bsa2016 - honeypots for network security monitoring

Post on 13-Jan-2017

1.372 Views

Category:

Technology

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Using Honeypots for Network SecurityMonitoring

Chris SandersBsides Augusta 2016

Chris Sanders (@chrissanders88)

Find Evil @ FireEye Founder @ Rural Tech

Fund PhD Researcher GSE # 64 BBQ Pit Master Author:

Practical Packet Analysis Applied NSM

Agenda Security Economics Traditional Honeypots NSM Honeypots Honeypot Applications

“Why honeypots are a cost effective strategy for enhancing your network security monitoring strategy.”

Security Economics

Economics of Security“If you want to understand the world of nature, master physics. If you want to understand the world of man, master economics.” - Taufiq Rashid

High Demand

for Security Expertise

Low Supply of Security

Practitioners

Expertise

Services

Software

It’s not enough for security to be good, it has to be affordable to purchase, operate, and maintain.

Cost Effective NSM

COST

EFFECTIVENESS

Analytics/ML

AntivirusNGFW

SIEM

EndpointIDS/IPS

Honeypots

Where do most security solutions rank in terms of cost effectiveness?

History of Honeypots

Seminal Work Large Orgs and Defense Many Academic Papers The Honeynet Project Honeyd Software

Traditional Honeypots Designed to be

attacked Intentionally vulnerable Primarily used for

specific research Originally useful for

learning about attackers

Useful for tracking scanning and proliferation of worms

Honeypot Architecture

Hold Your Horses!1. Honeypots take a lot

of time to maintain.2. Honeypots introduce

tremendous risk.3. Attackers can use

honeypots as a foothold.

4. Honeypots are only for the most mature organizations.

Honeypots for NSM

NSM Honeypots Premise:

Nobody should ever talk to a honeypot

Attributes:1. Placed inside the

network2. Mimic existing systems3. Low interaction4. Extensive logging and

alerting5. Goal oriented

Your honeypot strategy should be an integrated component of your NSM strategy.

Integrating NSM Honeypots

NSM Strate

gy

Honeypots

Integrating NSM Honeypots

Honeypots

NSM Strategy

Honeypot Applications

Goal-Oriented Deception

Mimic Reality Capture Interaction

Generate an Alert

Systems

UsersData

Protect the Systems

Mimic Reality Capture Interaction

Generate an Alert

Protect: Windows Systems using RDP1. Deploy an RDP Honeypot [Tom’s,

OpenCanary]2. Capture any connection attempt3. Generate an alert to your SIEM/SOC

Protect the Data

Mimic Reality Capture Interaction

Generate an Alert

Protect: HR data in spreadsheets1. Deploy a HoneyDoc2. Embed web bug that phones home3. Configure OS file access monitoring 4. Generate an alerts when doc phones

home, or when file is accessed.

Protect the Users

Mimic Reality Capture Interaction

Generate an Alert

Protect: Service account credentials1. Create limited access honeyusers

[DCEPT]2. Detect cleartext credentials in memory3. Generate an alert to your SIEM/SOC

Call to Action

Your NSM strategy is incomplete if you aren’t leveraging honeypot infrastructure for detection.

The Challenge Analysts…

...start looking for implementation opportunities.

Managers… ...ensure this technique is part of your

analysts toolbelt. Vendors…

...develop affordable honeypot-based solutions.

Open Source Contributors… ...drive innovation in this space.

Recommended Honeypot Software

HoneypotsOpenCanaryTom’s HoneypotCowrie (SSH)RDPY (RDP)CanaryTokens.org

Management

AnsibleDockerChef

AlertingSnortSuricataBroSIEM

Other Honeypot SoftwareConpotDioneaeEnsnareESPotGaspotGlastopfGridpotHoneydHoneyntpHoneyPotter

HoneyPressHoneyprintHoneyPyKippoNodepotNoSQLpotShadow DaemonTelnetHoneyThugWordpot

https://github.com/paralax/awesome-honeypots

Thank You!

Mail: chris@chrissanders.orgTwitter: @chrissanders88Blog: chrissanders.org

top related