Anda di halaman 1dari 5

Honeypot: a Supplemented Active Defense System for Network Security

Feng Zhang, Shijie Zhou. Zhiguang Qin, Jinde Liu


College of Computer Science and Engineering
University of Electronic Science and Technology of China
Sichuan, Chengdu 610054, P.R.China
E-mail: libmcenter. sizhou. qinzr, idliu}@uestc,edu.cn

Abstract Honeypot is a supplemented active defense matching based IDS. Honeypot system attempts to solve
system for network security. It traps attacks, records the problem by setting up a controlled environment
intrusion information about tools and activities of the similar to the service system, inveigling attackers,
hacking process, and prevents attacks outbound the gaining information about new type intrusions to aid the
compromised system. Integrated with other security corresponding security system [13, 14, 15, 16, 181.
solutions, honeypot can solve many traditional dilemmas. Industry and academia show growing interests in
We expatiate key components of data capture and data honeypot and related technologies. In industry field, a
control in honeypot, and give a classification for variety of honeypots with different extent of interaction
honeypot according to security goals and application appear including BOF [25],Spector [26],CyberCop Sing
goals. We review the technical progress and security [27], Honeynet [29], Open Source honeyd [28j etc. In
contribution of nowadays production honeypot and academia, there are number of projects in progress such
research honeypot. We present typical honeypot solutions as ISIC Honeypot Project [lo], Distributed Honeypot
and prospect the technical trends of integration, Project [ I l l , honeynet Project [12]. Honeypot is a
virtualization and distribution for the future honeypot. valuable tool aiding traditional security technologies to
Keywords honeypot, honeynet, attacks deception, improve corresponding performance.
network security This paper introduces honeypot and honeypot related
technologies from the viewpoint of security management
I. Introduction for network. Basic conceptions, general model and
Web applications are broadly deployed. More taxonomy for honeypot are given in section 2. Key
traditional services are extended to Internet. E-commerce problem and focuses in honeypot research are addressed
and e-government quicken up the process. At the same in section 3. Typical honeypot system is reviewed in
time, attacks and intrusions to the web application section 4. Finally, trends of honeypot and the features
system become more popular. Hackers exploit more that should be taken into account while designing future
tricky and obscure methods [I]. Automated attacking honeypot are summarized.
tools and Trojan horse appear at a more rapid rate. Some
of them such as worms, attack scripts and DDoS attacks 11. Honeypot Basics
are truly powerful and destruct [ I , 2, 3, 231. Traditional This section refers to the basic conceptions, the
security technologies and defense system for network general model and taxonomy of honeypot.
security are blunt while facing new attacks and intrusion. 1. Conceptions a n d Ideas
Round the clock is one of the most important A. Honeypot
properties of web application, hut attacks and intrusions Different researcher may give different definitions
change the situation. IDS can’t give alert when intrusion according to particular scenarios. We incline to take the
occurred using new signature. Even worse, we can’t following definition, “honeypot is a security resource
down the service system to check it completely because who’s value lies in being probed, attacked or
there still many online u s a s making their deals. To compromised” [15]. It catches the nature of honeypot--if
prevent, detect and react to intrusions without disturbing no one attack honeypot, it is nothing. Still, honeypot is
existing system is a severe problem for web application valuable security tool by some active nature. Other
and network security Traditional security technologies security tools such as firewall and IDS are completely
can’t solve the problem. Firework gives flexible policy passive for that their task is to prevent or detect attacks.
according to proper service ports to control out and in Honeypot actively give way to attacker to gain
connections regarding the protected network or system. information about new intrusions. This nature makes
It does nothing to attacks using proper service ports [4]. honeypot outstanding to aid other security tools.
IDS work well on detecting and alerting attacks of Honeypot is also integrated technology. Later we will
known signatures [8]. Most IDS can’t detect unknown demonstrate honeypot exploits IDS, firewall, routing
intrusions [7, 8, 91. Though some can do anomaly control to realize an integrated active defense system.
detection by training a clean data set of normal action, Therefore, We define honeypot in three folds. As a
clean data set is difficult or costly to get [8]. Information security resource whose value lies in being scanned,
on Unknown signature of intrusion can’t be attained attacked or compromised, As a security tool whose value
unless attacks are analyzed. It is a contradiction that lies in actively luring attacks to attain intrusion
laggard attaining of unknown signature and signature
0-7803-7840-7/03/$17.00 0 2 0 0 3 IEEE.

-231-
information and improving performance of other security architecture to record data from link layer, IP layer and
tools such as IDS, As one technology whose value lies in application layer. Related fields cover firewall, router
being an alternative methods for network security. and IDS.
Honeypot differ according to different use.'It could be 2. General Model for Honeypot
an emulated application, a full functional operating In 2.1.4, we interpret two essential requirements of
system with default configuration or an actual net honeypotdata control and data caputure. the following
including different OS and applications, even an model fulfills the basic two requirements and performs
emulated network on a single machine. We will cover effectively.
different kinds of honeypot in section 4. We deploy IDS component, firework component,
One basic assumption for honeypot is that all router control component, log component In the
connections outward and inward honeypot are general model, target OS and applications with default
considered conspicuous [lS, 161. That is rational for that configured. AU of them cooperate one another to form a
honeypot itself doesn't provide public product services, honeypot system. We will analyze it how to work and
and that Connections inbound and outbound honeypot fulfill two requirements.
are probably initiated from attacker to probe or attack the
target. There maybe some mistyping IP but the chance is
little.
B. Production Honeypot and Research Honeypot
Traditional honeypot is used to protect network of
corporation. production honeypot is aimed to do so.
Always does product honeypot come in company with
production systems such as mail server and www server.
They protect the target system by deceiving and
detecting attacks, giving alert to administrator.
Research honeypot is primarily for learning new
attacking methods and tools, gaining new information s,.lll
Sll I . C*.~..l =*dc, re,
about attacks though it can be used for production
honeypot. It provides more interactive chances for Data control includes connection control and routing
attackers and takes more risks being controlled at the control. Firewall component (connection control)
same time. Research honeypot take an effective data controls the outbound and inbound connections.
control mechanism to prevent from being a jump to Certainly, we allow all the inbound connections to the
attack other computer system [16]. honeypot or we can't trap any attacks. Outbound
C. Honeynet connections should be controlled because connections
Honeynet has particular meaning comesponding to initiated from honeypot is probably he used to attack
honeypot. Firstly, it is mainly used for research work. other computer system. Alternative measures could he
Secondly, there me multiple system in a honeynet. All taken, just count and setup an threshold for outbound
systems placed within the Honeynet are standard connections, add intelligence by analyzing activities of
production systems. Nothing is emulated nor is anything applications respectively to determine if an outbound
done to make the systems less secure. Honeynet is more connection should be blocked. Routing conaol
interactive than honeypot and strongly resemble an component is the second layer for access control. It
actual net (it is truly an net with router, workstations, blocks any non-honeypot-IP packets so as to prevent
popular operationg systems and default configured most IP spoofed attacks to other system. Routing control
service installed in default signature). Honeynet project component also supplements firewall component to
focuses on honeynet related technologies. This control outbound connections.
organization give many useful advices making honeynet Data capture uses a 3-layer hierarchy to capture and
easier to deploy and difficult to detect. Honeynet and store data. Firewall component is the first layer (IP layer)
honeypot advance together by sharing attacks deceptions, to capture outbound and inbound connection data. All the
data capture and data control technology. connections are considered suspicious. These data are
D. Data Control and Data Capture critically useful when watching and analyzing attack
Data control and data capture are two essential process. Second layer of data capture is IDS component,
requirements lie in all kinds of honeypot. The main task which captures all the network activities of honeypot in
of honeypot is luring attacks and gaining intrusion link layer. It lies in the same network with the target
information while preventing being used to attack other honeypot system and gather data in a hidden way. The
system. Data capture fulfill recording intrusions and third layer is log component which logs all the activities
attacks to honeypot. Data control measures up to prevent of the honeypot OS in application layer. Log data are
the compromised honeypot being an gangplank and stored remotely in strong access controlled log server.
protect the record data. Research works on data control Experienced attacker would discover the remote log and
refer to connection control and routing control try to destroy log server. It need more advanced skills to
technologies, and that data capture is a layered succeed compromising the security enhanced log server.

-232-
Even if attacker really hack the log server, we have Incident team can take off-line the reaction honeypot and
firewall and IDS component record the attacking investigate in detail what failed, what damage was done,
process. what entrance of attacker used and what he did. Lessons
Layered data control and data capture gives attackers learned from reaction honeypot can be used to identify
great flexibility to interact with honeypot and provides a faults and recovery production system.
more secure way protecting intrusion process data. Data Research honeypot focuses threats information
control and data capture can be deployed in a distributed including motives, tools, methods and skills. It is a
layered net environment for secure reason or deployed in platform with common vulnerabilities and OS holes to
one single machine for portability. attain information from the opponent. Unlike the above
3. Honeypot Taxonomy three honeypot, research honeypot doesn’t always
honeypot can be classified by security goals or company with production system but give attacker great
application goals. Related research work focuses flexibility. The goal of research honeypot is security
different fields accordingly. We break honeypot into four research. Researchers analyze new attacking tools as
broad categories according to security goals, prevention, well as worms extracted from recording information.
detection, reaction and research. The fust three focuses Remedies or solutions can be applied to enhance normal
different cycles in security, while the last one focuses the system security.
whole attacking process. One honeypot maybe carry several responsibilities of
Prevention honeypot stops attacker compromising both security goal and research goal. We know. that
production system indirectly. It applies effective attacks prevention, detection and reaction relate one another in
deception methods such as IP address deception (using security life cycle. Research honeypot can be modified
multi-homed capability in a single LAN interface), and adapted to particular security life cycle too.
network traffic simulation and information deception. Honeypot can be classified according to application
Hacker wastes time attacking honeypot system instead of goals. The kind of application-oriented honeypot
production system. In this way, honeypot deters attacks dedicate to solving a certain application security problem.
in and protects production system from being comprised. The following are several application-oriented solutions.
It’s true that new automated attacks and worms can A case in point is antispam honeypot, which filters spam
infiltrate the production system. honeypot still more without eliminating legitimate mail [ZO, 211: DOS and
easier to capture the auto-rooters and worms because of DDoS honeypot detect attacks by signature matching and
know vulnerabilities to provide information in advance. actively directing attacking packets to honeypot through
Detection honeypot gives alert when attack occurs. transparent packet forwarder [ZZ]. Worm honeypot traps
Main difference between detection honeypot and IDS a robot intruder indefinitely by manipulating the TCP
lies in that honeypot detects compromises by virtue of session parameters. Almost no intruder .could escape
system activities while IDS compares intrusion mode 1241.
with known signature. So detection honeypot is effective
in detecting new or unknown attacks. The other 111. Reseamh Focus
contribution to intrusion detection is that it can reduce The total goal of improvement is ,making honeypot
both false positive rate and false negative rate. False easier to deploy and more diffcult to detect. qesent
positives are alerts that were generated when IDS sensor research points to the following fields.
, ,
recognizes ‘‘signatures’’ are intrusions but are valid in 1. Detection Method
reality. False negatives are opposite meaning, IDS fails Tracking attacker’s activity instead of merely counting
detects valid intrusions. Reducing false positive rate is a their outbound connections. An activity is asserted to be
big problem IDS facing. Outbound and inbound an attack according to actual ,activity ‘in honeypot.
honeypot connections can be attacks to honeypot or Assertion is made basing on common-use command
attacks initiated from compromised system. Thus alert sequence or tools such as tip, telnet. Data mining method
generated from honeypot is lower false positive rate and of sequence analysis is introduced to add intelligence for
false negative rate. Detection honeypot can’t be deployed attacks detection [9].
solely because honeypot itself would be comprised and
2. Reaction Method
controlled. Detection honeypot can be a powerful tool We have mentioned that all outbound connections
supplements IDS in attacks detection.
above the threshold would be blocked. In this way, .we
Reaction honeypot is a companion system for
prevent the comprised system being a gangplank but
production system. It provides a environment similar to
risks implying, the existence of connection control
production system for taking measures to find the cause
(firework). Valuable information on attacker’s activity
and patch vulnerabilities after the production system is
after compromising a system can’t be attained. We hope
attacked and compromised. It is always a great loss to
a way that is effective and far more difficult to detect.
take production system off-line for a full analysis after
Data control can be replaced by a 2-layer gateway, which
intrusion occurs, but we can’t have a completely check
would modify several bytes of packets considered to be
on on-line target system for that there are active users
attacks [16]. Attacker still .can create connections with
making their deals and perhaps the attacker is just active
other system send ordinary request but can’t receive
in system. Reaction honeypot removes the difficulties.

-233.
proper response packets. This is a preferable response request, hut administrator can customize the reply script
way without knocking the attacker. to provide attacker more flexibility [28,30].
3. Data Capture and Data Store Method 4. Honeynet
How to capture and store data in a trick way is Honeynet represents the highest level of research
permanent problem. Honeynet project propose an artful honeypot. We have pointed out that it is a high
solution to data capture. Attcker’s activity is captured by interaction honeypot which is primarily used for research.
kernel module of honeypot OS, which encapsulates.the It can also be modified to production honeypot for
captured data with a spoofed IP and common use attacks detection and reaction. New methods of data
protocol such as NetBIOS. Honeypot gateway actively capture and data control proposed by Honeynet project
captures, decrypts, and reconstructs these data. Capture show greater flexibility and higher access contrl ability,
data in kernel module make it independent of the which can he applied both research honeypot and
communication means, such as SSH, SSL, or IPSEC. research honeypot [29].
Spoofed ip and encapsulation are used to trick attackers
U61. V. Conclusion
4. Virtual Honeypot Honeypot is not a solution to network security hut a
It combines data capture and data control as well as good tool supplements other security technologies to
other components of honeypot in a single machine. form an alternative active defense system for network
Virtual honeypot even can simulate different kinds and security. Working with IDS and firewall, Honeypot
different number of honeypot in a device. Related provides new way to attacks prevention, detection and
technologies includes virtual environment in home OS, reaction. Honeypot can serve as a good deception tool
IP stack simulator and application simulator. for prevention of product system because of it’s ability of
trapping attacker to a decoy system. Supplemented with
IV. Honeypot Examples IDS, honeypot reduces false positives and false negatives.
We select several honeypot systems to show the status Intelligence routing control provides flexible response to
of honeypot products. Each is a sample of one kind. We attacks. Different kinds of honeypot share the common
investigate different honeypot system concerning technologies of data control and data capture.
security value, interaction and virtualization. Researchers focus the two to make honeypot easier to
1. Backofficer Friendly (BOF) ,
deploy and more difficult to detect. From the advances in
BOF is developed by Marcus Ranum. It is a research and production honeypot nowadays, we predict
lightweight honeypot and free to distribute. We choose the future honeypot has the features of integration,
BOF because it represents an accurate distillation of the virtualization and disbihution. Integrated honeypot
ideas and insights of honeypot. BOF emulates several encapsulates all the components in a single device.
common services such as http, ftp, telnet, mail and Virtual honeypot creates large number of honeypot
Backonifice. BOF logs, alerts and responses a fake systems in one machine. Distributed honeypot comprises
reply whenever someone connects to such ports. BOF different honeypot system in an actual network to offer
user can have clear view of the attacking process [25]. high interaction between attacks and system. All of them
2. Specter make future honeypot cheaper to apply and easier to
Specter is a commercial production honeypot whose maintain .
value lies in detection. Spector can simulate 13 different
operating systems in application level including REFERENCES
Windows, Linux, Aix, Solaris, MacOS etc. It’s a [I] Gary McGraw, Greg Morrisett. Attacking Malicious
windows based software which offers 14 different Code: A report to the Infosec Research Council, May.
network services and traps. The other character is 2001. http://citeseer.nj.nec.com/498998.html
actively gathering attackers information such as Whois [2] Felix Lau, Stuart H. Ruhin, Michael H. Smith,
and DNS lookup. Specter is a low interactive honeypot Ljiljana Trajovic. Distributed Denial of Service Attacks.
which fakes the reply of attacker’s request. Attacker IEEE International Conference on Systems, Man, and
can’t utilize the application to interact with the OS [261. Cybernetics,pp. 2275-2280,Oct. 2000.
3. Honeyd [3] CERT Coordination Center, ‘‘Results of the
Created by Niels Provos, Honeyd is an powerful distributed systems intruder tools workshop,” Nov. 1999.
production honeypot, which can be used for attacks http://www.cert.org/reports/dsit-workshop.pdf.
detection and reaction. It represents today’s level of [4] Sotiris Ioannidis, Angelos D. Keromytis, Steven M.
production honeypot in many fields. First, it can emulate Bellovin, Jonathan M. Smith.Implementing a distributed
over 400 kinds of OS at IP stack level. This hides the firewall. ACM Conference on Computer and
guest OS before attacker. Second, emulating hundreds of Communications Security, pp.190-199, 2000.
computers at a single machine by use of Arp spoofing. [5] Dan Schnackenherg, Kelly Djahandari, D. Strene.
Third, Honeyd is Open Source honeypot system. It is Infiastructure for Intrusion Detection and Response.
fieto use and easy to modify for particular requirement.
Proceedings of DISCEX, January 2000
Honeyd still use the simulated service reply to attacker’s

-234-
[61 Alan M. Christie. The Incident Detection, Analysis, http://www.um.es/fmi~or/ftp.mcafee.com/s~~it~/ccs
and Response (IDAR) Project. tinglman ual/Cstguide.pdf
http://www.cert.orglidar/papers/IDAR_paper.pdf (281 Niels Provos. Open Source honeyd.
[71 Gene Spafford, Mark Crosbic, COAST group. Dept. http://www.citi .umich.edu/u/provos/oneyd/
of computer science. Active Defense of a Computer [291 Honepet. Tools for Honeynets.
System using Autonomous Agents Technical repot? bttp://w.honeynet.org/papers/honeynet/tc&l
110.98-005, Dept. of Computer Science, Pudue 1301 User-Mode Linux: an Opensource solution
University. to create a virtual Machine.
[81 Eleazar Eskin. Anomaly Detection over Noisy Data http://user-mode-linux.sf.nethoneypots.htm1,
using Learned Probability Distributions. Proc. 17th
International Conf. on Machine Leaning. Morgan
Kaufmann, San Francisco, {CA], pp.255-262. 2000.
191 Terran Lane, Carla E. Brodley. Temporal sequence
leaning and data reduction for anomaly detection. ACM
Transactions on Information and System Security, V01.2,
No.3, pp. 295-331. 1999.
[IO] Ireland Security Information Center and DuBlin
City University. ISIC Honeypot Project.
http://www.isiclabs.com/honeypoW.
[I11 Distributed Honeypot Project.
http://w.lucidic.net.
[ 12lhonepet Project.
h~p:l/www.honeynet.orgrgimisc/project.html,
[I31 Reto Baumann, Christian Planner. Honeypots,
Diploma thesis. Feb, 2002.
http://security.rbaumann.net/download/diplomathesis.pdf
[I41 Reto Baumann, Christian Plattner. White Paper:
Honeypots. Feh, 2002.
http://security.rbaumann.net/download/whitepaper.pdf
[I51 Lance Spitzner. Honeypot: Definitions and Values.
May, 2002. http://www.spitzner.net
[I61 Honeynet Project. Know Your Enemy: Honeynets.
h ttp://www.honeynet.org/papers/honeyneW
[17] Honeynet Project. Know Your Enemy: A Forensic
Analysis. http://www.honeynet.org/papers/forensicd
[IS] Honeynet Project. Know Your Enemy: Motives.
http://www.honeynet.org/papers/motives/
[191 Michael Clark, Virtual Honeynets. Nov, 2001.
http://online.securityfocus.com/infocus/
[20]Spencer, Fighting Relay Spam the Honeypot Way.
http://fightrelayspam.bomestead.com/
[2I]Jack Cleaver. Jackpot Mailswerver: a SMTP Relay
Honeypot. http://jackpot.uk.ner/
[22]Nathalie Weiler. Honeypots for Distributed Denial of
Service Attacks. Eleventh IEEE International Workshops
on Enabling Technologies: Infrastructure for
Collaborative Enterprises (WETICEOZ). P. 109, Jun,
2002.
[23]Infonnation Security Inc. 2001 Industry Survey on
Computer Attacks.
http://www.infosecuritymag.com/articledKtoberO Ilimag
eslsurvey.pdf
[241 Tom Liston. Trapping Worms in a Honeypot: The
Tarpit. http://www.threenorth.com/LaBrea/
[25] Marcus h u m . Backofficer Friendly ( B o g .
http://www.n~.neWproducts/.
[26]Spector. http://www.specter.com/defauItSO.htm
[271 CyLwCop Sing. CyberCop Sting Getting Started
Guide.

-235-

Anda mungkin juga menyukai