HoneyPot! when your average hacker is not winnie the pooh
HoneyPot Systems are decoy servers or systems setup to gather
information regarding an attacker or intruder into your system. It is important
to remember that Honey Pots do not replace other traditional Internet security
systems; they are an additional level or system.
A Honey Pot system is setup to be easier prey for intruders than true production systems but with minor system modifications so that their activity can be logged of traced. The general thought is that once an intruder breaks into a system, they will come back for subsequent visits. During these subsequent visits, additional information can be gathered and additional attempts at file, security and system access on the Honey can be monitored and saved.
Honey Pots can be setup inside, outside or in the DMZ of a firewall design or even in all of the locations although they are most often deployed inside of a firewall for control purposes. In a sense, they are variants of standard Intruder Detection Systems (IDS) but with more of a focus on information gathering and deception.
The common line of thought in setting up Honey Pot systems is that it is acceptable to use lies or deception when dealing with intruders. What this means to you when setting up a Honey Pot is that certain goals have to be considered?
A Honey Pot system is setup to be easier prey for intruders than true production systems but with minor system modifications so that their activity can be logged of traced. The general thought is that once an intruder breaks into a system, they will come back for subsequent visits. During these subsequent visits, additional information can be gathered and additional attempts at file, security and system access on the Honey can be monitored and saved.
Honey Pots can be setup inside, outside or in the DMZ of a firewall design or even in all of the locations although they are most often deployed inside of a firewall for control purposes. In a sense, they are variants of standard Intruder Detection Systems (IDS) but with more of a focus on information gathering and deception.
The common line of thought in setting up Honey Pot systems is that it is acceptable to use lies or deception when dealing with intruders. What this means to you when setting up a Honey Pot is that certain goals have to be considered?
Generally, there are two popular reasons or
goals behind setting up a Honey Pot:
- Learn how intruders probe and attempt to gain access to your
systems. The general idea is that since a record of the intruder’s
activities is kept, you can gain insight into attack methodologies to
better protect your real production systems.
- Gather forensic information required to aid in the
apprehension or prosecution of intruders. This is the sort of information
often needed to provide law enforcement officials with the details needed
to prosecute.
Honeypots can
be classified based on their deployment (use/action) and based on their level
of involvement. Based on deployment, honeypots may be classified as
·
production
honeypots
·
research
honeypots
Production
honeypots are easy to use, capture only limited information,
and are used primarily by corporations. Production honeypots are placed inside
the production network with other production servers by an organization to
improve their overall state of security. Normally, production honeypots are
low-interaction honeypots, which are easier to deploy. They give less
information about the attacks or attackers than research honeypots.
Research
honeypots are run to gather information about the motives and
tactics of the black hat community targeting
different networks. These honeypots do not add direct value to a specific
organization; instead, they are used to research the threats that organizations
face and to learn how to better protect against those threats. Research honeypots are complex to deploy and
maintain, capture extensive information, and are used primarily by research,
military, or government organizations.
Based on
design criteria, honeypots can be classified as:
·
pure honeypots
·
high-interaction
honeypots
·
low-interaction
honeypots
Pure honeypots are full-fledged production systems. The activities
of the attacker are monitored by using a casual tap that has been installed on
the honeypot's link to the network. No other software needs to be installed. Even
though a pure honeypot is useful, stealthiest of the defense mechanisms can be
ensured by a more controlled mechanism.
High-interaction
honeypots imitate the activities of the production systems
that host a variety of services and, therefore, an attacker may be allowed a
lot of services to waste his time. By employing virtual machines, multiple
honeypots can be hosted on a single physical machine. Therefore, even if the honeypot
is compromised, it can be restored more quickly. In general, high-interaction
honeypots provide more security by being difficult to detect, but they are
expensive to maintain. If virtual machines are not available, one physical
computer must be maintained for each honeypot, which can be exorbitantly
expensive. Example: Honeynet.
Low-interaction
honeypots simulate only the services frequently requested by
attackers. Since they consume relatively few resources, multiple virtual
machines can easily be hosted on one physical system, the virtual systems have
a short response time, and less code is required, reducing the complexity of
the virtual system's security. Example: Honeyd.
Some caveats exist that should be considered when implementing a Honey
pot system. Some of the more important are:
The first caveat is the consideration that if the information gathered from a Honey Pot system is used for prosecution purposes, it may or may not be deemed admissible in court. While information regarding this issue is difficult to come by, having been hired as an expert witness for forensic data recovery purposes, I have serious reservations regarding whether or not all courts will accept this as evidence or if non-technical juries are able to understand the legitimacy of it as evidence.
The second main caveat for consideration is whether hacking organizations will rally against an organization that has set "traps" and make them a public target for other hackers. Examples of this sort of activity can be found easily on any of the popular hackers sites or their publications.
The first caveat is the consideration that if the information gathered from a Honey Pot system is used for prosecution purposes, it may or may not be deemed admissible in court. While information regarding this issue is difficult to come by, having been hired as an expert witness for forensic data recovery purposes, I have serious reservations regarding whether or not all courts will accept this as evidence or if non-technical juries are able to understand the legitimacy of it as evidence.
The second main caveat for consideration is whether hacking organizations will rally against an organization that has set "traps" and make them a public target for other hackers. Examples of this sort of activity can be found easily on any of the popular hackers sites or their publications.
Deception Technology
Recently, a
new market segment called deception technology has
emerged using basic honeypot technology with the addition of advanced
automation for scale. Deception Technology addresses the automated deployment
of honeypot resources over a large commercial enterprise or government
institution.

Malware honeypots
Malware
honeypots are used to detect malware by exploiting the known replication and
attack vectors of malware. Replication vectors such as USB flash drives can easily be verified for evidence of
modifications, either through manual means or utilizing special-purpose
honeypots that emulate drives. Malware increasingly is used to search for and
steal crypto currencies, which provides opportunities for services such as
Bitcoin Vigil to create and monitor honeypots by using small amount of money to
provide early warning alerts of malware infection.
Spam versions
Spammers abuse
vulnerable resources such as open mail relays and open proxies. Some system administrators have created honeypot
programs that masquerade as these abusable resources to discover spammer
activity. There are several capabilities such honeypots provide to these
administrators and the existence of such fake abusable systems makes abuse more
difficult or risky. Honeypots can be a powerful countermeasure to abuse from
those who rely on very high volume abuse (e.g., spammers).
These
honeypots can reveal the apparent IP address of the abuse and provide
bulk spam capture (which enables operators to determine spammers' URLs and
response mechanisms). For open relay honeypots, it is possible to determine the
e-mail addresses ("dropboxes") spammers use as targets for their test
messages, which are the tool they use to detect open relays. It is then simple
to deceive the spammer: transmit any illicit relay e-mail received addressed to
that dropbox e-mail address. That tells the spammer the honeypot is a genuine
abusable open relay, and they often respond by sending large quantities of
relay spam to that honeypot, which stops it. The apparent source may be
another abused system—spammers and other abusers may use a chain of abused
systems to make detection of the original starting point of the abuse traffic
difficult.
This in itself
is indicative of the power of honeypots as anti-spam tools. In the
early days of anti-spam honeypots, spammers, with little concern for hiding
their location, felt safe testing for vulnerabilities and sending spam directly
from their own systems. Honeypots made the abuse riskier and more difficult.
Spam still
flows through open relays, spammers hop through open relays across
political boundaries to mask their origin. Honeypot operators may use
intercepted relay tests to recognize and thwart attempts to relay spam through
their honeypots. "Thwart" may mean "accept the relay spam but
decline to deliver it." Honeypot operators may discover other details
concerning the spam and the spammer by examining the captured spam messages.
Email trap
An email
address that is not used for any other purpose than to receive spam can also be
considered a spam honeypot. Compared with the term "spam trap", the term "honeypot" might be more suitable
for systems and techniques that are used to detect or counterattacks and
probes. With a spam trap, spam arrives at its destination
"legitimately"—exactly as non-spam email would arrive.
An amalgam of
these techniques is Project Honey Pot, a distributed, open source project that
uses honeypot pages installed on websites around the world. These honeypot
pages disseminate uniquely tagged spam trap email addresses and spammers can then be tracked—the corresponding spam mail
is subsequently sent to these spam trap e-mail addresses.
Database honeypot
Databases
often get attacked by intruders using SQL Injection. As such activities are not recognized by basic
firewalls, companies often use database firewalls for protection. Some of the
available SQL database firewalls
provide/support honeypot architectures so that the intruder runs against a trap
database while the web application remains functional.
Comments
Post a Comment