Anda di halaman 1dari 4

16emulated services to monitor specific ports, such as an emulated FTP server monitoring TCP port 21.

When anattacker connects to the emulatedservice, not only does the honeypotdetect and log
the activity, but it capturesall of the attacker's interaction with theemulated service. In the case of
theemulated FTP server, we can potentiallycapture the attacker's login and password, the commands
they issue, and perhaps even learn what they are lookingfor or their identity. It all depends on thelevel
of emulation by the honeypot.Most emulated services work the sameway. They expect a specific type
of behavior, and then are programmed toreact in a predetermined way. If attack Adoes this, then react
this way. If attack Bdoes this, then respond this way. Thelimitation is if the attacker doessomething that
the emulation does notexpect, then it does not know how torespond.Most low-interaction
honeypots,including Honeyd, simply generate anerror message.

Some honeypots, such asHoneyd, can not only emulate services, but emulate actual operating systems.
Inother words, Honeyd can appear to theattacker to be a Cisco router, WinXPwebserver, or Linux DNS
server.

12.2 Medium-interaction Honeypots

Medium-interaction Honeypots arefurther capable of emulating full services or specific vulnerabilities.


Their primary purpose is detection and they are used as production Honeypots but the chance of failure
is higher.

12.3 High-interaction Honeypots:

They either emulate a full operatingsystem or use a real installation of anoperating system with
additional monitoringwhich involves high risk factor also. High-interaction Honeypots are used primarily
asresearch and production Honeypots.High-interaction honeypots are different,they are usually
complex solutions as theyinvolve real operating systems andapplications. Nothing is emulated, we
giveattackers the real thing. If you want a Linuxhoneypot running an FTP server, you build areal Linux
system running a real FTP server.The

advantages

with such a solution aretwo fold.

First,
you can capture extensiveamounts of information. By giving attackersreal systems to interact with, you
can learnthe full extent of their behavior, everythingfrom new root kits to international IRCsessions. The

second

advantage is high-interaction honeypots make no assumptionson how an attacker will behave.


Instead,they provide an open environment that

17captures all activity. This allows high-interaction solutions to learn behavior we would not expect. An
excellentexample of this is how a Honeynetcapturedencoded back door commands on a non-standard
IP protocol(specifically IP protocol 11, Network Voice Protocol). However, this alsoincreases the risk of
the honeypot asattackers can use these real operatingsystem to attack non-honeypot systems.As result,
additional technologies haveto be implement that prevent the attacker from harming other non-
honeypotsystems. In general, high-interactionhoneypots can do everything low-interaction honeypots
can do and muchmore. However, they can be morecomplext to deploy and maintain.Examples of high-
interaction honeypotsincludeSymantec Decoy Server andHoneynets.

Honeynets: High InteractionHoneypots

Honeynetsare a prime example of high-interaction honeypot. Honeynetsare not a product, they are not
a softwaresolution that you install on a computer.Instead, Honeyents are an architecture,an entire
network of computers designedto attacked. The idea is to have anarchitecture that creates a highly
controllednetwork, one where all activity is controlledand captured. Within this network we placeour
intended victims, real computers runningreal applications. The bad guys find, attack,and break into
these systems on their owninitiative. When they do, they do not realizethey are within a Honeynet. All
of their activity, from encrypted SSH sessions toemails and files uploads, are capturedwithout them
knowing it. This is done byinserting kernel modules on the victimsystems that capture all of the
attacker'sactions. At the same time, the Honeynetcontrols the attacker's activity. Honeynets dothis
using a Honeywall gateway. Thisgateway allows inbound traffic to the victimsystems, but controls the
outbound trafficusing intrusion prevention technologies.This gives the attacker the flexibility tointeract
with the victim systems, but prevents the attacker from harming other non-Honeynet computers.

22. CONCLUSION:

In this paper, we looked at variousaspects of Honeypots. A honeypot is just atool. How we use that tool
is up to us. There

18are a variety of honeypot options, eachhaving different value to organizations.We have discussed the
value of thehoneypot and how they reduce theattacks. We have categorized two typesof honeypots,
production and research.Production honeypots help reduce risk inan organization. While they do little
for prevention, they can greatly contribute todetection or reaction. Researchhoneypots are different in
that they arenot used to protect a specificorganization. Instead they are used as aresearch tool to study
and identify thethreats in the Internet community.Regardless of what type of honeypot weuse, keep in
mind the 'level of interaction'. This means that the morethe honeypot can do and the more wecan learn
from it, the more risk that potentially exists. We will have todetermine what is the best relationship
of risk to capabilities that exist for us.Honeypots will not solve anorganization's security problems.
Only best practices can do that. However,honeypots may be a tool to helpcontribute to those best
practices.Although Honeypots have legal issuesnow, they do provide beneficialinformation regarding
the security of anetwork. We think it is important that newlegal policies be formulated to foster
andsupport research in this area. With thedifferent types of honeypots such as BOF,Honeyd, Specter etc
we can solve thecurrent challenges and make it possible touse Honeypots for the benefit of the
broader Internet community.

23. REFERENCES:

1.

http://www.rbaumann.net

2.

http://www.christianplattner.net

3.

http://www.honeynet.org

4.

www.topsite.com/best/honeypot

www.en.wikipedia.org/Honeypot

6.

www.trackinghackers.com/honeypots

Anda mungkin juga menyukai