Honeypots in the Cloud
|
|
|
- Amberly Russell
- 10 years ago
- Views:
Transcription
1 Honeypots in the Cloud Stephen Brown, Rebecca Lam, Shishir Prasad, Sivasubramanian Ramasubramanian, and Josh Slauson University of Wisconsin - Madison December 19, 2012 Abstract Honeypots are systems used to trap, monitor, and identify erroneous requests within a network. For this project we conducted a study using honeypots within various cloud computing platforms ( such as Amazon EC2, Windows Azure etc.) with the objective of learning more about what kind of packets they receive. We used various honeypots such as Dionaea, Kippo, and Amun on our cloud instances and gathered data about where attacks came from, what kinds of attacks were made, and differences among cloud instances. We discovered that most attack traffic comes from the US and China and that most attacks are on SSH and HTTP. We also found that for the most part, attack traffic among the clouds was quite similar. We also identified Dionaea and Kippo as the honeypots which are most effective in the cloud setting. 1 Introduction With the rise of the internet, there has been a growing amount of traffic used for nefarious purposes. Thus, there is an growing need for detection and defense against the malicious traffic existing on the net. One tool used in network security is the honeypot. A honeypot is a decoy system used to attract and detect unauthorized or malicious traffic on the network. Honeypots are typically used for gathering information about attackers and gaining insight into their attack methodology. 1.1 Motivation Cloud computing is an emerging market with different types of services such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The inherent structure of the cloud presents security concerns unique to cloud networks. Users are allocated virtual machine instances that share physical resources with other users; this presents threats to each client s privacy and the integrity of the system as a whole. The clouds also serve as enticing targets for attackers, as they represent single locations where tousands of potential targets can be found. Thus, with its nascent popularity, cloud security is important both for companies that provide the service and those who rely on those services. 1.2 Contributions In this paper we present a study of honeypots in the cloud setting with with an emphasis on characterizing attack traffic across multiple clouds. We focus mainly on identifying the following: 1. Where do attacks come from? 2. What kind of attacks are made? 3. Are there differences across different cloud providers? The remainder of this article is organized as follows. Section 2 is a summary of related work. Section 3 discusses background on honeypots, and Section 4 discusses our experimental methodology and setup. In Section 5 we present our results, and in Section 7 we summarize our findings. 1
2 2 Related Work Honeypots have been used in many research papers to profile and detect unauthorized traffic. A vast majority of them involve honeypots in a non-cloud setting used for a variety of purposes such as detecting spam and trapping database attacks. A number of papers [3][4] use honeypots to monitor botnet activity and use this information to detect and disrupt botnets. Alata et.al perform a study using a high-interaction honeypot to examine attacks on SSH [1]. Similarly, [6] examines attack traffic using both low and high interaction honeypots within a university network. There have also been some papers that mention honeypots in a cloud setting. [2] suggests that cloud providers should provide honeypots as a profit-driven service to further their own security, while [7] describes the importance of honeypots as an emerging security tool for the cloud. 3 Honeypots As mentioned before, honeypots are systems that emulate vulnerabilities with the purpose of trapping and examining attacker traffic. There are multiple types of honeypots: low interaction, medium interaction, high interaction, and pure. Low interaction honeypots simulate services and passively log connections. Medium interaction honeypots also simulate services, but they respond to the attacker. High interaction honeypots emulate an entire system, and pure honeypots are full-fledged machines in a network. One advantage of a low interaction honeypot over a high interaction one is that it is easier to deploy and maintain. However, they are more easily detected. In contrast, high interaction honeypots are more difficult to detect but are harder to maintain.[8] 3.1 Deployed Honeypots 1. Dionaea is a low interaction honeypot that detects automated malware by emulating different protocols such as SMD, HTTP, FTP, TFTP, MSSQL, MySQL, and SIP. It emulates a vulnerable Windows 2000 system. 2. Kippo is a medium interaction SSH honeypot that emulates the shell. It simulates common linux commands and a fake file system. Commands issued by attackers are logged and can be replayed. 3. Amun is a low interaction honeypot aimed at capturing autonomous spreading malware. It works by emulating a number of vulnerability modules,monitoring ports, and logging shellcode and downloads away for later analysis. Amun can also be extended with custom XML modules. [5] 4. Artillery is a low interaction honeypot that listens on common ports and detects connection attempts. When any connection is detected, the corresponding IP address is blacklisted via an iptables rule. It can also detect SSH brute force attacks and derail them by blacklisting the IP address. File monitoring is another service it provides; it can be configured to monitor certain directories and send an alert if a change is detected. 5. Glastopf is a low interaction honeypot that emulates webserver vulnerabilities such as SQL injection and file inclusion. It works by providing a dynamic attack surface that can participate in multi-stage attacks. It fools attackers into thinking that their attacks were successful and captures the malware that is ultimately transmitted. 3.2 Other Honeypots 1. Honeyd is a very popular honeypot in off-cloud settings, and there are numerous studies attesting to its effectiveness. However, its dependence on DHCP prohibited us from including it in our study. 2. Artemisa is a VoIP honeypot which emulates a vulnerable VoIP client. It is no longer maintained, however, and we were unable to fully install it on our instances. 2
3 3. HiHat is an analysis tool which can transform any PHP application into a high-interaction honeypot. We launched several such instances, but none of them produced any meaningful traffic. 4. Honeybot is a Windows-based honeypot. While we were able to launch several instances of Honeybot, they produced very few results. 4 Methodology 4.1 Cloud providers In this study, we focus mainly on Amazon EC2 and Windows Azure, although we did also set up honeypots in IBM Smartcloud and ElasticHosts. Table 1 summarizes the features of the different clouds, as well as the locations of our deployed instances. Cloud Provider Operating System Service Instances Datacenters Amazon EC2 Ubuntu LTS IaaS 22 North Virginia, Tokyo, Singapore, Ireland, North California, North Oregon, Sydney, Sao Paulo Windows Azure Ubuntu LTS IaaS 14 East US, East Asia, Southeast Asia, West Europe, West US IBM Smartcloud Redhat Enterprise IaaS 5 Canada, Germany, Japan, West Linux 6.3 US, Singapore ElasticHosts Ubuntu LTS IaaS 1 Los Angeles,USA Table 1: A summary of cloud instances p0f Fingerprinting Tool p0f is a versatile passive OS fingerprinting tool. p0f can identify the system of machines that connect to your box, machines you connect to, and even machines that merely go through or near your box (even if the device is behind a packet firewall). We used p0f logs to extract the following data about the attacker: 1. Attacker s IP address 2. Operating System used by attacker to launch attacks e.g. Linux 2.6, Windows XP etc. 3. Port/Service targetted by attacker e.g. SSH, HTTP etc. 4. Attacker s mode of connection to internet e.g. ethernet/modem, DSL etc. 5. Number of network hops between attacker and honeypot instance 6. Uptime of attacker s machine 7. Time of attack Analyzer Setup To analyze the data generated across various honeypot instances, the following infrastructure was designed: 1. Backend infrastructure The backend infrastructure collects the data from various honeypot instances across the globe, processes it and persists it in a local database for subsequent analysis. It is written completely in Python. The main modules involved are: 3
4 (a) Extractor This module extracts the various log files like p0f log, honeypot-specific log files and honeypot database files from various honeypot instances. It is triggered daily once by a cron job and uses scp for securely copying the data from remote honeypot instances to the local machine. (b) Processor This module processes the log and database files and extracts information relevant to analysing honeypot data. The main sub-modules comprising this data cleanup phase are: i. Converter The local datastore is a MySQL database. But many honeypots store their data in sqlite3 databases. These has to be programatically converted to MySQL format to allow data integration. ii. Parser The p0f log files have to be parsed to extract various parameters like attacker IP address, OS details, distance from honeypot instances etc. iii. Enricher The extracted data is further enriched in this phase. For example, for each IP address found in the p0f logs, the country of origin is determined from a local IP address to country lookup database. Also, the md5 hashes of downloaded malwares are analysed using VirusTotal public API to determine the identity of the malware. (c) DataLoader Once the raw data in the log and database files has been cleaned, processed, and enriched, relevant information is persisted in a local MySQL database to facilitate data analytics. 2. Frontend infrastructure The frontend infrastructure analyses the data collected by the backend infrastructure, shows visualisations via charts and infers trends and attack patterns. It was designed using PhP and uses the Highcharts charting library extnesively for the visualization of our attack and attacker profile data. 5 Results 5.1 Attacker Profile Geographical Location The top countries from which attacks originated were essentially the same between EC2 and Azure. As can be seen in Figure 1 both clouds saw the most attacks from China and the United States, followed by Russia, Figure 1: Attacks by Country 4
5 Figure 2: Attacker IP Addresses Taiwan, Brazil, and Romania. Additionally, our instances were able to isolate a handful of IP Addresses that were responsible for thousands of connection attempts, as can be seen in Figure SSH Credentials Both clouds saw a large number of automated SSH brute force attacks. The most common username was root. Other usernames such as sa and mysql were attempted, but to a far lesser extent. As for passwords, attackers most commonly tried the empty sting ( ), , and password. Attackers also Figure 3: Common Attack Credentials 5
6 Figure 4: Most Downloaded Malwares tried variations of common passwords that users find easy to type such as qwerty and 1qaz2wsx. The results from EC2 can be seen in Figure 3. The results from Azure are nearly identical and are ommitted Malware Our dionaea instances were successfully able to log the malware that attackers attempted to download onto our systems. As can be seen in Figure 4 most of these were variations of the Conficker / Downadup / Kido worm. Figure 5: Common Attack Commands 6
7 Figure 6: Attacker Operating Systems Commands Attackers who successfully logged into the emulated SSH terminals on our Kippo instances followed a consistent attack vector. Upon logging in, they usually would enter w to observe the other users currently logged into the system. From there, commands such as ls and cpuinfo were commonplace. wget was used frequently, ostensibly to fetch malicious data to install. The frequency distribution of attacker commands can be seen in Figure Operating Systems A comparison of attacker Operating Systems can be seen in Figure 6. The honeypots in EC2 received roughly the same number of attacks from Linux-based attackers as Windows-based attackers. Our Azure instances received roughly 50% more attacks from Windows-based attackers. Additionally, we found that many attacks originate from very old Operating Systems this phenomenon was especially noticeable in EC2 and visible to a lesser extent in Azure. Roughly 27% of attackers in EC2 used Linux 2.6 or older, and 28% used Windows 2000 or XP. This proportion was much smaller in Azure: Linux 2.6 comprised only 6.52% of attackers, while Windows 2000 and XP made up 10.86% of attackers. Lastly, the number of OS systems which were not detected by p0f v2 OS fingerprinting tool were considerably higher in Azure as compared to EC2. This indicates that the proportion of attackers using newer versions of OS like Windows Vista, Linux etc. and newer types of OS like Android OS is more in case of Windows Azure than EC Cloud Discussion Amazon EC2 vs Windows Azure Amazon EC2 and Windows Azure services share a lot of similarities. They both offer infrastructure as a service (IaaS) where customers can launch virtual machines to be run in the cloud. Additionally, they both provide a wide variety of operating systems to use including many Linux and Windows distributions. They also have a few key differences listed below. 1. Azure puts a bigger focus on Windows-based operating systems than EC2. Windows Azure lists Windows operating systems first when selecting instance operating systems. Also, Azure charges the 7
8 same price per hour for Windows or Linux while EC2 charges significantly less for Linux operating systems. 2. The default way to access instances differs between them. Amazon EC2 provides users a private key file used to connect to instances via SSH. Windows Azure uses passwords for connecting to instances by default. These configurations can easily be changed after connecting to instances for the first time though. 3. Amazon EC2 easily allows all TCP or UDP ports to be opened for an instance. Windows Azure only allows ports to be allowed one by one. Like the services themselves, our results across Amazon EC2 and Windows Azure were similar. We found that attacks originated from similar locations across the two services. Also, SSH login credentials and attacked services were comparable. Furthermore, we did not find any major differences between the time of attacks between Amazon EC2 instances and Windows Azure instances. They both had rather bursty attack patterns. There were a few minor differences between the two services though, which are listed below. 1. A higher proportion of the attacks on Azure originated from operating systems released after This was drawn from the the number of fingerprints marked as unknown by p0f v2 (which was released in 2003). These unknown operating systems are most likely ones which were released since then. The number of such systems was far greater on Azure than on EC2. 2. Azure saw a higher proportion of Windows-based attacks than did EC2. This may be due to Azure greater emphasis on Windows-based instances IBM Smartcloud In addition to EC2 and Azure, we also had success in IBM Smartcloud, albeit to a lesser extent. We elected not to offer a comparision of IBM Smartcloud with the other clouds due to the lesser amount of collected data. We summarize our IBM Smartcloud results briefly by IP geographical location, SSH credentials, and attacker OS. The six most common origin regions for the IP addresses that were used to communicate with our honeypots were China, United States, South Korea, Germany, India, and Taiwan. 40.3% of IP addresses were from China, 9.1% were from the US, and 7.8% were from South Korea. Germany, India, and Taiwan were tied at 3.9% of addresses. In terms of SSH credentials, we found that the most common usernames by far was root which was used in 47% of the cases. After this were www, user, and testuser with 3.3%, 2.3%, and 2.3% frequency. Strangely, the most common password attempted was radumadalina at 35.2% frequency, which was closely followed by the blank string at 28.6%. The next two most attempted passwords such as and password were used in less than 1% of the total cases. As for the operating system, Windows and Linux were the most common with 94.0% and 4.5% of traffic, respectively. More specifically, Windows 2000, XP, and 2003 and Linux 2.6 were the most frequently used versions. 5.3 Honeypot Review A honeypot-by-honeypot comparison of data can be seen in Table 2. Based on the number of attacks received, it is clear that Dionaea and Kippo are very effective honeypots to deploy in a cloud-based environment. The other honeypots faired relatively poorly, as they only received port scans and no attacks. 6 Limitations There were several limitations of our study with respect to what and how we tested the honeypots in the various clouds. 8
9 Honeypot Port Scans (EC2) Port Scans (Azure) Attacks (EC2) Attacks (Azure) Our Rating Dionaea ,438 11, Stars Kippo ,269 77, Stars Artillery 41,490 16, Stars Amun , Stars Glastopf Star Table 2: A summary of port scans and attacks 1. Our comparative study is limited to EC2 and Azure, since they are the only clouds which currently offer free, easy-to-use services. ElasticHosts allowed for a 5-day trial, which we used to launch a single instance. However, the narrow timeframe for this single instance constituted a prohibitively-small sample size, from which we were unable to derive any meaningful results. IBM Smarcloud provided free hosting for Red Hat Linux instances, but we ran into difficulty when launching instances. IBM Smartcloud offers very little in the way of pre-configured machine images; thus, the amount of required setup prevented us from launching more than a few instances. The number of successfully launched instances was comparatively few relative to EC2 and Azure, and thus we were unable to include IBM Smartcloud in our cross-cloud analysis. 2. Because of the limitations on free accounts, our study was further limited to micro-instances on EC2 and Azure. It is possible that many attackers ignored our micro instances, given their small size; larger instances would likely be more effective platforms from which to study attackers in the cloud. 3. Our study was limited to low interaction honeypots, with the lone exception of Kippo, a mediuminteraction honeypot. Low and Medium interaction honeypots have the advantage of being easier to set up in the cloud, but are generally not as attactive to attackers. We investigated the use of high interaction honeypots such as HiHat; however, these instances did not generate any meaningful data. 4. Our honeypot study is confined to Linux-based instances. While we did launch several instances of Honeybot, a Windows-based honeypot, it produced very little meaningful data. 5. Many of the honeypots took a long time to configure correctly; this in turn limited the results we were able to collect. This difficulty can be attributed to a couple of reasons: 1) many of the honeypots are no longer maintained and have not received updates in many years, and 2) most of the honeypots lack up-to-date documentation, if any at all. 6. Our analysis of attacker operating systems was limited to pre-2003 systems. This limitation stems from our use of an outdated version of p0f. We used the version of p0f from the Ubuntu repository since it was easiest to configure and install across our many instances. However, that version was released in 2003 and thus, doe not contain fingerprint information for newer Operating Systems. 7 Conclusion In our study we were able to determine a basic attacker profile by deploying a variety of honeypots in several cloud instances such as Amazon EC2, Microsoft Azure, and IBM Smartcloud. We found that attacks mostly come from China and the US. The most commonly attempted user was root and most commonly attempted passwords were and The services that were targeted most frequently were SSH and HTTP. In terms of OS, Linux 2.6 and Windows 2000/XP were the most popular, and ethernet/modem was the connection protocol used the most. The timing of attacks was very random and bursty across all the regions and we could not identify any particular time of the day when hackers are most active. Overall, we can say that the attack traffic in EC2 and Azure is rather similar. By most of our metrics (Country of Origin, Login Credentials, Targeted Services, and Protocols), the clouds presented few differences. The most significant distinction observed was the choice of attacker Operating System, where Azure saw a higher rate of Windows-based attacks. 9
10 We were also able to identify the honeypots which are most effective in the cloud setting. Dionaea and Kippo performed very well and produced copious amounts of useful data. The other honeypots Amun, Artillery, and Glastopf were not as effective, given that they received little traffic beyond port scans. Group Member Contributions 1. Set up Kippo, Dionaea, and p0f on several instances in Amazon EC2 and Windows Azure. Also documented initial setup of Kippo. Researched and experimented with several other honeypots. 2. Set up Artillery, Glastopf, Kippo, Dionaea on IBM Smartcloud. Experimented with Honeyd, HiHat, and Amun also on IBM Smartcloud. Performed data aggregation on IBM data. Wrote significant proportion of proposal and final paper. 3. (a) Backend Infrastructure Designed and created the backend data integration and enrichment infrastructure in Python for collecting the data from all the honeypot instances, parsing it and persisting it in a local database for data analytics. (b) Frontend Infrastructure Designed the PhP web application Honeyweb - Know Thy Hackers to analyse the data collected from various honeypot instances. (c) Security Group Settings Fixed the security settings for EC2 which helped in increasing the traffic to the honeypot instances ten-fold. (d) p0f Fingerprinting Researched and suggested usage of p0f fingerprinting tool for passively extracting lots of information about hackers. (e) Honeypots Researched and suggested the setup of Amun, Artillery, HiHat honeypot to test their effectiveness in luring hackers. Launched nine EC2 micro instances across the globe to collect honeypot data. 4. Sivasubramanian.R([email protected]): (a) Honeypots on Azure Set Up instances of Dionaea, Kippo, Amun, Artillery, Hihat, Glastopf across the globe. (b) Windows Honeypots Researched and set up two windows bases honeypots on Azure - east asia (kfsensor and honeybot) (c) Backend Infrastructure Manipulation of queries of the Data Analytics tool for Kippo (Kippograph) to generate useful statistics and graphs. 5. Stephen([email protected]): Experimented with honeypot setup on ElasticHosts, researched and experimented with Artemisa, Honeybot, Honeyd, HiHat, and Glastopf honeypots. Hosted several of our EC2-based Dionaea, Kippo, and Glastopf instances across the globe. Wrote and edited significant portions of the final paper. 6. Everyone: Proposal Paper, Presentation, Final paper References [1] E. Alata, V. Nicomette, M. Kaâniche, M. Dacier, and M. Herrb. Lessons learned from the deployment of a high-interaction honeypot. In Dependable Computing Conference, EDCC 06. Sixth European, pages IEEE, [2] M. Balamurugan and B.S.C. Poornima. Honeypot as a service in cloud. [3] R. Challoo and R. Kotapalli. Detection of botnets using honeypots and p2p botnets. International Journal of Computer Science and Security (IJCSS), 5(5):496,
11 [4] E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the USENIX SRUTI Workshop, pages 39 44, [5] J. Göbel. Amun: A python honeypot. Universität Mannheim/Institut für Informatik, [6] R. McGrew. Experiences with honeypot systems: Development, deployment, and analysis. In System Sciences, HICSS 06. Proceedings of the 39th Annual Hawaii International Conference on, volume 9, pages 220a 220a. IEEE, [7] SR Nithin Chandra and TM Madhuri. Cloud security using honeypot systems. [8] L. Spitzner. Honeypots: Tracking Hackers. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA,
HEY! YOU! GET OFF MY CLOUD! ATTACKS AGAINST CLOUD HONEYPOTS. Martin Lee Neil Rankin
HEY! YOU! GET OFF MY CLOUD! ATTACKS AGAINST CLOUD HONEYPOTS Martin Lee Neil Rankin Cloud Adoption Choose two: Fast Cheap Good Cloud Models Public IaaS PaaS SaaS Private Cloud Models Public IaaS PaaS SaaS
Securing the system using honeypot in cloud computing environment
Volume: 2, Issue: 4, 172-176 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 M. Phil Research Scholar, Department of Computer Science Vivekanandha College
Advanced Honeypot System for Analysing Network Security
ISSN: 2347-3215 Volume 2 Number 4 (April-2014) pp. 65-70 www.ijcrar.com Advanced Honeypot System for Analysing Network Security Suruchi Narote 1* and Sandeep Khanna 2 1 Department of Computer Engineering.
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net [email protected]
Honeypots & Honeynets Overview Adli Wahid Security Specialist, APNIC.net [email protected] 1 Contents 1. ObjecCves 2. DefiniCon of Honeypot & Honeynets 3. Benefits & Risk consideracon 4. Example of Honeypot
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
USE HONEYPOTS TO KNOW YOUR ENEMIES
USE HONEYPOTS TO KNOW YOUR ENEMIES SHERIF MOUSA (EG-CERT) 9 MAY 2012 WHAT ARE WE GOING TO TALK ABOUT? What exactly happens on the end of your Internet connection. Open Source tools to set up your own Honeypot
Project Artillery Active Honeypotting. Dave Kennedy Founder, Principal Security Consultant https://www.trustedsec.com davek@trustedsec.
Project Artillery Active Honeypotting Dave Kennedy Founder, Principal Security Consultant https://www.trustedsec.com [email protected] About the Speaker Founder, Principal Security Consultant at TrustedSec.
Malicious Behavior in Voice over IP Infrastructure
Malicious Behavior in Voice over IP Infrastructure MIROSLAV VOZNAK, JAKUB SAFARIK, LUKAS MACURA and FILIP REZAC Department of Multimedia CESNET Zikova 4, 160 00 Prague CZECH REPUBLIC [email protected], [email protected],
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Dynamic Honeypot Construction
Dynamic Honeypot Construction 2nd Annual Alaska Information Assurance Workshop Christopher Hecker U. of Alaska, Fairbanks 9-5-2006 Presentation l Brief Introduction l Project Overview l Future Work l References
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Countermeasure for Detection of Honeypot Deployment
Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Countermeasure for Detection of Honeypot Deployment Lai-Ming Shiue 1, Shang-Juh
Keywords Intrusion detection system, honeypots, attacker, security. 7 P a g e
HONEYPOTS IN NETWORK SECURITY Abhishek Sharma Research Scholar Department of Computer Science and Engineering Lovely Professional University (Punjab) - India Abstract Computer Network and Internet is growing
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
An Introduction to Cloud Computing Concepts
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC [email protected]
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Getting Started with RES Automation Manager Agent for Linux
Getting Started with RES Automation Manager Agent for Linux Contents Chapter 1: Introduction 1 Chapter 2: Prerequisites and General Guidelines 2 Chapter 3: Installation 3 3.1 Manual Installation... 3 3.2
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
ENTERPRISE-CLASS MONITORING SOLUTION FOR EVERYONE ALL-IN-ONE OPEN-SOURCE DISTRIBUTED MONITORING
ENTERPRISE-CLASS MONITORING SOLUTION FOR EVERYONE ALL-IN-ONE OPEN-SOURCE DISTRIBUTED MONITORING 1 CONTENTS About Zabbix Software... 2 Main Functions... 3 Architecture... 4 Installation Requirements...
Nessus Agents. October 2015
Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing
Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
Security Advice for Instances in the HP Cloud
Security Advice for Instances in the HP Cloud Introduction: HPCS protects the infrastructure and management services offered to customers including instance provisioning. An instance refers to a virtual
Data Collection and Data Analysis in Honeypots and Honeynets
Data Collection and Data Analysis in Honeypots and Honeynets Pavol Sokol, Patrik Pekarčík, Tomáš Bajtoš [email protected], [email protected], [email protected] Institute of Computer
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
SECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
Honeypots Deployment for the Analysis and Visualization of Malware Activity and Malicious Connections
Honeypots Deployment for the Analysis and Visualization of Malware Activity and Malicious Connections Ioannis Koniaris 1, Georgios Papadimitriou 1, Petros Nicopolitidis 1, Mohammad Obaidat 2, Fellow of
What is Cloud Computing? Why call it Cloud Computing?
What is Cloud Computing? Why call it Cloud Computing? 1 Cloud Computing Key Properties Advantages Shift from CAPEX to OPEX Lowers barrier for starting a new business/project Can be cheaper even in the
User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID
Computer Forensics and Incident Response in the Cloud SESSION ID: ANF-T07A Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID Why forensics in the cloud? Cloud market revenue will increase at a 36%
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Threat Intelligence Report. April, 2015
Threat Intelligence Report April, 2015 2 Table of Contents I Executive Summary 3 II Global Data Analysis 4 Malicious Activities Source Countries 4 Attack Distribution Top 03 Foreign Attackers 4 III Malware
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS TESTING DECEPTIVE HONEYPOTS by Aymen Yahyaoui September 2014 Thesis Advisor: Second Reader: Neil C. Rowe J. D. Fulp Approved for public release; distribution
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Cloud Computing. Adam Barker
Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
Using Tofino to control the spread of Stuxnet Malware
technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the
Amazon AWS in.net. Presented by: Scott Reed [email protected]
Amazon AWS in.net Presented by: Scott Reed [email protected] Objectives Cloud Computing What Amazon provides Why Amazon Web Services? Q&A Instances Interacting with Instances Management Console Command
The Advanced Cyber Attack Landscape
The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training Tony Wong 1 Copyright Copyright 2012 2012 Hewlett-Packard Development Development Company, Company, L.P. The L.P. information
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION Kleissner & Associates Botconf 14, 3-5 Dec 2014, Nancy/France Worlds largest botnet monitoring system Since September 2012 Originally
Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs...
Connect With Confidence Astaro Log Management Getting Started Guide About this Getting Started Guide To use Astaro Log Management, logs need to be transferred from individual systems to the cloud. This
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
SANS Dshield Webhoneypot Project. OWASP November 13th, 2009. The OWASP Foundation http://www.owasp.org. Jason Lam
SANS Dshield Webhoneypot Project Jason Lam November 13th, 2009 SANS Internet Storm Center [email protected] The Foundation http://www.owasp.org Introduction Who is Jason Lam Agenda Intro to honeypot
Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide
Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide Contents Introduction... 2 Environment Topology... 2 Virtual Machines / System Requirements...
Norton Personal Firewall for Macintosh
Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for
Transformation of honeypot raw data into structured data
Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research
Features Overview Guide About new features in WhatsUp Gold v14
Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...
Getting Started with Sitecore Azure
Sitecore Azure 3.1 Getting Started with Sitecore Azure Rev: 2015-09-09 Sitecore Azure 3.1 Getting Started with Sitecore Azure An Overview for Sitecore Administrators Table of Contents Chapter 1 Getting
