
Mininet [11] is a lightweight software-defined network
be sent on time. testing platform, and supports various protocols such as
x The packet parser receives the packet-in message and OpenFlow and OpenvSwitch. It has good hardware consistency
invokes the protocol parser to parse the message type and high scalability, and can highly customize the network
and the source switch. For information needed to be structure. Code developed under this platform can be easily
calculate, the module notifies the topology manager to migrated to a real environment濁 We use mininet as the
calculate and reply. development platform, and Floodlight [12] as the SDN
controller to implement our hybrid honeypot system. Topology
x The packet generator is responsible for invoking the simulation and attack migration modules have been added to
protocol parser to generate a corresponding package the original modules of Floodlight.
according to the requirements of the topology manager
and the packet parser. The packet-out message is
A. Attack traffic migration experiment
delivered to the switch of the specified ID, and the
switch sends a reply packet from the designated port. The experiment builds attack traffic migration module on
the mininet platform. We bridge the virtual NIC to the physical
x The protocol parser is a knowledge base of the protocol NIC and connect it to a switch port, while the other port
and is responsible for the format of the storage protocol. connects to three servers that one deploys low-interaction
x The flow table generator is responsible for generating a honeypot (192.168.216.128) honeyd simulating web services,
flow table for each switch in the domain, including and the other two deploy high-interaction honeypots
intra-domain routing tables calculated by the topology (192.168.216.144/192.168.216.145) with web and sql
manager, data control flow tables, TTL modified flow vulnerabilities. Fig. 5 is attack traffic migration experiment
tables, and ARP proxy flow tables. Fow tables are sent deployment diagram.
to switches by generating a flow-mod message.
6'1FRQWUROOHU
C. Principle of topology simulation algorithm $WWDFNHU
 2SHQ)ORZVZLWFK
ARP simulation: The Openflow switch is a device that
works at the data link layer, so it does not have an IP address
and cannot automatically answer ARP requests. Therefore, In :HE VTO :HE VTO +RQH\G
  
order to implement topology simulation, we must implement
ARP protocol simulation first. When the ARP request packet
enters the switch, the switch matches the ARP protocol code Fig. 5. The diagram of attack traffic migration experiment deployment
(arp_op) and the ARP request destination IP address (arp_tpa)
through the ARP flow table. If the data packet matches the First, the attacker uses the scanning tool to scan
arp_op and the arp_tpa is the same as the virtual IP address of 192.168.216.128’s open ports. It is observed that port 80 is
the switch port, the flow table matches successfully. Packet open. Then access web services and perform sql injection
generator constructs a new data packet, moving the original attacks. At this time, the attack traffic migrating module has
already migrating the attack traffic to the high-interaction

1604
honeypot. We capture packets on the attacker side and the After the simulation of routing, another ping is used for
high-interaction honeypot end respectively. It can be seen that capturing packets on port 20.0.0.100 of R1. As shown in the
On the attacker side, there is no abnormality in the IP address Fig. 10 and Fig 11, the port sends routing information of four
192.168.216.128 scan and sql injection attack, but the actual devices to the attacking host in the domain. The ping request
sql injection attack packets have been redirected to was responded, and the TTL was also modified in response to
192.168.216.144. the route simulation expectations.

B. Topological simulation experiment

6'1FRQWUROOHU

$WWDFNHU 5RXWHU 2SHQ)ORZVZLWFK




7RSRVLPXODWLRQVHUYHU Fig. 10. RIP protocol reply after route simulation




Fig. 6. The diagram of topology simulation experiment deployment

Fig. 6 is the diagram of topology simulation experiment


deployment. A virtual network is sent to the topology
simulation server as shown in the Fig. 7. The gateways of each
subnet are 172.16.0.1, 192.168.0.1, and 135.0.0.1. The
honeypot Host IP is 192.168.0.201~192.168.0.203, Fig. 11. Ping result after route simulation
172.16.0.201~172.168.0.203, 135.0.0.201 ~ 135.0.0.203.
Finally, compared with the situation before the topology
simulation, the honeynet could be scanned from the angle of
the attacker. The comparison results are shown in the Fig. 12.
The functions of ARP, ICMP and dynamic protocol routing are
proved through the experiments. It can be concluded that the
system implements the topology simulation function.

Fig. 7. Virtual network topology

We use the attack test machine 10.0.0.1 to detect


172.16.0.202 before the router simulation with ping and
trancert respectively. The test results showed that there was no
response to timeout as shown in the Fig. 8 and Fig. 9.
Fig. 12. The results of Topology simulation before and after nmap scan

C. Performance
For performance evaluation, we designed a simple SMTP-
based test to monitor the delay of the first packet arriving at the
honeypot. An SMTP server is installed in the honeypot. The
Fig. 8. Ping result before route simulation remote attacker installed the SMTP client script, and the script
content is to send a greeting message.
The experiment built two different experimental
environments, one uses the honeybrid gateway and the other
uses the SDN controller for attack migration. Next, we run the
SMTP client script at a rate of 10 connections per second and
Fig. 9. Trancert result before route simulation record the duration of the first push packet for each connection

1605
to the honeypot. The experimental results in different cases are IV. CONCLUSIONS
shown in Fig. 13. This paper proposes a new architecture based on SDN
applied to the hybrid honeypot system, combined with the
characteristics of high and low interactive honeypots for
network topology simulation and attack traffic migration. The
system can simulate a large and realistic network to attract
attackers, and redirect high-level attacks to a high-interaction
honeypot for attack capture and further analysis. The SDN
controller provides network topology simulation in the hybrid
honey network and provides high-precision data control in the
entire attack traffic migration, which improves the deficiencies
in the network spoofing technology and flow control
technology in the traditional honey network. Finally, we set up
the experimental environment on the mininet and verified the
mechanism we proposed. The test results show that the system
is more intelligent and the traffic migration is more stealthy.
In the future, we will migrate the SDN-based hybrid
honeypot architecture to the real honeypot system and improve
Fig. 13. Connection latency raised by diffirent approaches
the test scenario.
The results of the experimental show that Honeybrid
gateway and SDN controller applications cause similar delays. REFERENCES
Our SDN controller requires Snort to intelligently classify, [1] M. Nawrocki, M. W¨ahlisch, C. Schmidt, T. C. andKeil, and J.
resulting in more delay than the Honeybrid gateway that only Sch¨onfelder, “A survey on honeypot software and data analysis,”
categorizes the IPTABLES rules. However, our honeynet ArXive-prints, Aug. 2016.
system has low delay during the attack traffic migration phase, [2] N. Provos, “A virtual honeypot framework,” in Proceedings of the 13th
because we merely need to modify the openflow flow table, Conference on USENIX Security Symposium (SSYM’04), Berkeley,
CA, USA, 2004, pp. 1–14.
avoiding replaying the TCP connection to redirect traffic, and
[3] X. Jiang and D. Xu, “Collapsar: A vm-based architecture for network
do it between local systems. attack detention center.” in USENIX Security Symposium, 2004, pp.15–
28.
Fig. 14 shows a grouped I/O plot of a honeypot, which uses
different mechanisms. The selected time interval is 100ms, so [4] M. Bailey, E. Cooke, D. Watson, F. Jahanian, and N. Provos, “A hybrid
honeypot architecture for scalable network monitoring,” Technical
the graph represents the number of packets processed per Report CSE-TR-499-04, University of Michigan, 2004.
100ms for the honeypot. During this time, we can observe that [5] G. Portokalidis and H. Bos, “Sweetbait: Zero-hour worm detection and
when we use our SDN controller application, the packet I/O is containment using low-and high-interaction honeypots,” Computer.
evenly distributed. Honeybrid's packet I/O allocation is clearer [6] ZHENG Y R, SHI G W, LUO W B, et al. Software Defined Networking:
than the other. Therefore, if the opponent uses the difference in a New Trend of Networking [C]//Applied Mechanics and Materials.
packet I/O performance to detect redirection, our mechanism is 2014:685-688.
more invisible than the Honeybrid gateway method. [7] DUAN Q, ANSARI N, TOY M. Software-Defined Network
VirtualizationL:An Architectural Framework for Integrating SDN and
NFV for Service Provisioning in Future Networks[J]. IEEE Network,
2016,30(5):10-16.
[8] WOOD T, RAMAKRISHNAN K K, HWANG J,etal. Toward a
Software-Based Network:Integrating Software Defined Networking and
Network Function Virtualization[J]. IEEE Network, 2015, 29(3):36-41.
[9] HAN, Wonkyu, et al. HoneyMix: toward SDN-based intelligent
honeynet. In: Proceedings of the 2016 ACM International Workshop on
Security in Software Defined Networks & Network Function
Virtualization. ACM, 2016. p. 1-6.
[10] Kyung N Z S, Han W, Tiwari N, et al. HONEYPROXY: Design and
Implementation of Next-Generation Honeynet via SDN[C]//IEEE
Conference on Communications and Network Security (CNS). 2017.
[11] de Oliveira R L S, Schweitzer C M, Shinoda A A, et al. Using mininet
for emulation and prototyping software-defined
Fig. 14. Packet I/O graph of honeypot under different mechanisms networks[C]//Communications and Computing (COLCOM), 2014 IEEE
Colombian Conference on. IEEE, 2014: 1-6.
[12] Project Floodlight[OL]. http://www.projectfloodlight.org/

1606

You might also like