SlideShare a Scribd company logo
Honeypot: Defense through the
deception
Presented by:
Karthik Bharadwaj A R
bharadwajkarthik4@gmail.com
Manoj M
manoj09633@gmail.com
Department of Electronics and Communications
Jawaharalal Nehru National college of engineering, Shivamogga
Background
 Industrial control systems (ICS) are typically defined as the systems which govern an
industrial process.
 Business processes relying upon ICS Operational Technology (OT) have high operational
demands, often having safety-related functionality and specific system performance criteria.
Introduction
 For computer network, its own characteristics such as the diversity of linking forms, the
openness, and interconnectivity make the network vulnerable to hackers, malicious software
and other forms of attack.
 The information security mechanisms in traditional sense are generally passive defense, such
as firewalls, intrusion detections systems, and encryption, and so on.
KARTHIK BHARADWAJ A R MANOJ M
 However, with the continuous development of attack technology, the existing protection
technology often does not recognize the new attack, always in a passive position.
 Honeypot uses beguiled technology, is a voluntary means to protect the network, and the
research on it mainly is to study how to design a strict deception environment.
 It can detect unknown attacks and collect invasion information at the same time to observe
the behavior of the invader, record their activates so that analyzing the level, purpose, tools
and means of the invader
KARTHIK BHARADWAJ A R MANOJ M
Honeypot System Principle
₾ Honeypot system is a network resource; it is created to be a host which actually exist and has
attraction to hackers; but it’s main purpose is to be used for being attacked and explored.
₾ Honeypot records the network communicating data between the hackers and honeypot host,
and then using analytic tools to interpret and analyses these data, thus the methods and
motives of the attackers entering the system will be found.
KARTHIK BHARADWAJ A R MANOJ M
₰ Honeypot system is generally composed by induced, deceived and analysis modules.
₰ The induced modules is used to attract the attackers to attack on the honeypot system; thus
deceived module calls the simulating information from the database.
₰ The analysis module is used for adjusting the induction and deception strategy momentarily.
KARTHIK BHARADWAJ A R MANOJ M
Honeypot defense system design idea
ꙃ The existing trap networks are laid with low interaction and high interaction.
ꙃ Pure honeypots are full-fledged systems where an attacker’s activity is monitored by a bug
tap installed on the honeypot’s link to the network. Being a full OS based honeypot made
them difficult to scale and open to compromise.
ꙃ Low interaction needs fewer resources but has a great limitation. It can only interact with the
hackers for one or two times, which makes it easy for hackers to find that this a trap.
ꙃ The high interactive trap network make use of the actual vulnerable service or software. They
are usually complex solutions as they involve real operating systems and applications.
◊ Control Center is a host which configures and manages the agents in the segment, and its main
function is to complete alarm receiving and display, alarm analysis and results show, and other
function.
◊ Low interaction and high interaction of honeypot simulates the host operation system and
some basic services in it to construct virtual Honeypot, generate the second level of agent
nodes and then redirect the hacker attack part of the second level agent nodes to the first level
of agent node.
◊ Because Honeypot does not simulate every aspect of the operation system, but only simulates
network services, thus the behavior of the hackers will be limited to network level
Defense system mechanism
KARTHIK BHARADWAJ A R MANOJ M
Making Honeypot attractive
‫ﻡ‬ Google tools were therefore used to ensure the system appeared in Google searches and were
searchable using Google search terms known as ‘dorks,’ for the specific internet facing control
system components.
‫ﻡ‬ The findings indicated that the Shodan (www.shodan.io) search engine used industrial
protocols to obtain specific information from automation devices. Normally search engines
such as Shodan would identify the processor type from standard HTTP requests.
An engineering approach to Honeypot design
 Control system honeypots have been widely deployed as virtualized systems, which tend to
have a low level of fidelity.
 The research developed a methodology which can be applied to multiple sectors for active
defense. The research intent was to implement and operate an industrial control system
honeypot.
 In the initial stages the project scope was defined to inform the design and ultimately the
development and operation of the system. The areas addressed at this stage were the type of
system to be modeled, and the situational awareness requirements.
KARTHIK BHARADWAJ A R MANOJ M
Methodology overview
 Facilitate Industry/stakeholder workshop to define industry needs and desired outcomes;
 Methodology report/system specification; x Control system and process build;
 Data capture and analysis
 Infrastructure design and implementation;
 ICS System deployment;
 Ongoing campaign and analysis;
 Final report and presentation with collated findings.
Honeypot implementation was undertaken in six stages:
1. Industrial sector and control process selection;
2. Construction of the control system. This included the selection of components, PLC
programming, HMI and SCADA development, plant process simulation and system modeling;
3. Implementation of security monitoring infrastructure, including selection of software and
systems.
4. Integration of control system and security monitoring infrastructure;
5. System testing;
6. Exposure to the Internet.
KARTHIK BHARADWAJ A R MANOJ M
The OT honeypot consists of four major components:
1. Control systems and process simulation;
2. Situational Awareness and Forensics (SAF) platform;
3. The attacker’s infrastructure;
4. Remote monitoring infrastructure for the honeypot
This was implemented in a standalone environment. The aim being to explore the feasibility of
different implementations, whilst making the system attractive, and maintain separation from
actual operational systems.
KARTHIK BHARADWAJ A R MANOJ M
KARTHIK BHARADWAJ A R MANOJ M
Advantages
 Data Collections
o Only captures relevant data
o Small data sets
o High value
 Minimize recourse usage
o Less bandwidth or activity than other security
implementation
 Simplicity
o Less complex than other security mechanism
such as intrusion detection systems
o Less chance of misconfiguration
 Cost
o No need for high resource usage
o Depends on the application
Disadvantages
 Single point of attack
o Useless if it is not attacked
 Risk
o Have a risk of being exploited - depends on
the type of honeypot
 Limited view
o Limited data – only captures what interacts
with it and not the whole scope of the
system
 Costs
o Development costs, analysis costs
o Depends on the applications
KARTHIK BHARADWAJ A R MANOJ M
Questions
KARTHIK BHARADWAJ A R MANOJ M
Honeypot-Defense through Mechanism

More Related Content

What's hot

INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
ijcsit
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
Omar Shaya
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
IJERA Editor
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Jowin John Chemban
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
Trinity Dwarka
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
Dr. Amrita .
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
amiable_indian
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Nikhil Singh
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
Affine Analytics
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
Pritesh Ranjan
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
Full Stack Developer at Electro Mizan Andisheh
 
4
44
5
55
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Editor IJMTER
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
OECLIB Odisha Electronics Control Library
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
IOSR Journals
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET Journal
 

What's hot (20)

INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
4
44
4
 
5
55
5
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 

Similar to Honeypot-Defense through Mechanism

Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
IRJET Journal
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
IRJET Journal
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
IRJET Journal
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
IJCSIS Research Publications
 
A05510105
A05510105A05510105
A05510105
IOSR-JEN
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
RajathV2
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityIAEME Publication
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
IJERA Editor
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET Journal
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
Eng. Mohammed Ahmed Siddiqui
 
Modern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent HoneypotModern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent Honeypot
IRJET Journal
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
Mohamed Elfadly
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
Mohamed Elfadly
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
IRJET Journal
 

Similar to Honeypot-Defense through Mechanism (20)

Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
A05510105
A05510105A05510105
A05510105
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
 
504 508
504 508504 508
504 508
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Ananth3
Ananth3Ananth3
Ananth3
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Modern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent HoneypotModern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent Honeypot
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 

Honeypot-Defense through Mechanism

  • 2. Presented by: Karthik Bharadwaj A R bharadwajkarthik4@gmail.com Manoj M manoj09633@gmail.com Department of Electronics and Communications Jawaharalal Nehru National college of engineering, Shivamogga
  • 3. Background  Industrial control systems (ICS) are typically defined as the systems which govern an industrial process.  Business processes relying upon ICS Operational Technology (OT) have high operational demands, often having safety-related functionality and specific system performance criteria. Introduction  For computer network, its own characteristics such as the diversity of linking forms, the openness, and interconnectivity make the network vulnerable to hackers, malicious software and other forms of attack.  The information security mechanisms in traditional sense are generally passive defense, such as firewalls, intrusion detections systems, and encryption, and so on. KARTHIK BHARADWAJ A R MANOJ M
  • 4.  However, with the continuous development of attack technology, the existing protection technology often does not recognize the new attack, always in a passive position.  Honeypot uses beguiled technology, is a voluntary means to protect the network, and the research on it mainly is to study how to design a strict deception environment.  It can detect unknown attacks and collect invasion information at the same time to observe the behavior of the invader, record their activates so that analyzing the level, purpose, tools and means of the invader KARTHIK BHARADWAJ A R MANOJ M
  • 5. Honeypot System Principle ₾ Honeypot system is a network resource; it is created to be a host which actually exist and has attraction to hackers; but it’s main purpose is to be used for being attacked and explored. ₾ Honeypot records the network communicating data between the hackers and honeypot host, and then using analytic tools to interpret and analyses these data, thus the methods and motives of the attackers entering the system will be found. KARTHIK BHARADWAJ A R MANOJ M
  • 6. ₰ Honeypot system is generally composed by induced, deceived and analysis modules. ₰ The induced modules is used to attract the attackers to attack on the honeypot system; thus deceived module calls the simulating information from the database. ₰ The analysis module is used for adjusting the induction and deception strategy momentarily. KARTHIK BHARADWAJ A R MANOJ M
  • 7. Honeypot defense system design idea ꙃ The existing trap networks are laid with low interaction and high interaction. ꙃ Pure honeypots are full-fledged systems where an attacker’s activity is monitored by a bug tap installed on the honeypot’s link to the network. Being a full OS based honeypot made them difficult to scale and open to compromise. ꙃ Low interaction needs fewer resources but has a great limitation. It can only interact with the hackers for one or two times, which makes it easy for hackers to find that this a trap. ꙃ The high interactive trap network make use of the actual vulnerable service or software. They are usually complex solutions as they involve real operating systems and applications.
  • 8. ◊ Control Center is a host which configures and manages the agents in the segment, and its main function is to complete alarm receiving and display, alarm analysis and results show, and other function. ◊ Low interaction and high interaction of honeypot simulates the host operation system and some basic services in it to construct virtual Honeypot, generate the second level of agent nodes and then redirect the hacker attack part of the second level agent nodes to the first level of agent node. ◊ Because Honeypot does not simulate every aspect of the operation system, but only simulates network services, thus the behavior of the hackers will be limited to network level Defense system mechanism KARTHIK BHARADWAJ A R MANOJ M
  • 9. Making Honeypot attractive ‫ﻡ‬ Google tools were therefore used to ensure the system appeared in Google searches and were searchable using Google search terms known as ‘dorks,’ for the specific internet facing control system components. ‫ﻡ‬ The findings indicated that the Shodan (www.shodan.io) search engine used industrial protocols to obtain specific information from automation devices. Normally search engines such as Shodan would identify the processor type from standard HTTP requests. An engineering approach to Honeypot design  Control system honeypots have been widely deployed as virtualized systems, which tend to have a low level of fidelity.  The research developed a methodology which can be applied to multiple sectors for active defense. The research intent was to implement and operate an industrial control system honeypot.  In the initial stages the project scope was defined to inform the design and ultimately the development and operation of the system. The areas addressed at this stage were the type of system to be modeled, and the situational awareness requirements. KARTHIK BHARADWAJ A R MANOJ M
  • 10. Methodology overview  Facilitate Industry/stakeholder workshop to define industry needs and desired outcomes;  Methodology report/system specification; x Control system and process build;  Data capture and analysis  Infrastructure design and implementation;  ICS System deployment;  Ongoing campaign and analysis;  Final report and presentation with collated findings. Honeypot implementation was undertaken in six stages: 1. Industrial sector and control process selection; 2. Construction of the control system. This included the selection of components, PLC programming, HMI and SCADA development, plant process simulation and system modeling; 3. Implementation of security monitoring infrastructure, including selection of software and systems. 4. Integration of control system and security monitoring infrastructure; 5. System testing; 6. Exposure to the Internet. KARTHIK BHARADWAJ A R MANOJ M
  • 11. The OT honeypot consists of four major components: 1. Control systems and process simulation; 2. Situational Awareness and Forensics (SAF) platform; 3. The attacker’s infrastructure; 4. Remote monitoring infrastructure for the honeypot This was implemented in a standalone environment. The aim being to explore the feasibility of different implementations, whilst making the system attractive, and maintain separation from actual operational systems. KARTHIK BHARADWAJ A R MANOJ M
  • 12. KARTHIK BHARADWAJ A R MANOJ M
  • 13. Advantages  Data Collections o Only captures relevant data o Small data sets o High value  Minimize recourse usage o Less bandwidth or activity than other security implementation  Simplicity o Less complex than other security mechanism such as intrusion detection systems o Less chance of misconfiguration  Cost o No need for high resource usage o Depends on the application Disadvantages  Single point of attack o Useless if it is not attacked  Risk o Have a risk of being exploited - depends on the type of honeypot  Limited view o Limited data – only captures what interacts with it and not the whole scope of the system  Costs o Development costs, analysis costs o Depends on the applications KARTHIK BHARADWAJ A R MANOJ M