SlideShare a Scribd company logo
HYBRID HONEYPOTS FOR
NETWORK SECURITY
content
1. INTRODUCTION
2. DEFINITION OF HONEYPOT
3. LEVELS OF INTERACTION
4. High level-interaction
5. honeynet
6. Low level-interaction
7. honeyed
8. COMPARISON
9. HYBRID HONEYPOT
ARCHITECTURE
10. HYBRID HONEYPOT
WORKING
11. Detection
12. Signature quality
13. Signature generation
14. True/false positive
ratio
15. conclusion
INTRODUCTION
 The purposes of honeypot are to detected and learn
from attacks and use that information provides
network security.
 Honeypots are analyzed by their role of application,
which is meant it can be used for production and
research.
DEFINITION OF HONEYPOT:
 "A honeypot is security resource whose value lies in
being probed, attacked, or compromised”.
 A honeypot is a system that is built and set up in order
to be hacked.
LEVEL OF INTERACTION:
Level of interaction determines the
amount of functionality a honeypot provides
 HIGH INTERACTION
 High learning
,complexity & risk
 LOW INTERACTION
 Low learning
,complexity & risk
HIGH LEVEL INTERACTION
 To reduce the load of high-interaction honeypots an effort is
made in architecture of high-interaction honeypot by
preprocessing the traffic using low-interaction honeypots as
much as possible.
 A high-interaction honeypot can be compromised completely,
allowing an adversary to gain full access to the system and use
it to launch further network attacks.
 In High Interaction Honeypots nothing is emulated everything
is real.
 High Interaction Honeypots provide a far more detailed picture
of how an attack or intrusion progresses or how a particular
malware execute in real-time.
HONEYNET
 Example of high-interaction honeypot is
honeynet. A honeynet is a network of multiple
systems.
 Honeynet can collect in-depth information
about attackers, such as their keystrokes when
they compromise a system, their chat sessions
with fellow black hats, or the tools they use to
probe and exploit vulnerable systems.
 This data can provide incredible insight on the
attacker themselves.
HONEYNET BY VMWARE
LOW LEVEL INTERACTION
 This kind of honeypot has a small chance of being
compromised.
 It is production honeypot.
 Typical use of low-interaction honeypot includes:
 port scans identification,
generation of attack signatures,
trend analysis and malware collection.
HONEYED
 This is an example of low interaction
honeypot .
 Honeyd is an open source low-interactivity
honeypot system that creates virtual hosts
that can be configured to run arbitrary
services and their personality can be
adapted so that they appear to be running
certain operating systems.
 Honeyd enables a single host to claim
multiple addresses.
Comparison Between High-Interaction
& Low-Interaction
Characteristics Low-Interaction
Honeypot
High-Interaction
Honeypot
Degree of Involvement Low High
Real Operating System No Yes
Risk Low High
Information Gathering Connections All
CompromisedWished No Yes
Knowledge to Run Low High
Knowledge to Develop Low Mid-High
MaintenanceTime Low Very High
HYBRID HONEYPOT
HYBRID HONEYPOT
ARCHITECTURE
 THIS IS AN EXAMPLE
OF COMBINATION OF
LOW-INTERACTION
HONEYPOT & HIGH-
INTERACTION
HONEYPOT.
 In this system, low-
interaction honeypot act as
lightweight proxy.
 We want high-interaction
honeypot to process all
 We need to offload them as
front end to high-interaction
honeypot because it is
instrumented machines.
 Honeyd has the appropriate
properties to play the role
of the front end and acts as
a filtering component. The
lightweight proxy responds
only to TCP/SYN requests
to ports that are open.
HYBRID HONEYPOT WORKING
The attacker sends a
TCP/ SYN packet to the
low-interaction honeypot.
If it is set to listen port,
then it sends a SYN/ACK
packet & waits to receive
the next packet.
If the packet is not an
ACK then the low-
interaction honeypot
assumes that it was a port
scan and the connection is
dropped.
If the third packet
received is ACK then it is a
valid TCP connection and
the zero point is reached.
Thus the low interaction
honeypot connects with
the high-interaction
honeypot running the
requested service.
Thenaftertheconnectionestablishmentthelow-interactionhoneypot
continuestoworkasaproxy.
Aslowandhigh-interactionhoneypotsbelongtothesamelocalnetwork,no
additionaldelaywillbeperceivedbytheattacker.
This diagramshowshow the Signalissent&received,theprocess
Ofmessagetransformation.
ACK-ACKnowledgement
TCP-TransferControlProtocol
DETECTION:
Wormsoftenusethesamepropagationmethodfromhosttohost;wecanapplythesame
contentchecksummingalgorithmtopacketoutofthebackendhoneypotandmatchthemtothe
MD5oftheinboundconnection.
Probe Size: The number of
different attacks (true positives/false
negatives) or the number of benign
interactions (true negatives/false
positives) if available.Establishment of Ground
Truth.:
Manual analysis: We did a
manual analysis to find the
actual number of attacks.
Reference system
Attack injection
Attack only
Benign only
Concept
 Attack Detection
Setup: The setup used
to evaluate attack
detection.
Parameters
Real-world deployment
Lab deployment, real-
world attacks
Lab deployment,
synthesized attacks
SIGNATURE QUALITY
Signature Generation Setup: The setup used to generate the
set of signatures for the signature quality assessment.
 Real-world deployment
 Lab deployment, synthesized traffic
 Lab deployment, replayed traffic traces
 Lab deployment, replayed but modified traffic traces
 Analytically assessed
Establishment of Ground Truth Parameters :
 Manual analysis
 Reference system
 Attack injection
 Attack only
SIGNATURE GENERATION
 Signature generation is the
process of defining all the
necessary characteristics of a
new thread to be able to detect
a new occurrence of the threat,
identify existing infected
hosts, and immunize against
additional infections.
 This system depicts the
interaction between HOST
and NETWORK based attack.
 Here we use Dynamic Tiant
True/FalsePositiveRatio
 True Positive Ratio (TPR) is a way showing how good the intrusion
detection is at alerting on real attacks. In our setting we use this to
better performance. TPR is obtained by the following formula:
 Where, TP= the number of alerts on malicious traffic, FN= the
number of missing alerts on malicious traffic.
 The total number of intrusion is given by TP+FN. False Positive Ratio
(FPR) shows the proportion of instances, which were not an attack but
still were alerted on. FPR is result of the following formula:
 Where, FP=the number of alerts on benign traffic, TN= the number of
correct
decisions on benign traffic. The total number of no-intrusion is given by
FP+TN.
CONCLUSION
Using hybrid honeypot, we achieve a number of goals:
 First, we need to maintain only a small number of high- interaction
honeypots since the portion of the traffic will be routed to them is
limited. All port- scan attempts or connection to port that is not open
will be stopped by low-interaction honeypots.
 Second, the high-interaction honeypots will be placed in a monitored
network. Thus if a honeypot gets infected, the infection rate will be
controllable either through limiting bandwidth or traffic reflection.
 Honeypots offer a unique perspective to defending networks by
learning the habits and techniques of the black hat at an additional
cost of minimal network alert reporting and monitoring time.
Hybrid honeypots for network security

More Related Content

What's hot

Honeypot
HoneypotHoneypot
Honeypot
Sajan Sahu
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
Kirubaburi R
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
Inder NeGi
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
KirtiGoyal25
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
Sina Manavi
 
Honeypot
Honeypot Honeypot
Honeypot
Sushan Sharma
 
Honeypots
HoneypotsHoneypots
Honeypots
HoneypotsHoneypots
Honeypots
SARANYA S
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
Arya AR
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
tushar mandal
 
Honey Pot
Honey PotHoney Pot
Honey Pot
iradarji
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
Ravindra Singh Rathore
 
Honeypot
HoneypotHoneypot
Honeypot
Akhil Sahajan
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
samrat saurabh
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
Rasool Irfan
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
Emil Tan
 
Honey pots
Honey potsHoney pots
Honey pots
Divya korrapati
 

What's hot (20)

Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Honeypot
Honeypot Honeypot
Honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
Honey pots
Honey potsHoney pots
Honey pots
 

Viewers also liked

Honeypot Social Profiling
Honeypot Social ProfilingHoneypot Social Profiling
Honeypot Social Profiling
Bryan Conde
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
 
HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.
Shantanu Kumar Das
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
amiable_indian
 
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
Manoj kumawat
 
Honeypot
HoneypotHoneypot
Honeypots
HoneypotsHoneypots
Honeypots
SARANYA S
 
Honey pots
Honey potsHoney pots
Honey pots
Alok Singh
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
Mandy Suzanne
 
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...
AFCEA International
 
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
Андрей Аваданей - Как с помощью honeypot защитить критические активы компанииАндрей Аваданей - Как с помощью honeypot защитить критические активы компании
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
HackIT Ukraine
 
Interactive presentation screen format 16-9 - minimal for slideshare
Interactive presentation   screen format 16-9 - minimal for slideshareInteractive presentation   screen format 16-9 - minimal for slideshare
Interactive presentation screen format 16-9 - minimal for slideshare
Patrick Keyzer
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
EnergySec
 

Viewers also liked (15)

Honeypot Social Profiling
Honeypot Social ProfilingHoneypot Social Profiling
Honeypot Social Profiling
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
 
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honey pots
Honey potsHoney pots
Honey pots
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...
 
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
Андрей Аваданей - Как с помощью honeypot защитить критические активы компанииАндрей Аваданей - Как с помощью honeypot защитить критические активы компании
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
 
Interactive presentation screen format 16-9 - minimal for slideshare
Interactive presentation   screen format 16-9 - minimal for slideshareInteractive presentation   screen format 16-9 - minimal for slideshare
Interactive presentation screen format 16-9 - minimal for slideshare
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 

Similar to Hybrid honeypots for network security

Ananth1
Ananth1Ananth1
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
أحلام انصارى
 
Honeypots
HoneypotsHoneypots
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
Momita Sharma
 
Honeypots
HoneypotsHoneypots
Honeypots
Jyoti Nagargoje
 
Presentation
PresentationPresentation
Presentation
HamzaHammami
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513
IJRAT
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot framework
UltraUploader
 
An internet worm early warning system
An internet worm early warning systemAn internet worm early warning system
An internet worm early warning system
UltraUploader
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
Education
 
SIP Flooding Attack Detection Using Hybrid Detection Algorithm
SIP Flooding Attack Detection Using Hybrid Detection AlgorithmSIP Flooding Attack Detection Using Hybrid Detection Algorithm
SIP Flooding Attack Detection Using Hybrid Detection Algorithm
Editor IJMTER
 
An architecture for generating semantic aware signatures
An architecture for generating semantic aware signaturesAn architecture for generating semantic aware signatures
An architecture for generating semantic aware signatures
UltraUploader
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behavior
IJECEIAES
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
milad saber
 
honeypotss.pptx
honeypotss.pptxhoneypotss.pptx
honeypotss.pptx
Poooi2
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
deepakmarndi
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
Emil Tan
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos Mitigation
Allot Communications
 
G0421040042
G0421040042G0421040042
G0421040042
ijceronline
 

Similar to Hybrid honeypots for network security (20)

Ananth1
Ananth1Ananth1
Ananth1
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Presentation
PresentationPresentation
Presentation
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot framework
 
An internet worm early warning system
An internet worm early warning systemAn internet worm early warning system
An internet worm early warning system
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
SIP Flooding Attack Detection Using Hybrid Detection Algorithm
SIP Flooding Attack Detection Using Hybrid Detection AlgorithmSIP Flooding Attack Detection Using Hybrid Detection Algorithm
SIP Flooding Attack Detection Using Hybrid Detection Algorithm
 
An architecture for generating semantic aware signatures
An architecture for generating semantic aware signaturesAn architecture for generating semantic aware signatures
An architecture for generating semantic aware signatures
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behavior
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
honeypotss.pptx
honeypotss.pptxhoneypotss.pptx
honeypotss.pptx
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos Mitigation
 
G0421040042
G0421040042G0421040042
G0421040042
 

Recently uploaded

AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Hybrid honeypots for network security

  • 2. content 1. INTRODUCTION 2. DEFINITION OF HONEYPOT 3. LEVELS OF INTERACTION 4. High level-interaction 5. honeynet 6. Low level-interaction 7. honeyed 8. COMPARISON 9. HYBRID HONEYPOT ARCHITECTURE 10. HYBRID HONEYPOT WORKING 11. Detection 12. Signature quality 13. Signature generation 14. True/false positive ratio 15. conclusion
  • 3. INTRODUCTION  The purposes of honeypot are to detected and learn from attacks and use that information provides network security.  Honeypots are analyzed by their role of application, which is meant it can be used for production and research. DEFINITION OF HONEYPOT:  "A honeypot is security resource whose value lies in being probed, attacked, or compromised”.  A honeypot is a system that is built and set up in order to be hacked.
  • 4. LEVEL OF INTERACTION: Level of interaction determines the amount of functionality a honeypot provides  HIGH INTERACTION  High learning ,complexity & risk  LOW INTERACTION  Low learning ,complexity & risk
  • 5. HIGH LEVEL INTERACTION  To reduce the load of high-interaction honeypots an effort is made in architecture of high-interaction honeypot by preprocessing the traffic using low-interaction honeypots as much as possible.  A high-interaction honeypot can be compromised completely, allowing an adversary to gain full access to the system and use it to launch further network attacks.  In High Interaction Honeypots nothing is emulated everything is real.  High Interaction Honeypots provide a far more detailed picture of how an attack or intrusion progresses or how a particular malware execute in real-time.
  • 6. HONEYNET  Example of high-interaction honeypot is honeynet. A honeynet is a network of multiple systems.  Honeynet can collect in-depth information about attackers, such as their keystrokes when they compromise a system, their chat sessions with fellow black hats, or the tools they use to probe and exploit vulnerable systems.  This data can provide incredible insight on the attacker themselves.
  • 8. LOW LEVEL INTERACTION  This kind of honeypot has a small chance of being compromised.  It is production honeypot.  Typical use of low-interaction honeypot includes:  port scans identification, generation of attack signatures, trend analysis and malware collection.
  • 9. HONEYED  This is an example of low interaction honeypot .  Honeyd is an open source low-interactivity honeypot system that creates virtual hosts that can be configured to run arbitrary services and their personality can be adapted so that they appear to be running certain operating systems.  Honeyd enables a single host to claim multiple addresses.
  • 10.
  • 11. Comparison Between High-Interaction & Low-Interaction Characteristics Low-Interaction Honeypot High-Interaction Honeypot Degree of Involvement Low High Real Operating System No Yes Risk Low High Information Gathering Connections All CompromisedWished No Yes Knowledge to Run Low High Knowledge to Develop Low Mid-High MaintenanceTime Low Very High
  • 12. HYBRID HONEYPOT HYBRID HONEYPOT ARCHITECTURE  THIS IS AN EXAMPLE OF COMBINATION OF LOW-INTERACTION HONEYPOT & HIGH- INTERACTION HONEYPOT.  In this system, low- interaction honeypot act as lightweight proxy.  We want high-interaction honeypot to process all  We need to offload them as front end to high-interaction honeypot because it is instrumented machines.  Honeyd has the appropriate properties to play the role of the front end and acts as a filtering component. The lightweight proxy responds only to TCP/SYN requests to ports that are open.
  • 13. HYBRID HONEYPOT WORKING The attacker sends a TCP/ SYN packet to the low-interaction honeypot. If it is set to listen port, then it sends a SYN/ACK packet & waits to receive the next packet. If the packet is not an ACK then the low- interaction honeypot assumes that it was a port scan and the connection is dropped. If the third packet received is ACK then it is a valid TCP connection and the zero point is reached. Thus the low interaction honeypot connects with the high-interaction honeypot running the requested service. Thenaftertheconnectionestablishmentthelow-interactionhoneypot continuestoworkasaproxy. Aslowandhigh-interactionhoneypotsbelongtothesamelocalnetwork,no additionaldelaywillbeperceivedbytheattacker. This diagramshowshow the Signalissent&received,theprocess Ofmessagetransformation. ACK-ACKnowledgement TCP-TransferControlProtocol
  • 14. DETECTION: Wormsoftenusethesamepropagationmethodfromhosttohost;wecanapplythesame contentchecksummingalgorithmtopacketoutofthebackendhoneypotandmatchthemtothe MD5oftheinboundconnection. Probe Size: The number of different attacks (true positives/false negatives) or the number of benign interactions (true negatives/false positives) if available.Establishment of Ground Truth.: Manual analysis: We did a manual analysis to find the actual number of attacks. Reference system Attack injection Attack only Benign only Concept  Attack Detection Setup: The setup used to evaluate attack detection. Parameters Real-world deployment Lab deployment, real- world attacks Lab deployment, synthesized attacks
  • 15. SIGNATURE QUALITY Signature Generation Setup: The setup used to generate the set of signatures for the signature quality assessment.  Real-world deployment  Lab deployment, synthesized traffic  Lab deployment, replayed traffic traces  Lab deployment, replayed but modified traffic traces  Analytically assessed Establishment of Ground Truth Parameters :  Manual analysis  Reference system  Attack injection  Attack only
  • 16. SIGNATURE GENERATION  Signature generation is the process of defining all the necessary characteristics of a new thread to be able to detect a new occurrence of the threat, identify existing infected hosts, and immunize against additional infections.  This system depicts the interaction between HOST and NETWORK based attack.  Here we use Dynamic Tiant
  • 17. True/FalsePositiveRatio  True Positive Ratio (TPR) is a way showing how good the intrusion detection is at alerting on real attacks. In our setting we use this to better performance. TPR is obtained by the following formula:  Where, TP= the number of alerts on malicious traffic, FN= the number of missing alerts on malicious traffic.  The total number of intrusion is given by TP+FN. False Positive Ratio (FPR) shows the proportion of instances, which were not an attack but still were alerted on. FPR is result of the following formula:  Where, FP=the number of alerts on benign traffic, TN= the number of correct decisions on benign traffic. The total number of no-intrusion is given by FP+TN.
  • 18. CONCLUSION Using hybrid honeypot, we achieve a number of goals:  First, we need to maintain only a small number of high- interaction honeypots since the portion of the traffic will be routed to them is limited. All port- scan attempts or connection to port that is not open will be stopped by low-interaction honeypots.  Second, the high-interaction honeypots will be placed in a monitored network. Thus if a honeypot gets infected, the infection rate will be controllable either through limiting bandwidth or traffic reflection.  Honeypots offer a unique perspective to defending networks by learning the habits and techniques of the black hat at an additional cost of minimal network alert reporting and monitoring time.