Network Forensic Based On Honeynet: Deepali Kansal, Navdeep Singh Sethi
Network Forensic Based On Honeynet: Deepali Kansal, Navdeep Singh Sethi
I.
INTRODUCTION
In the ever changing world of global data communications, inexpensive Internet connections, and fastpaced software development, security is becoming more and more of an issue. Security is now a basic requirement because global computing is inherently insecure. As your data goes from one computer to Next computer on the Internet, for example, it will pass through several other points along the way, giving other users the opportunity to intercept, and even alter it. So the security of data and the system is the main issues. It does nothing to protect your data center, other servers in your network, or a malicious user with physical access to your EnGarde system. By learning the about tools and techniques used by intruder, we can secure our IT assets and infrastructure. Honeypots provide information about black-hat techniques and tactics by which they have been able to gain illegitimate access to system resources. In last several years, the functionality and use of computer systems have increased vastly, which leads to an increasing complexity of these systems. An attacker can use such vulnerabilities to gain remote access, granting partial or full control over these computer systems. The attacker can initiate the attack from any arbitrarily system connected to the Internet that is already under the control of the attacker. The Honeypot system has no production value and has no authorized activity. Thus any interaction with the Honeypot is most likely the result of malicious intent. Honeypots do not provide security but provide data and knowledge that aids the system administrator in enhancing the overall security of their network. This knowledge about the threat can be used as input to any early warning systems. Over the years, researchers have successfully isolated and identified worms and exploits using Honeypots placed in specialized architectures called Honeynets. They give insight into attacks and attackers, their skill level, their organization as groups or individuals, their motives and tactics, and thus, almost every aspect is logged and can be made auditable.Virtualization software helps reducing the cost ownership of the IT infrastructure of organization. Virtualization Technique like VMware [1] provides the flexibility to create a specialized network of hosts on a single physical machine. In this experiment we use free and Open Source tools and technologies that run on a Linux platform. Linux based operating systems have been used as the host OS and for guest OS virtual machines. This includes a Linux based Honeypot and a Honeywall gateway. We also use sebek as a data capture tool [2]. We can enhance the overall security of our network resources after study the results.
II.
BACKGROUND
A. Honeypots Honeypots is a technology that is rapidly maturing and establishing this counter measure as viable and useful in modern network defense. Honeypot focus on the principles of detection, response and monitor. It is not useful to reducing the impact of internal cyber attacks in organizations. A Honeypot is generally defined as a network security resource whose value lies in it being scanned, attacked, compromised, controlled and misused by an attacker to achieve his malicious goals. Lance Spitzner defines Honeypots as A Honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource [3]. Honeypots can be classified into two categories based on their level of interaction: Low-interaction Honeypot: Simulate the services frequently requested by attackers. Since they consume relatively resources, multiple virtual machines can easily be hosted on one physical system, the virtual systems have a short response time, and less code is required, reducing the complexity of the security of the virtual systems. Example: Honeyd [4].
www.iosrjen.org
25 | P a g e
III.
PROPOSED ARCHITECTURE
A. Problem Identification & Solution During our literature review we decided to use [7] as the template for our work implementation. Using VMware, a bridged interface like vmnet0 has direct access to the physical network interface. The problem is to find malicious activity roaming in LAN environment. So if someone is browsing some web page which is malicious in production environment and if that malicious links drop some files which are malicious, then honeypot is able to detect that dropped files.Thus we developed a framework for capturing the data in production environment by deploying a honeynet system in production environment in which two interfaces will cause a bridge between the same LAN segments resulting in loops in the network. B. Design Details and Discussion Similar design problems were being faced and discussed by security researchers all over the globe who wanted to implement a similar virtual Honeynet. We implemented a honeynet architecture which combines the both low and high interaction honeypots. For the low-interaction part we used Nepenthes and for the highinteraction part we implemented a virtual honeynet architecture based on the Virtualbox [9] virtualization software. The low- and high-interaction honeypots are deployed separately, and the backup of the collected
www.iosrjen.org
26 | P a g e
Fig 1: Proposed Design for Organization Network In our implementation, we used only one physical machines which contain the virtual honeypots as guest OS and a baseOS machine to get all the collection of attack data and to monitor the activities and processes on the honeypots. All of the honeypots are deployed and configured on the virtual machines. A small daemon that creates virtual hosts on a network is configured to make a virtual router and some virtual operating systems. The honeypot is configured to run arbitrary services also. It can also emulate any TCP or UDP port number with open, closed, or blocked states with simple port listeners. Port applications can be mimicked by installing service scripts and proxies. Anyone can ping and/or trace route the virtual machines simulated with any type of service. C. Result and Discussion Our honeypots were online for a period of approximately 90 days from March to May of 2012. During this period we received over 100,000 identified attack connections. These results provide the better insight to the readers about what was observed in our honeypot experiment. During this period our honeypot environment suffered different kind of attacks. Table 1 shows the number of attack connections during the observation period: Protocol Connections Percentage
TCP 88365 95.42% UDP 482 0.52% ICMP 3759 4.03% 92606 100% Total Table 1: Total connections per protocol By looking at Table 1, we can see that TCP is the most used protocol by attackers. This can be explained by the fact that multiple service and applications use TCP compare to other protocols. The number of established connections on two honeypots was more than on the other honeypots. It happened because of many open ports and real and emulated services run on those two honeypots. This indicates that those two machines have been continuously scanned by vulnerability scanners and the rate of the connection attempts on the network services HTTP (80), SMTP (25), POP (110), SSH (22) was higher.
www.iosrjen.org
27 | P a g e
Fig 2: Top attacked ports Top Attacked Countries: Out of these countries the highest number of attacks came from China and Europe followed by the US. The same proportion also stands for the highest attack frequencies.
IV.
CONCLUSION
The implemented honeynet architecture is used for gathering attack data and tracking the activities carried out by the attackers. Then we have captured and classified the network packets. The aim was to study the attackers detail by using knowledge based on this analysis. It appears that most of the observed attacks were automated and carried out by script kiddies. This work will help organizations to select proper protection mechanism for their networks by evaluating the impact of detected attacks, and taking into consideration the attackers skill and knowledge level.
REFERENCES
[1]. [2]. [3]. [4]. [5]. [6]. [7].
VMware. (2008) VMware Server 1.0.6 Free.Available:http://www.vmware.com/download/server/. Last accessed 20 Aug 2008. Know Your Enemy: Sebek, A kernel based data capture tool, The Honeynet Project, http://www.honeynet.org, Last Modified: 17 November 2003 Spitzner L. (2002). Honeypots: Tracking Hackers.US: Addison Wesley. pp 1-430Honeyd, http://www.honeyd.org/ Stoll, C. The Cuckoos Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books, New York, 1990 Cheswick, B. (1991). An Evening with Berferd, in Which a Cracker Is Lured, Endured, and Studied. Forum of Incident Response and Security Teams (FIRST). T H Project, Know your Enemy. Addison-Wesley, 2nd ed., 2004.[8] Know Your Enemy: Defining Virtual Honeynets. http://old.honeynet.org/papers/virtual [9] VirtualBox. (2004) Sun VirtualBox User Manual. Available: http://www.virtualbox.org/manual/UserManual.html. The Honeynet Project. (2005). KnowYour Enemy: oneywall CDROM Roo. Available:http://old.honeynet.org/ papers/cdrom/Roo/index.html. Last accessed 5 May 2008.
www.iosrjen.org
28 | P a g e