SlideShare a Scribd company logo
International Journal of Research in Advent Technology, Vol.3, No.12, December 2015
E-ISSN: 2321-9637
Available online at www.ijrat.org
27
A New Approach towards Design and Development of
Portable Honeypot
Rohan Thakur1
, Ashu Singla2
SSIET, Dera Bassi, Punjab, India
1
, Hartron Chandigarh, India
2
thakur577@gmail.com1
, 4s.ashu@gmail.com2
Abstract-A honeypot is a system that pretends to be an attractive target to attract malware and attackers. A
honeypot has no productive use; each attempt to connect it can be interpreted as an attack. Based on honeypot
deployment topology, if it is deployed in front of a firewall, it serves as an early warning system, if deployed
behind the firewall, it serve as part of defense-in-depth system, in such case it helps to detect attackers who
bypass the firewall and IDS(intrusion detection system) or it can be an insider threat. According to the level of
interaction between the attacker and the honeypots, the honeypots are generally divided into three categories:
low, medium and high. Configuring and maintaining a high interaction honeypot is always a tough task for new
security researcher and network administrators. The purpose of this study is to design and implement easy to
configure, easy to deploy, portable high interaction honeypot. To reduce the burden on the deployment of
honeypot, we implemented the system on the USB as a live USB system, which gives the system features of easy
installation, high portability and plug-n-play operation. In this paper an idea is presented on portable honeypot on
a USB device that aims at fast detection of malicious network activity and thus boosts the security awareness of
its user.
Index Terms- Early Warning Security System, Live USB Honeypot, Portable USB Honeypot
1. INTRODUCTION
A honeypot is a closely monitored computing resource
that we want to be probed, attacked, or compromised.
More precisely, a honeypot is "an information system
resource whose value lies in unauthorized or illicit use
of that resource". The value of a honeypot is weighed
by the information that can be obtained from it.
Monitoring the data that enters and leaves a honeypot
lets us gather information that is not available to
NIDS. For example, we can log the keystrokes of an
interactive session even if encryption is used to protect
the network traffic. To detect malicious behavior,
NIDS requires signatures of known attacks and often
fail to detect compromises that were unknown at the
time it was deployed. On the other hand, honeypots
can detect vulnerabilities that are not yet understood.
For example, we can detect compromise by observing
network traffic leaving the honeypot, even if the
means of the exploit has never been seen before.
Because a honeypot has no production value, any
attempt to contact it is suspicious by definition.
Consequently, forensic analysis of data collected from
honeypots is less likely to lead to false positives than
data collected by NIDS. Most of the data that we
collect with the help of a honeypot can help us to
understand attacks.
Honeypots can run any operating system and any
number of services. The configured services determine
the vectors available to an adversary for
compromising or probing the system. A high-
interaction honeypot provides a real system the
attacker can interact with. In contrast, a low-
interaction honeypots simulates only some parts — for
example, the network stack [1]. A high-interaction
honeypot can be compromised completely, allowing
an adversary to gain full access to the system and use
it to launch further network attacks. In contrast, low-
interaction honeypots simulate only services that
cannot be exploited to get complete access to the
honeypot. Low interaction honeypots are more
limited, but they are useful to gather information at a
higher level — for example, to learn about network
probes or worm activity. They can also be used to
analyze spammers or for active countermeasures
against worms; neither of these two approaches is
superior to the other; each has unique advantages and
disadvantages.
Further honeypots can be described in two more types;
physical and virtual honeypots. A physical honeypot is
a real machine on the network with its own IP address.
A virtual honeypot is simulated by another machine
that responds to network traffic sent to the virtual
honeypot.
When gathering information about network attacks or
probes, the number of deployed honeypots influences
the amount and accuracy of the collected data. A good
example is measuring the activity of HTTP-based
worms [2]. We can identify these worms only after
they complete a TCP handshake and send their
payload. However, most of their connection requests
will go unanswered because they contact randomly
chosen IP addresses. A honeypot can capture the worm
payload by configuring it to function as a web server
or by simulating vulnerable network services. The
more honeypots we deploy, the more likely one of
them is contacted by a worm.
This paper begins with the concept of implementation
of High-Interaction Portable Passive Honeypot.
Complete Honeypot system is a live system i.e. the
International Journal of Research in Advent Technology, Vol.3, No.12, December 2015
E-ISSN: 2321-9637
Available online at www.ijrat.org
28
system is a complete bootable computer installation,
including operating system, which runs in computer’s
memory, rather than loading from a hard disk drive. It
allows users to run an operating system for any
purpose without installing it or making any changes to
the computer's configuration. At the end of a live USB
session the computer remains as it was before. The
live system is able to run without permanent
installation by placing the files that normally would be
stored on a hard drive into RAM, typically in a RAM
disk. The computer must have sufficient RAM both to
store these files and maintain normal operation. Now
the advantage of the above system is that even if our
Honeypot is compromised the system will come to its
initial state once it is rebooted.
According to the statistics by the Computer
Emergency Response Team (CERT), the number of
reported security incidents per year is rising and
malicious users are increasingly using automated
attack tools [3], in order to detect and stop malicious
activities, and protect their assets, organizations
implement various security tools and methods. Two of
the most common security tools that are used today to
protect organizations network are firewalls and
Intrusion Detection Systems (IDS). Firewalls are most
often implemented at the network perimeters where
they control network traffic. This control is employed
according to a set of rules which define allowed and
denied network traffic. IDS monitor network traffic
and alert the administrator when a known malicious
activity is detected. In order to detect a malicious
activity, IDS will use two methods: signature detection
and anomaly based detection. These security tools
have some inherent shortcomings [4]. A firewall
cannot stop malicious users exploiting a new
vulnerability in a service to which access is allowed
by the firewall rules. IDS cannot reliably detect a
previously unknown attack, especially if only
signature detection is used. If anomaly based detection
is used, it is based "on the assumption that intrusive
activities are necessarily different from non-intrusive
activities at some level of observation." [5] None of
these methods of detection can guarantee that the IDS
will report all attacks, so false negative detections will
exist.
This motivated us to create this system to capture
these unknown attacks and study the attacks in order
to help security agencies and researchers. We studied
references for already existing high interaction
systems and noted the limitation of existing
systems. Then we created, and designed our own
system and tried to improve on the drawbacks of other
existing system. For this first we made it a live system
(always running in memory). Generally when high
interaction honeypots are compromised, the state
changes becomes persistent and it is difficult to bring
back the system to its original state. Making the
system as live system overcomes this problem such
that the system comes to its original state just by
rebooting. Then we added data control module, data
control prevents attackers from using a compromised
honeypot system to attack other external computer
systems. To hide the network interactions from
attackers, we created a different system to perform
data capturing activities, the data will go through this
new machine, which is hidden to attacker and attacker
will only see victim machine having vulnerabilities.
1. OBJECTIVE AND SCOPE
Scope of this work includes portable high interaction
USB passive Honeypot, its design, development,
configuration and installation. Low Interaction,
Medium Interaction and Client Honeypots are out of
this scope. Analysis and Classification of collected
PCAP data is also out of the scope of this work.
The Objective of this work is to design and develop
completely portable high interaction honeypot.
Honeypot should be easy to deploy and configure. If
honeypot system gets compromised it should be easy
to restore the state of the system to its original state
and at the same time we should be able to collect
attack data.
In our study of Honeypots and particularly High
Interaction Honeypots we found that these Honeypots
are quite difficult to install and deploy. In addition to
this, maintenance of these honeypots is bit risky, as an
attacker can completely compromise the system and
use the honeypot to initiate outbound
connections/attacks. In comparison low interaction
honeypots are not risky, as it is not an actual operating
system; it is just like a simulated environment of set of
network services. Medium Interaction Honeypot is the
combination of real as well as simulated services.
3. BLOCK DIAGRAM OF THE SYSTEM
Cent OS ISO Live
Virtualbox Installed
(Base OS/Machine)
(High Interaction Passive Honeypot)
Window XP/2007 ISO Live
(Guest OS)
(Data Capture and Data Control Module)
Cent OS ISO Live
TCP Dump and Snort Installed
(Guest OS)
eth0
eth0
eth1
eth0
International Journal of Research in Advent Technology, Vol.3, No.12, December 2015
E-ISSN: 2321-9637
Available online at www.ijrat.org
29
The complete system consists of 3 sub systems, i.e.
one Base OS and two Guest OS
1. Base OS: Cent OS with Virtualbox.
2. Guest OS: (Data capture and Data
Control): Cent OS with tcpdump and
Snort.
3. Guest OS: (High Interaction Honeypot):
Windows XP/2007
4. FLOWCHART TO BUILD THE SYSTEM
The flow chat depicts the high level steps followed
to build the system. The system is build based on
the Live CD concept. Generally High Interaction
Honeypots are standalone desktops or Virtual OS
systems running from system hard disk drive. In
this case the virtual Honeypot OS runs on USB
stick/Pen drive. The complete system is on the USB
stick running in Live mode.
5. FLOWCHART TO INITIALIZE THE
SYSTEM
The flow chart depicts the USB Initialization steps. To
run the system from USB stick, first boot device needs
to be marked as USB disk in system BIOS. After
system boots up from USB two scripts are executed
serially. First script initialize the virtual box, creates
storage paths and starts virtual machines. Second
script establishes the network setup between base os,
data control virtual machine and Honeypot machine.
Once both scripts run successfully the system is up
and Honeypot gets started.
International Journal of Research in Advent Technology, Vol.3, No.12, December 2015
E-ISSN: 2321-9637
Available online at www.ijrat.org
30
6. LIVE USB HONEYPOT RUNNING
SCREENSHOTS
Fig.1. Live USB Honeypot Base OS (Centos)
Fig.2. Desktop Base OS
Fig.3. Data Capture Live Image Up
Fig.4. Live Window 7 VM Initializing
Fig.5. Windows 7 Live Image Up
Fig.6. Live Honeypot (Base CentOS, Data Control
[Data Capture], Windows 7 Live)
7. CONCLUSION AND FUTURE SCOPE
With this Portable honeypot, we have the opportunity
to collect those unknown attacks that are generally
missed by traditional security tools like firewalls and
intrusion detection system (IDS) and thus collect the
valuable attack data. By making it a live system i.e.
system always running in memory, persistent state
changes are avoided, as system comes to its original
state once rebooted. In addition to this, the system is
pre-installed with required packages and is a kind of
plug and play device; therefore the system can be
deployed in any network with great ease.
From this initial work, we have identified some
possibilities for future work that could be developed
further.
• Develop the Client Server model of the same
system in which the collected network data
and other attack data such as binaries will be
sent to Central Server for data collection and
statistical analysis of collected data.
• Apart from High Interaction Honeypot, we
can add Low and Medium Interaction
International Journal of Research in Advent Technology, Vol.3, No.12, December 2015
E-ISSN: 2321-9637
Available online at www.ijrat.org
31
Honeypots like Honeyd and Nepenthes.
• We can add High and Low Interaction Client
Honeypots to this system
• Develop a front end to configure Honeypot.
• Develop a front-end for attack data
visualization.
REFERENCES
[1] Niels Provos. A virtual honeypot framework. In
Proceedings of 13th USENIX Security
Symposium, pp. 1–14. USENIX, 2004.
[2] Niels Provos, Joe McClain, and Ke Wang. Search
worms. In WORM '06:Proceedings of the 4th
ACM Workshop on Recurring Malcode, pp. 1–8,
NewYork, 2006. ACM Press.
[3] Computer Emergency Response Center (CERT),
"CERT/CC Statistics 1988-2004,"
http://www.cert.org/stats/cert_stats.html, 2004.
[4] J. Levine, R. LaBella, H. Owen, D. Contis, B.
Culver, "The Use of Honeynets to Detect
Exploited Systems Across Large Enterprise
Networks," IEEE Systems, Man and Cybernetics
Society, 18-20 June 2003, (pp. 92-99)
[5] J. McHugh (2001), "Intrusion and intrusion
detection," International Journal of Information
Security 1, (pp. 14-35)

More Related Content

What's hot

Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
ijtsrd
 
Honey pots
Honey potsHoney pots
Honey pots
Divya korrapati
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
IJERA Editor
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
ijp2p
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
Momita Sharma
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot Security
IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar
 
Honeypots
HoneypotsHoneypots
Honeypots
Bilal ZIANE
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
Editor IJMTER
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Gregory Hanis
 
Integrated honeypot
Integrated honeypotIntegrated honeypot
Integrated honeypot
IAEME Publication
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
Netwax Lab
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network securitychella mani
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
NSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEMNSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEM
International Journal of Technical Research & Application
 

What's hot (20)

Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
M0704071074
M0704071074M0704071074
M0704071074
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot Security
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Honeypots
HoneypotsHoneypots
Honeypots
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Integrated honeypot
Integrated honeypotIntegrated honeypot
Integrated honeypot
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network security
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
NSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEMNSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEM
 

Viewers also liked

Paper id 42201614
Paper id 42201614Paper id 42201614
Paper id 42201614
IJRAT
 
Paper id 42201607
Paper id 42201607Paper id 42201607
Paper id 42201607
IJRAT
 
Paper id 24201472
Paper id 24201472Paper id 24201472
Paper id 24201472IJRAT
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569IJRAT
 
Paper id 42201604
Paper id 42201604Paper id 42201604
Paper id 42201604
IJRAT
 
Paper id 28201439
Paper id 28201439Paper id 28201439
Paper id 28201439
IJRAT
 
Paper id 36201512
Paper id 36201512Paper id 36201512
Paper id 36201512IJRAT
 
Paper id 25201452
Paper id 25201452Paper id 25201452
Paper id 25201452IJRAT
 
Paper id 312201526
Paper id 312201526Paper id 312201526
Paper id 312201526
IJRAT
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
Paper id 312201505
Paper id 312201505Paper id 312201505
Paper id 312201505
IJRAT
 
Paper id 312201516
Paper id 312201516Paper id 312201516
Paper id 312201516
IJRAT
 
Paper id 35201575
Paper id 35201575Paper id 35201575
Paper id 35201575IJRAT
 
Paper id 42201619
Paper id 42201619Paper id 42201619
Paper id 42201619
IJRAT
 
Paper id 41201605
Paper id 41201605Paper id 41201605
Paper id 41201605
IJRAT
 
Paper id 37201503
Paper id 37201503Paper id 37201503
Paper id 37201503IJRAT
 
Paper id 312201524
Paper id 312201524Paper id 312201524
Paper id 312201524
IJRAT
 
Paper id 26201494
Paper id 26201494Paper id 26201494
Paper id 26201494
IJRAT
 
Paper id 24201427
Paper id 24201427Paper id 24201427
Paper id 24201427IJRAT
 
Paper id 37201505
Paper id 37201505Paper id 37201505
Paper id 37201505IJRAT
 

Viewers also liked (20)

Paper id 42201614
Paper id 42201614Paper id 42201614
Paper id 42201614
 
Paper id 42201607
Paper id 42201607Paper id 42201607
Paper id 42201607
 
Paper id 24201472
Paper id 24201472Paper id 24201472
Paper id 24201472
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569
 
Paper id 42201604
Paper id 42201604Paper id 42201604
Paper id 42201604
 
Paper id 28201439
Paper id 28201439Paper id 28201439
Paper id 28201439
 
Paper id 36201512
Paper id 36201512Paper id 36201512
Paper id 36201512
 
Paper id 25201452
Paper id 25201452Paper id 25201452
Paper id 25201452
 
Paper id 312201526
Paper id 312201526Paper id 312201526
Paper id 312201526
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
Paper id 312201505
Paper id 312201505Paper id 312201505
Paper id 312201505
 
Paper id 312201516
Paper id 312201516Paper id 312201516
Paper id 312201516
 
Paper id 35201575
Paper id 35201575Paper id 35201575
Paper id 35201575
 
Paper id 42201619
Paper id 42201619Paper id 42201619
Paper id 42201619
 
Paper id 41201605
Paper id 41201605Paper id 41201605
Paper id 41201605
 
Paper id 37201503
Paper id 37201503Paper id 37201503
Paper id 37201503
 
Paper id 312201524
Paper id 312201524Paper id 312201524
Paper id 312201524
 
Paper id 26201494
Paper id 26201494Paper id 26201494
Paper id 26201494
 
Paper id 24201427
Paper id 24201427Paper id 24201427
Paper id 24201427
 
Paper id 37201505
Paper id 37201505Paper id 37201505
Paper id 37201505
 

Similar to Paper id 312201513

IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
IRJET Journal
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
IJERA Editor
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
IRJET Journal
 
idps
idpsidps
idps
iskrene
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
Anton Chuvakin
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)amar koppal
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
Kelly Taylor
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
Kirubaburi R
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot frameworkUltraUploader
 
Honey pots
Honey potsHoney pots
Honey pots
Dhaivat Zala
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
Piyu Karande
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
IRJET Journal
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
ijsrd.com
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
Eswar Publications
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
Amit Poonia
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works BriefSunny Geo
 

Similar to Paper id 312201513 (20)

Honeypots
HoneypotsHoneypots
Honeypots
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 
Ananth3
Ananth3Ananth3
Ananth3
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
idps
idpsidps
idps
 
Ananth1
Ananth1Ananth1
Ananth1
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot framework
 
Honey pots
Honey potsHoney pots
Honey pots
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 

More from IJRAT

96202108
9620210896202108
96202108
IJRAT
 
97202107
9720210797202107
97202107
IJRAT
 
93202101
9320210193202101
93202101
IJRAT
 
92202102
9220210292202102
92202102
IJRAT
 
91202104
9120210491202104
91202104
IJRAT
 
87202003
8720200387202003
87202003
IJRAT
 
87202001
8720200187202001
87202001
IJRAT
 
86202013
8620201386202013
86202013
IJRAT
 
86202008
8620200886202008
86202008
IJRAT
 
86202005
8620200586202005
86202005
IJRAT
 
86202004
8620200486202004
86202004
IJRAT
 
85202026
8520202685202026
85202026
IJRAT
 
711201940
711201940711201940
711201940
IJRAT
 
711201939
711201939711201939
711201939
IJRAT
 
711201935
711201935711201935
711201935
IJRAT
 
711201927
711201927711201927
711201927
IJRAT
 
711201905
711201905711201905
711201905
IJRAT
 
710201947
710201947710201947
710201947
IJRAT
 
712201907
712201907712201907
712201907
IJRAT
 
712201903
712201903712201903
712201903
IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Recently uploaded

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

Paper id 312201513

  • 1. International Journal of Research in Advent Technology, Vol.3, No.12, December 2015 E-ISSN: 2321-9637 Available online at www.ijrat.org 27 A New Approach towards Design and Development of Portable Honeypot Rohan Thakur1 , Ashu Singla2 SSIET, Dera Bassi, Punjab, India 1 , Hartron Chandigarh, India 2 thakur577@gmail.com1 , 4s.ashu@gmail.com2 Abstract-A honeypot is a system that pretends to be an attractive target to attract malware and attackers. A honeypot has no productive use; each attempt to connect it can be interpreted as an attack. Based on honeypot deployment topology, if it is deployed in front of a firewall, it serves as an early warning system, if deployed behind the firewall, it serve as part of defense-in-depth system, in such case it helps to detect attackers who bypass the firewall and IDS(intrusion detection system) or it can be an insider threat. According to the level of interaction between the attacker and the honeypots, the honeypots are generally divided into three categories: low, medium and high. Configuring and maintaining a high interaction honeypot is always a tough task for new security researcher and network administrators. The purpose of this study is to design and implement easy to configure, easy to deploy, portable high interaction honeypot. To reduce the burden on the deployment of honeypot, we implemented the system on the USB as a live USB system, which gives the system features of easy installation, high portability and plug-n-play operation. In this paper an idea is presented on portable honeypot on a USB device that aims at fast detection of malicious network activity and thus boosts the security awareness of its user. Index Terms- Early Warning Security System, Live USB Honeypot, Portable USB Honeypot 1. INTRODUCTION A honeypot is a closely monitored computing resource that we want to be probed, attacked, or compromised. More precisely, a honeypot is "an information system resource whose value lies in unauthorized or illicit use of that resource". The value of a honeypot is weighed by the information that can be obtained from it. Monitoring the data that enters and leaves a honeypot lets us gather information that is not available to NIDS. For example, we can log the keystrokes of an interactive session even if encryption is used to protect the network traffic. To detect malicious behavior, NIDS requires signatures of known attacks and often fail to detect compromises that were unknown at the time it was deployed. On the other hand, honeypots can detect vulnerabilities that are not yet understood. For example, we can detect compromise by observing network traffic leaving the honeypot, even if the means of the exploit has never been seen before. Because a honeypot has no production value, any attempt to contact it is suspicious by definition. Consequently, forensic analysis of data collected from honeypots is less likely to lead to false positives than data collected by NIDS. Most of the data that we collect with the help of a honeypot can help us to understand attacks. Honeypots can run any operating system and any number of services. The configured services determine the vectors available to an adversary for compromising or probing the system. A high- interaction honeypot provides a real system the attacker can interact with. In contrast, a low- interaction honeypots simulates only some parts — for example, the network stack [1]. A high-interaction honeypot can be compromised completely, allowing an adversary to gain full access to the system and use it to launch further network attacks. In contrast, low- interaction honeypots simulate only services that cannot be exploited to get complete access to the honeypot. Low interaction honeypots are more limited, but they are useful to gather information at a higher level — for example, to learn about network probes or worm activity. They can also be used to analyze spammers or for active countermeasures against worms; neither of these two approaches is superior to the other; each has unique advantages and disadvantages. Further honeypots can be described in two more types; physical and virtual honeypots. A physical honeypot is a real machine on the network with its own IP address. A virtual honeypot is simulated by another machine that responds to network traffic sent to the virtual honeypot. When gathering information about network attacks or probes, the number of deployed honeypots influences the amount and accuracy of the collected data. A good example is measuring the activity of HTTP-based worms [2]. We can identify these worms only after they complete a TCP handshake and send their payload. However, most of their connection requests will go unanswered because they contact randomly chosen IP addresses. A honeypot can capture the worm payload by configuring it to function as a web server or by simulating vulnerable network services. The more honeypots we deploy, the more likely one of them is contacted by a worm. This paper begins with the concept of implementation of High-Interaction Portable Passive Honeypot. Complete Honeypot system is a live system i.e. the
  • 2. International Journal of Research in Advent Technology, Vol.3, No.12, December 2015 E-ISSN: 2321-9637 Available online at www.ijrat.org 28 system is a complete bootable computer installation, including operating system, which runs in computer’s memory, rather than loading from a hard disk drive. It allows users to run an operating system for any purpose without installing it or making any changes to the computer's configuration. At the end of a live USB session the computer remains as it was before. The live system is able to run without permanent installation by placing the files that normally would be stored on a hard drive into RAM, typically in a RAM disk. The computer must have sufficient RAM both to store these files and maintain normal operation. Now the advantage of the above system is that even if our Honeypot is compromised the system will come to its initial state once it is rebooted. According to the statistics by the Computer Emergency Response Team (CERT), the number of reported security incidents per year is rising and malicious users are increasingly using automated attack tools [3], in order to detect and stop malicious activities, and protect their assets, organizations implement various security tools and methods. Two of the most common security tools that are used today to protect organizations network are firewalls and Intrusion Detection Systems (IDS). Firewalls are most often implemented at the network perimeters where they control network traffic. This control is employed according to a set of rules which define allowed and denied network traffic. IDS monitor network traffic and alert the administrator when a known malicious activity is detected. In order to detect a malicious activity, IDS will use two methods: signature detection and anomaly based detection. These security tools have some inherent shortcomings [4]. A firewall cannot stop malicious users exploiting a new vulnerability in a service to which access is allowed by the firewall rules. IDS cannot reliably detect a previously unknown attack, especially if only signature detection is used. If anomaly based detection is used, it is based "on the assumption that intrusive activities are necessarily different from non-intrusive activities at some level of observation." [5] None of these methods of detection can guarantee that the IDS will report all attacks, so false negative detections will exist. This motivated us to create this system to capture these unknown attacks and study the attacks in order to help security agencies and researchers. We studied references for already existing high interaction systems and noted the limitation of existing systems. Then we created, and designed our own system and tried to improve on the drawbacks of other existing system. For this first we made it a live system (always running in memory). Generally when high interaction honeypots are compromised, the state changes becomes persistent and it is difficult to bring back the system to its original state. Making the system as live system overcomes this problem such that the system comes to its original state just by rebooting. Then we added data control module, data control prevents attackers from using a compromised honeypot system to attack other external computer systems. To hide the network interactions from attackers, we created a different system to perform data capturing activities, the data will go through this new machine, which is hidden to attacker and attacker will only see victim machine having vulnerabilities. 1. OBJECTIVE AND SCOPE Scope of this work includes portable high interaction USB passive Honeypot, its design, development, configuration and installation. Low Interaction, Medium Interaction and Client Honeypots are out of this scope. Analysis and Classification of collected PCAP data is also out of the scope of this work. The Objective of this work is to design and develop completely portable high interaction honeypot. Honeypot should be easy to deploy and configure. If honeypot system gets compromised it should be easy to restore the state of the system to its original state and at the same time we should be able to collect attack data. In our study of Honeypots and particularly High Interaction Honeypots we found that these Honeypots are quite difficult to install and deploy. In addition to this, maintenance of these honeypots is bit risky, as an attacker can completely compromise the system and use the honeypot to initiate outbound connections/attacks. In comparison low interaction honeypots are not risky, as it is not an actual operating system; it is just like a simulated environment of set of network services. Medium Interaction Honeypot is the combination of real as well as simulated services. 3. BLOCK DIAGRAM OF THE SYSTEM Cent OS ISO Live Virtualbox Installed (Base OS/Machine) (High Interaction Passive Honeypot) Window XP/2007 ISO Live (Guest OS) (Data Capture and Data Control Module) Cent OS ISO Live TCP Dump and Snort Installed (Guest OS) eth0 eth0 eth1 eth0
  • 3. International Journal of Research in Advent Technology, Vol.3, No.12, December 2015 E-ISSN: 2321-9637 Available online at www.ijrat.org 29 The complete system consists of 3 sub systems, i.e. one Base OS and two Guest OS 1. Base OS: Cent OS with Virtualbox. 2. Guest OS: (Data capture and Data Control): Cent OS with tcpdump and Snort. 3. Guest OS: (High Interaction Honeypot): Windows XP/2007 4. FLOWCHART TO BUILD THE SYSTEM The flow chat depicts the high level steps followed to build the system. The system is build based on the Live CD concept. Generally High Interaction Honeypots are standalone desktops or Virtual OS systems running from system hard disk drive. In this case the virtual Honeypot OS runs on USB stick/Pen drive. The complete system is on the USB stick running in Live mode. 5. FLOWCHART TO INITIALIZE THE SYSTEM The flow chart depicts the USB Initialization steps. To run the system from USB stick, first boot device needs to be marked as USB disk in system BIOS. After system boots up from USB two scripts are executed serially. First script initialize the virtual box, creates storage paths and starts virtual machines. Second script establishes the network setup between base os, data control virtual machine and Honeypot machine. Once both scripts run successfully the system is up and Honeypot gets started.
  • 4. International Journal of Research in Advent Technology, Vol.3, No.12, December 2015 E-ISSN: 2321-9637 Available online at www.ijrat.org 30 6. LIVE USB HONEYPOT RUNNING SCREENSHOTS Fig.1. Live USB Honeypot Base OS (Centos) Fig.2. Desktop Base OS Fig.3. Data Capture Live Image Up Fig.4. Live Window 7 VM Initializing Fig.5. Windows 7 Live Image Up Fig.6. Live Honeypot (Base CentOS, Data Control [Data Capture], Windows 7 Live) 7. CONCLUSION AND FUTURE SCOPE With this Portable honeypot, we have the opportunity to collect those unknown attacks that are generally missed by traditional security tools like firewalls and intrusion detection system (IDS) and thus collect the valuable attack data. By making it a live system i.e. system always running in memory, persistent state changes are avoided, as system comes to its original state once rebooted. In addition to this, the system is pre-installed with required packages and is a kind of plug and play device; therefore the system can be deployed in any network with great ease. From this initial work, we have identified some possibilities for future work that could be developed further. • Develop the Client Server model of the same system in which the collected network data and other attack data such as binaries will be sent to Central Server for data collection and statistical analysis of collected data. • Apart from High Interaction Honeypot, we can add Low and Medium Interaction
  • 5. International Journal of Research in Advent Technology, Vol.3, No.12, December 2015 E-ISSN: 2321-9637 Available online at www.ijrat.org 31 Honeypots like Honeyd and Nepenthes. • We can add High and Low Interaction Client Honeypots to this system • Develop a front end to configure Honeypot. • Develop a front-end for attack data visualization. REFERENCES [1] Niels Provos. A virtual honeypot framework. In Proceedings of 13th USENIX Security Symposium, pp. 1–14. USENIX, 2004. [2] Niels Provos, Joe McClain, and Ke Wang. Search worms. In WORM '06:Proceedings of the 4th ACM Workshop on Recurring Malcode, pp. 1–8, NewYork, 2006. ACM Press. [3] Computer Emergency Response Center (CERT), "CERT/CC Statistics 1988-2004," http://www.cert.org/stats/cert_stats.html, 2004. [4] J. Levine, R. LaBella, H. Owen, D. Contis, B. Culver, "The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks," IEEE Systems, Man and Cybernetics Society, 18-20 June 2003, (pp. 92-99) [5] J. McHugh (2001), "Intrusion and intrusion detection," International Journal of Information Security 1, (pp. 14-35)