Sei sulla pagina 1di 7

HONEYPOTS Joseph John Gabriel

Student, Department of Dual Degree Master of Computer Application


SCMS School of Management and Technology
imca-34@scmsgroup.org
Guide: Mr. Praveen Kammath.Guide Name/s per 2nd A

thor) li1 (of Affiliatiione y, Cuny

Abstract. A honeypot is a security system designed for and exploit weaknesses in an IT system.
to detect and counteract unauthorized access or use Compared to an intrusion detection system,
of a computer system. The name "honeypot" is used honeypots have the upper hand that they do not
in reference to the way the system traps generate false alerts as each observed traffic is
unauthorized users, such as hackers or spammers suspicious, because there is no productive
so they can be identified and prevented from components running on the system under scanner.
causing further problems. Honeypots are different This easily enables the system to log every byte that
than typical security solutions because they flows through the network to and from the
intentionally lure in hackers or users with malicious honeypot, and to compare and check this
intent. For example, a company may purposely information from other known sources to get a
create a security hole in their network that hackers picture of an attack and the attacker.
could exploit to gain access to a computer system. In system security, honeypots are used to gain
The system might contain fake data that would be of knowledge of the assailants, their methods from
interest to hackers. By gaining access to the data, their assaults and after that change and reorganize
the hacker might reveal identifying information, the framework to strengthen up the security. The
such as an IP address, geographical location, escape clauses of the system security can be secured
computer platform and other data. This information with the assistance of data given by honeypots.
can be used to increase security against the hacker Honeypot can be figured as a framework used on a
and similar users. system for finding out the vulnerabilities of a PC or
the entire system. The escape clauses can be
Keywords: Intrusion detection system, honeypots, checked as a whole or separately of any framework,
attacker, security. as it is a selective system to learn about the
assailants and their assault methods used on the
I. system[2].
INTRODUCTION
A honeypot is used in computer and network
security fields. It can be considered as a service or a II.
resource which is intended to be attacked and CLASSIFICATION OF HONEYPOTS
compromised to gain more information about the Honeypots are regarded as virtual machines
attacker and their methods and tools used for the which acts like a genuine PC or network
breach. It can also be deployed to attract the framework. Honeypots can be classified into taking
attacker and divert his action away from real after classes on their utilization:
targets[1].  Research honeypots: These honeypots are
The idea of honeypots was mainly circulated by used mainly for observing and are utilized to
Lance Spitzner through his honeynets project. obtain data and watch the black-hat society.
According to Lance Spitzner, a honeypot is a The information picked up by the specialists
system designed to learn how “black-hats” probe are utilized for the early notices, judgment
of assaults, improve the interruption  Honeynets: Honeynets can be described
discovery frameworks and outlining better to be a collection of at least two
devices for security. honeypots. A honeynet is used when
there is a need to observe a bigger or
 Production honeypots: These honeypots potentially more complicated system in
are deployed by the enterprises as an which one honeypot won’t be successful.
addition to system security’s frame. These Honeynets and honeypots are normally
honeypots fill in as early alerting executed as parts of bigger system
frameworks. The purpose of these honeypots interruption recognition frameworks. A
is to expel the dangers in enterprises. It honeyfarm is a concentrated collection
gives the data to the administrator in charge of honeypots and similar investigation
before the genuine assault[2]. apparatuses.

Honeypots can be again grouped on the basis of


level of contribution or collaboration as:
o Low level interaction: Honeypots that give
just some fake service alike works, they are
positioned as an emulator of the working
framework. They are easy to be built but
also are easy for the attackers to find out. In
a basic form, these services can be
monitored by having a listener on specific
port. Aggressor can simply utilize a
straightforward charge to recognize it that a
low interaction honeypot does not bolster. A Figure 1: Taxonomy of Honeypot
case of this kind of honeypot is Honeyd.
 Honeyd: Honeyd, also known as
honey daemon, is an open source III.
honeypot which was primarily used BUILDING A HONEYPOT
in Linux but now has windows For building a honeypot, several virtual
capability too. It is easy to be machines are created. They are then setup on a
implemented. Listener ports doesn’t private network with the host operating system. To
need to be created manually as facilitate data control, a stateful firewall such as IP
honeyd has built in capabilities for tables can be used to log connections. This firewall
this. It can listen to TCP and UDP would typically be configured in Layer 2 bridging
port hence becomes a low-level mode, rendering it transparent to attacker. The final
interaction honeypot that simulates step is data capture, for which tools such as Sebek
TCP and UDP services. and Term Log can be used. Once data has been
captured, analysis on the data can be performed
o High level interaction: These honeypots using tools such as Honey Inspector, PrivMsg and
offer real services from a real like operating SleuthKit[4].
system. These are machines that have a real
system with a real network interface and Honeypot technology under development will
positioned inside a network. These permit eventually allow for a large-scale honeypot
the catching of data of the attacker and deployment that redirects suspected attack traffic to
observe and log their methods and activities. honeypot
A case of this kind of honeypot is Honeynet.
o Penetrates demilitarized zone and scans of malicious activity, can be used for statistical
network IP addresses. modelling, trend analysis, detecting attacks, or even
o The redirection appliance. researching attackers. Depending on the placement
o Monitors all unused addresses and uses layer of the honeypot, and if they collect little data and
2 VPN technologies to enable firewall. monitor little activity, they will not have problems
o TO redirect the intruder to honeypot. of resource exhaustion. [4]
o This may have honeypot computers Now the some of the other main objectives of
monitoring all types of real network devices. using the honeypot for the Intrusion Detection
o Scanning the network for vulnerable environment so that the computer network become
secure from the intruder or the hacker attack
systems is redirected[4].
described as below[4,5]:-
IV.  Network decoys: Honeypots are useful for
OBJECTIVE monitoring networks. For monitoring,
The main objective of using honeypots is to honeypots are deployed in such parts of a
find the attacker by the connection tracking or the network that are not used for production.
pattern flow detection technique. After then confuse When an attacker probes the network, some
the attacker that the attacker is spoofing the traffic should eventually hit one of the
information from the legitimate user, but actually honeypots. As normal traffic should not
that was not the legitimate user, originally that was arrive at honeypots, warnings are rather
the duplicate or the false computer where the reliable. However, honeypots are useless if
attacker attack the information. So objective of the attacker is aware of them. Neither can
honeypot to confuse the attackers. they detect the absence of attacks. Besides
Here the production honeypots are used to of network monitoring, honeypots can be
help reduce risk and diverting hackers from used for confusing attackers by
attacking the production systems whereas a implementing decoy systems. The attacker
research honeypot is used to collect as much might not be able to tell which systems have
information and evidence as possible about the real value and which do not. Because of this,
blackhat community.[1] Research honeypots might the attacker may have to work harder and
be valued lesser than production honeypots to the use more time targeting the system. This
organization but they help the organization to makes detection easier. Nevertheless, the
understand the techniques used for attacks and setup of decoys can be rather tedious, and
secure the network even more. Data that is collected they involve risk, as well. So this about the
from the honeypot is of high value and can network decoy to protect the system from
definitely lead to clearer comprehension to increase the intruder or the unauthorized user means
the security of an organization’s IT environment. hacker.
Honeypots can either monitor all the traffic in a  Prevention of spam: Spammers abuse open
network and collect vast amount of information, mail relays and open proxies to hide their
more security can be gained but most of it will be identity. An open mail relay accepts any
redundant and useless to the organization, and on sender without authentication to send mail
the other hand, it collects very little data, but can be further. Open proxies accept any client in the
of very high value. Sometimes, the probability of network to make connections through it.
finding a honeypot in the network can be quite low Honeypots masquerading as open mail
as it does not have any production activity, thus relays or open proxies can be used to capture
does not generate high noise level. Depending on spam and reveal its sources. Captured spam
the honeypot tools used, useful information can be makes it possible to improve filtering.
understood by the administrator from the easy-to- Knowing a source of spam might allow
use graphical user interface. Data, especially those switching off the spammer from the
network. Alternatively, a honeypot can downloads the possible malware. Low-
collect source addresses of attempted mail interaction honeypots can, at least in
deliveries. The addresses are temporarily principle, capture only malware that exploit
added into the actual mail server’s blacklist. known vulnerabilities since they rely on
This helps to filter out sources that almost emulation. More comprehensive capture
certainly try to send spam. Honeypots seem requires a high-interaction honeypot which
to have been effective to some extent since runs a real operating system.
spammers have developed methods to detect  Detection of malicious Web content:
false open proxies. A simple test is to try to Vulnerabilities in Web browsers might allow
send mail back to itself by the proxy. The malicious Web pages to install malware into
proxy is very likely a honeypot if it claims a the system. Exploited pages are rather
success, but in reality the message has not common nowadays, and thus their manual
come back. The test is relatively simple to detection and analysis is not practical. Client
counter, however. The honeypot has only to honeypots can automate detection at least
compare the source and destination partially and help out in analysis.
addresses and let the connection through if HoneyMonkey is a high-interaction client
they are the same. A more complicated test honeypot for detecting exploits. The system
would place the sender and receiver on consists of a set of Windows XP instances
different hosts. In a general setting, this is with different levels of patches running in
much more difficult to cope without being virtual machines. The system is given a list
detected as the honeypot should not be a real of URLs that a modified Web browser
open proxy. Unfortunately, honeypots are within a virtual machine visits one by one.
probably less effective against spam sent Between the URL visits, the state of the
using botnets than by open mail relays and system, files and registry, is checked. If
open proxies. A botnet’s controller is there were any modifications outside the
presumably carefully hidden and can not be browser’s working area, the URL would be
figured out from spam delivery attempts. In reported as an exploit and marked for further
addition, blacklisting attempts are not very analysis. In that case, the exploited virtual
useful either, since there are so many machine instance is discarded and a clean
potential senders. one is started.
 Collecting malware: A suitable honeypot
can automatically collect samples of V.
malware that spread autonomously. This WORKING TECHNOLOGY
allows large-scale capture of currently active  Data Capture: The purpose of data capture
malware. This in turn allows, for example, is to log all the activities of an attacker. The
research on live data and constant Honeypot does exactly this that it collects
refinement of intrusion detection and information. The HoneyAnalyzer System
antivirus software. Manual capture of has two sources of data: Honeypot log and
malware would be just too slow. The network traffic log from Tcpdump. The
objective of a malware-collecting honeypot Honeyd framework supports several ways of
is essentially to download the actual logging network activity. It can create
malware and record the details of that event. connections logs that reports attempted and
When a network connection might lead to an computed connections for all protocols. But
exploit, the honeypot captures the to analyze the complete attack scenario, the
connection’s payload. It is then analysed system need full payload of the packet
whether the payload contains machine entering and leaving the honeypot. This task
executable code or network addresses. If is performed by the second element that is
enough information is found, the honeypot
Tcpdump which captures every packet full v) A textual hit statistic over a certain
payload. Tcpdump is a tool for network time range. By specifying an IP or a port
monitoring and one of the well known number it is possible to focus on specific
sniffers for Linux. It then dumps packets events. [3]
header information in the log file.  Signature Extraction: The graphical
 Data Analysis: In order to extract the more interface has support for application of LCS
precise attack signature, a data analyzer has algorithm the data of interest while present
been developed as shown:- system apply LCS algorithm on whole data.
 The web interface gives a graphical The process of finding attack signatures not
output using which security fully automated rather it also depends upon
administrator can easily find out most security administrator’s (SA) wisdom and
attacked port, So these are the IP address experience. The SA can choose the traffic on
to detect the location of the attacker or which the LCS algorithm is to be applied.
hacker. The proposed method of The Resulting precise signature will give
realization of the HoneyAnalyzer for less number of false positive and false
extracting more precise attack signature negatives. The steps followed for finding the
is described below:- good quality attack signature are as follows:-
i) Configure honeyd to simulate  Identify the data of interest from the
network. database by looking at the web GUI.
ii) Run Tcpdump for traffic analysis. This is the all about description
iii) Invoke the auto run shell script that about the signature extraction
will run in a particular time interval technique by detecting the intruder
and execute the parser utility that from the Graphic websites.
will parse the data from the honeyd  Analyze combined data from
log file and insert into the database. different data sources that is
iv) Execute the auto-run shell-script to Honeypot and Tcpdump For each
push the honeyd logs data into the received packet initiate the following
database. This will invoked by the sequence of activities:-
cron. i) Identify data of interest (i.e. of
v) Login to the web interface to view significance) from the database
the attack patterns and analyse the by looking at the web GUI.
data for extraction of good quality ii) Analyse data from sources i.e.
signature. [4] honeypot and Tcpdump.
 To enable the Security Administrator to
select the suspicious data, the web GUI
has the following features: - VI.
i) Ability to display packet information ADVANTAGES / DISADVANTAGES
from the database. There are various advantages and the disadvantages
ii) Ability to display real time network for using the honeypot so that the network system
traffic from data stored in database, as becomes secure and protected from the outsider
well as historical traffic statistics. attacker or hacker. Now some of advantages and
iii) Display the ports, which were disadvantages as below:
attacked within a certain time range.  Advantages of honeypots:
iv) Now here the main scenario which
remote IP-addresses were "visited" by
 Alerts about attacks: Honeypots detect
attacks and take records about the
Honeypot in a certain time range. Here
attack and methods used for the same.
it's possible to specify a port number to
Security administrator is alerted.
show activity on a specific port.
 Helps in improving the efficiency: between a honeypot system or a real
When a system is attacked in a new system. This is done by fingerprinting.
manner, new defence mechanisms can be It is a major drawback.
generated by considering the new mode  Purpose can be reversed: An
if attacks. It gives insights into more experienced hacker can use the
attacks that may happen. honeypot as a shortcut to reach other
systems in the framework and
 Minimal resources: Only those traffic
compromise them. This is also a major
which are of malicious nature are drawback.
monitored and recorded. Hence, only
less resources are needed. VII.
 Reduced time complexity: As only CONCLUSION
malicious contents are monitored, Honeypot technology controls the security threat
investigating them is easier and time in network, computing environments in a daily
saving than monitoring every content in basis. Once honeypots are implemented, it monitors
the framework. the system and gives detailed records of malicious
 No hidden costs: Any PC can be used contents, about how attacks happened, methods
as a honeypot. So, it doesn’t demand any used, tools used, etc. It also provides better network
extra budget for its implementation and security also give reliable effect and makes network
working. more secure and safe environment to use[3].
Honeypots have gained a significant place in the
 Flexible: They are simple to
overall intrusion protection strategy of enterprise.
understand, configure and to implement
Security experts do not recommend that these
and doesn’t have complex algorithms.
systems replace existing intrusion detection security
 Provides insight: It gives more idea of technologies; they see honeypots as complementary
the subject and enables to discover technology to network-and host – based intrusion
different point of views and apply them protection
for improving security.

 Disadvantages of honeypots: There are VIII.


also some disadvantages of honeypots as REFERENCES
well. [1] Honeypots The Future, Lance Spitzner
 Can’t monitor everything: Records
about malicious traffic can only be [2] Web Based Honeypots Networks, Srivathsa
captured as it is tiresome and useless, to S Rao, Vinay Hegde, Boruthalupula
an extent, of monitoring every Maneesh, Jyothi Prasad N M, Suhas Suresh.
connection. If the hacker doesn’t attack International Journal of Scientific and
the system with the honeypot, it is not Research Publications, Volume 3, Issue 8,
possible to catch information. August 2016. ISSN 2250-3153
 Risk on data: High level interaction [3] Honeypots In Network Security, Abhishek
honeypots work on real systems. This Sharma. International Journal of Technical
can cause in damage to the actual data Research and Applications e-ISSN: 2320-
in the system. Also in other systems, 8163, www.ijtra.com Volume 1, Issue 5
attacks not towards the honeypot system (Nov-Dec 2013), PP. 07-12.
may damage other systems and cause [4] HONEYPOTS FOR INFORMATION
big problems. SECURITY IN NETWORKS, S.Subanitha
 Leaves fingerprints: It is easy for a
professional hacker to differentiate
[5] Akshay A. Somwanshi, “Implementation of [6] Navnveet Kambow , Lavleen Kaur Passi ,
Honeypots for Server Security” , IRJET “Honeypots: The Need of Network
Vol.03,Issue: 03, March 2016. Security”, Vol.5(5), 6098-6101, 2014

Potrebbero piacerti anche