SlideShare a Scribd company logo
1 of 15
Honeypot: Defense through the
deception
Presented by:
Karthik Bharadwaj A R
bharadwajkarthik4@gmail.com
Manoj M
manoj09633@gmail.com
Department of Electronics and Communications
Jawaharalal Nehru National college of engineering, Shivamogga
Background
 Industrial control systems (ICS) are typically defined as the systems which govern an
industrial process.
 Business processes relying upon ICS Operational Technology (OT) have high operational
demands, often having safety-related functionality and specific system performance criteria.
Introduction
 For computer network, its own characteristics such as the diversity of linking forms, the
openness, and interconnectivity make the network vulnerable to hackers, malicious software
and other forms of attack.
 The information security mechanisms in traditional sense are generally passive defense, such
as firewalls, intrusion detections systems, and encryption, and so on.
KARTHIK BHARADWAJ A R MANOJ M
 However, with the continuous development of attack technology, the existing protection
technology often does not recognize the new attack, always in a passive position.
 Honeypot uses beguiled technology, is a voluntary means to protect the network, and the
research on it mainly is to study how to design a strict deception environment.
 It can detect unknown attacks and collect invasion information at the same time to observe
the behavior of the invader, record their activates so that analyzing the level, purpose, tools
and means of the invader
KARTHIK BHARADWAJ A R MANOJ M
Honeypot System Principle
₾ Honeypot system is a network resource; it is created to be a host which actually exist and has
attraction to hackers; but it’s main purpose is to be used for being attacked and explored.
₾ Honeypot records the network communicating data between the hackers and honeypot host,
and then using analytic tools to interpret and analyses these data, thus the methods and
motives of the attackers entering the system will be found.
KARTHIK BHARADWAJ A R MANOJ M
₰ Honeypot system is generally composed by induced, deceived and analysis modules.
₰ The induced modules is used to attract the attackers to attack on the honeypot system; thus
deceived module calls the simulating information from the database.
₰ The analysis module is used for adjusting the induction and deception strategy momentarily.
KARTHIK BHARADWAJ A R MANOJ M
Honeypot defense system design idea
ꙃ The existing trap networks are laid with low interaction and high interaction.
ꙃ Pure honeypots are full-fledged systems where an attacker’s activity is monitored by a bug
tap installed on the honeypot’s link to the network. Being a full OS based honeypot made
them difficult to scale and open to compromise.
ꙃ Low interaction needs fewer resources but has a great limitation. It can only interact with the
hackers for one or two times, which makes it easy for hackers to find that this a trap.
ꙃ The high interactive trap network make use of the actual vulnerable service or software. They
are usually complex solutions as they involve real operating systems and applications.
◊ Control Center is a host which configures and manages the agents in the segment, and its main
function is to complete alarm receiving and display, alarm analysis and results show, and other
function.
◊ Low interaction and high interaction of honeypot simulates the host operation system and
some basic services in it to construct virtual Honeypot, generate the second level of agent
nodes and then redirect the hacker attack part of the second level agent nodes to the first level
of agent node.
◊ Because Honeypot does not simulate every aspect of the operation system, but only simulates
network services, thus the behavior of the hackers will be limited to network level
Defense system mechanism
KARTHIK BHARADWAJ A R MANOJ M
Making Honeypot attractive
‫ﻡ‬ Google tools were therefore used to ensure the system appeared in Google searches and were
searchable using Google search terms known as ‘dorks,’ for the specific internet facing control
system components.
‫ﻡ‬ The findings indicated that the Shodan (www.shodan.io) search engine used industrial
protocols to obtain specific information from automation devices. Normally search engines
such as Shodan would identify the processor type from standard HTTP requests.
An engineering approach to Honeypot design
 Control system honeypots have been widely deployed as virtualized systems, which tend to
have a low level of fidelity.
 The research developed a methodology which can be applied to multiple sectors for active
defense. The research intent was to implement and operate an industrial control system
honeypot.
 In the initial stages the project scope was defined to inform the design and ultimately the
development and operation of the system. The areas addressed at this stage were the type of
system to be modeled, and the situational awareness requirements.
KARTHIK BHARADWAJ A R MANOJ M
Methodology overview
 Facilitate Industry/stakeholder workshop to define industry needs and desired outcomes;
 Methodology report/system specification; x Control system and process build;
 Data capture and analysis
 Infrastructure design and implementation;
 ICS System deployment;
 Ongoing campaign and analysis;
 Final report and presentation with collated findings.
Honeypot implementation was undertaken in six stages:
1. Industrial sector and control process selection;
2. Construction of the control system. This included the selection of components, PLC
programming, HMI and SCADA development, plant process simulation and system modeling;
3. Implementation of security monitoring infrastructure, including selection of software and
systems.
4. Integration of control system and security monitoring infrastructure;
5. System testing;
6. Exposure to the Internet.
KARTHIK BHARADWAJ A R MANOJ M
The OT honeypot consists of four major components:
1. Control systems and process simulation;
2. Situational Awareness and Forensics (SAF) platform;
3. The attacker’s infrastructure;
4. Remote monitoring infrastructure for the honeypot
This was implemented in a standalone environment. The aim being to explore the feasibility of
different implementations, whilst making the system attractive, and maintain separation from
actual operational systems.
KARTHIK BHARADWAJ A R MANOJ M
KARTHIK BHARADWAJ A R MANOJ M
Advantages
 Data Collections
o Only captures relevant data
o Small data sets
o High value
 Minimize recourse usage
o Less bandwidth or activity than other security
implementation
 Simplicity
o Less complex than other security mechanism
such as intrusion detection systems
o Less chance of misconfiguration
 Cost
o No need for high resource usage
o Depends on the application
Disadvantages
 Single point of attack
o Useless if it is not attacked
 Risk
o Have a risk of being exploited - depends on
the type of honeypot
 Limited view
o Limited data – only captures what interacts
with it and not the whole scope of the
system
 Costs
o Development costs, analysis costs
o Depends on the applications
KARTHIK BHARADWAJ A R MANOJ M
Questions
KARTHIK BHARADWAJ A R MANOJ M
Honeypot-Defense through Mechanism

More Related Content

What's hot

INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...ijcsit
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsOmar Shaya
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Jowin John Chemban
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...Dr. Amrita .
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection amiable_indian
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemNikhil Singh
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningPritesh Ranjan
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...Editor IJMTER
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemIOSR Journals
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET Journal
 

What's hot (20)

INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
4
44
4
 
5
55
5
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 

Similar to Honeypot-Defense through Mechanism

Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An OverviewIRJET Journal
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on HoneypotsIRJET Journal
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivityIRJET Journal
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...IJCSIS Research Publications
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber SecurityRajathV2
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityIAEME Publication
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...IJERA Editor
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET Journal
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Eng. Mohammed Ahmed Siddiqui
 
Modern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent HoneypotModern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent HoneypotIRJET Journal
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET Journal
 

Similar to Honeypot-Defense through Mechanism (20)

Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
A05510105
A05510105A05510105
A05510105
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
 
504 508
504 508504 508
504 508
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Ananth3
Ananth3Ananth3
Ananth3
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Modern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent HoneypotModern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent Honeypot
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Honeypot-Defense through Mechanism

  • 2. Presented by: Karthik Bharadwaj A R bharadwajkarthik4@gmail.com Manoj M manoj09633@gmail.com Department of Electronics and Communications Jawaharalal Nehru National college of engineering, Shivamogga
  • 3. Background  Industrial control systems (ICS) are typically defined as the systems which govern an industrial process.  Business processes relying upon ICS Operational Technology (OT) have high operational demands, often having safety-related functionality and specific system performance criteria. Introduction  For computer network, its own characteristics such as the diversity of linking forms, the openness, and interconnectivity make the network vulnerable to hackers, malicious software and other forms of attack.  The information security mechanisms in traditional sense are generally passive defense, such as firewalls, intrusion detections systems, and encryption, and so on. KARTHIK BHARADWAJ A R MANOJ M
  • 4.  However, with the continuous development of attack technology, the existing protection technology often does not recognize the new attack, always in a passive position.  Honeypot uses beguiled technology, is a voluntary means to protect the network, and the research on it mainly is to study how to design a strict deception environment.  It can detect unknown attacks and collect invasion information at the same time to observe the behavior of the invader, record their activates so that analyzing the level, purpose, tools and means of the invader KARTHIK BHARADWAJ A R MANOJ M
  • 5. Honeypot System Principle ₾ Honeypot system is a network resource; it is created to be a host which actually exist and has attraction to hackers; but it’s main purpose is to be used for being attacked and explored. ₾ Honeypot records the network communicating data between the hackers and honeypot host, and then using analytic tools to interpret and analyses these data, thus the methods and motives of the attackers entering the system will be found. KARTHIK BHARADWAJ A R MANOJ M
  • 6. ₰ Honeypot system is generally composed by induced, deceived and analysis modules. ₰ The induced modules is used to attract the attackers to attack on the honeypot system; thus deceived module calls the simulating information from the database. ₰ The analysis module is used for adjusting the induction and deception strategy momentarily. KARTHIK BHARADWAJ A R MANOJ M
  • 7. Honeypot defense system design idea ꙃ The existing trap networks are laid with low interaction and high interaction. ꙃ Pure honeypots are full-fledged systems where an attacker’s activity is monitored by a bug tap installed on the honeypot’s link to the network. Being a full OS based honeypot made them difficult to scale and open to compromise. ꙃ Low interaction needs fewer resources but has a great limitation. It can only interact with the hackers for one or two times, which makes it easy for hackers to find that this a trap. ꙃ The high interactive trap network make use of the actual vulnerable service or software. They are usually complex solutions as they involve real operating systems and applications.
  • 8. ◊ Control Center is a host which configures and manages the agents in the segment, and its main function is to complete alarm receiving and display, alarm analysis and results show, and other function. ◊ Low interaction and high interaction of honeypot simulates the host operation system and some basic services in it to construct virtual Honeypot, generate the second level of agent nodes and then redirect the hacker attack part of the second level agent nodes to the first level of agent node. ◊ Because Honeypot does not simulate every aspect of the operation system, but only simulates network services, thus the behavior of the hackers will be limited to network level Defense system mechanism KARTHIK BHARADWAJ A R MANOJ M
  • 9. Making Honeypot attractive ‫ﻡ‬ Google tools were therefore used to ensure the system appeared in Google searches and were searchable using Google search terms known as ‘dorks,’ for the specific internet facing control system components. ‫ﻡ‬ The findings indicated that the Shodan (www.shodan.io) search engine used industrial protocols to obtain specific information from automation devices. Normally search engines such as Shodan would identify the processor type from standard HTTP requests. An engineering approach to Honeypot design  Control system honeypots have been widely deployed as virtualized systems, which tend to have a low level of fidelity.  The research developed a methodology which can be applied to multiple sectors for active defense. The research intent was to implement and operate an industrial control system honeypot.  In the initial stages the project scope was defined to inform the design and ultimately the development and operation of the system. The areas addressed at this stage were the type of system to be modeled, and the situational awareness requirements. KARTHIK BHARADWAJ A R MANOJ M
  • 10. Methodology overview  Facilitate Industry/stakeholder workshop to define industry needs and desired outcomes;  Methodology report/system specification; x Control system and process build;  Data capture and analysis  Infrastructure design and implementation;  ICS System deployment;  Ongoing campaign and analysis;  Final report and presentation with collated findings. Honeypot implementation was undertaken in six stages: 1. Industrial sector and control process selection; 2. Construction of the control system. This included the selection of components, PLC programming, HMI and SCADA development, plant process simulation and system modeling; 3. Implementation of security monitoring infrastructure, including selection of software and systems. 4. Integration of control system and security monitoring infrastructure; 5. System testing; 6. Exposure to the Internet. KARTHIK BHARADWAJ A R MANOJ M
  • 11. The OT honeypot consists of four major components: 1. Control systems and process simulation; 2. Situational Awareness and Forensics (SAF) platform; 3. The attacker’s infrastructure; 4. Remote monitoring infrastructure for the honeypot This was implemented in a standalone environment. The aim being to explore the feasibility of different implementations, whilst making the system attractive, and maintain separation from actual operational systems. KARTHIK BHARADWAJ A R MANOJ M
  • 12. KARTHIK BHARADWAJ A R MANOJ M
  • 13. Advantages  Data Collections o Only captures relevant data o Small data sets o High value  Minimize recourse usage o Less bandwidth or activity than other security implementation  Simplicity o Less complex than other security mechanism such as intrusion detection systems o Less chance of misconfiguration  Cost o No need for high resource usage o Depends on the application Disadvantages  Single point of attack o Useless if it is not attacked  Risk o Have a risk of being exploited - depends on the type of honeypot  Limited view o Limited data – only captures what interacts with it and not the whole scope of the system  Costs o Development costs, analysis costs o Depends on the applications KARTHIK BHARADWAJ A R MANOJ M