[iwar] [fc:Honeypots.Turn.The.Tables.On.Hackers]

From: Fred Cohen (fc@all.net)
Date: 2002-07-31 20:28:17


Return-Path: <sentto-279987-5100-1028172344-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 31 Jul 2002 20:30:12 -0700 (PDT)
Received: (qmail 29414 invoked by uid 510); 1 Aug 2002 03:24:38 -0000
Received: from n28.grp.scd.yahoo.com (66.218.66.84) by all.net with SMTP; 1 Aug 2002 03:24:38 -0000
X-eGroups-Return: sentto-279987-5100-1028172344-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.96] by n28.grp.scd.yahoo.com with NNFMP; 01 Aug 2002 03:25:44 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 1 Aug 2002 03:25:43 -0000
Received: (qmail 23344 invoked from network); 1 Aug 2002 03:25:43 -0000
Received: from unknown (66.218.66.217) by m13.grp.scd.yahoo.com with QMQP; 1 Aug 2002 03:25:43 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 1 Aug 2002 03:25:43 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g713SH918540 for iwar@onelist.com; Wed, 31 Jul 2002 20:28:17 -0700
Message-Id: <200208010328.g713SH918540@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 31 Jul 2002 20:28:17 -0700 (PDT)
Subject: [iwar] [fc:Honeypots.Turn.The.Tables.On.Hackers]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

Honeypots Turn The Tables On Hackers
EarthWeb
<a href="http://itmanagement.earthweb.com/secu/article/0,,11953_1436291,00.html">http://itmanagement.earthweb.com/secu/article/0,,11953_1436291,00.html>
July 30, 2002

Honeypots are positioned to become a key tool to defend the corporate
enterprise from hacker attacks, but some security watchers worry they
could bring a new set of security worries with them. 

Honeypots, which have been around for about 10 years but now are gaining
interest and momentum, are digital decoys, of sorts.  They are built to
be probed and attacked an online come-on to blackhat hackers.  Once the
honeypot is attacked, security administrators can watch how the hacker
moves around the system, and she can see what tools the hacker is using
and what information he s going after. 

It's a way to spy on your enemy. 

And if you're lucky, it might even be a form of camouflage.  Hackers
could be fooled into thinking they've accessed a corporate network, when
actually they're just banging around in a honeypot -- while the real
network remains safe and sound. 

"It's all about appearing to be something you're not to get the baddies
to show their hand," says George Bakos, senior security expert at the
Institute for Security Technology Studies at Dartmouth College in
Hanover, N.H.  "The information we glean from it is fantastic.  You can
observe details of the compromise -- what technology they use, their
intent, motivations and the resources they went after.  ...They give us
a leading indicator of things to come."

With the information culled from honeypots, Bakos says administrators
can refine their network defenses and better secure the company s
critical information. 

Bakos says honeypots are poised to become the third step in network
perimeter security.  The security line up will be filtering, detection
and deception. 

What is a honeypot?

There are a few types of honeypots.  Hardware-based honeypots are made
up of servers, switches and routers that are set up to mimic an actual
productive network.  They're usually spiced up with the addition of a
few misconfigurations or unpatched security holes.  The goal is for them
to look real and operational, as well as inviting to a hacker. 

There's also a form of a virtual honeypot.  Software emulation honeypots
are deception programs designed to appear to be a real working network. 
The honeypot program doesn't offer up any actual hardware for a
sophisticated hacker to compromise but it also offers the added
challenge of creating a simulation good enough to fool an intruder into
thinking he's in a real network.  That can be a complicated, and
time-consuming task, for the average IT worker. 

There also are honeynets, which are a network of honeypots, loaded up
with real hardware, like Linux boxes, Cisco switches, Windows NT and
Solaris.  Lance Spitzner, an engineer at Sun Microsystems Inc., created
the Honeynet Project with the help of about 30 other security
professionals. 

"Honeypots can be used to detect attacks and they can be used to get
information about attacks," says Spitzner.  "They're better than
intrusion detection systems because they can give you a lot of false
positives.  You get 8,000 to 10,000 alerts a day with IDS.  You don't
know what to pay attention to.  You get overwhelmed and you start
ignoring it all.  When a honeypot generates an alert, it's a real
attack.  No one should be connecting to it because it's not an actual
production network.  So if someone is on it, it's a probe or a scan or
an attack."

Keith Rhodes, chief technologist at the U.S.  General Accounting Office,
says honeypots should be part of a company's defense structure. 

"You set them up like fish bowls and watch what they're doing," says
Rhodes, whose job is to test networks at government agencies, finding
their weaknesses by breaking into them.  "You set up a diversionary
network and it buys you time while you watch them and see what they're
doing.  It's not the first line of defense.  It's part of your defensive
structure."

Rhodes notes that systems can be attacked in the blink of an eye and
honeypots buy administrators needed time to find out what's going on. 

"Most people who are serious about security are starting to use
honeypots in one way or another," says Rhodes.  "They're used a lot in
the military.  They want to pull their opponent in and watch them The
trick is to make it interesting to the person breaking in and to make
certain they can't immediately figure out they're in a honeypot."

At the Vermont National Guard, honeypots are used to teach students in
the Computer Emergency Response Teams, which teaches network security to
military IT workers from all 50 states.  They run an experimental
network, gathering attack information to show their students what to
look for and what to do when it happens. 

Retired Sgt.  Bill Scherr, a senior instructor with the Guard's
Electronic Warfare Associates team, says they've harvested information
about attackers from all over the world.  And that's offered valuable
lessons to the students who may be defending military networks from
hacker attacks. 

But despite the advantages, Scherr says honeypots are nothing to mess
around with. 

Sgt.  First Class Carl Fortune, a computer specialist and instructor
with the Vermont National Guard, says it's a more complicated technology
than simply putting up a firewall or an intrusion detection system. 

"You can put up a firewall and IDS, but you better know what you're
doing if you re playing around with a honeypot," says Fortune.  "You've
got to be able to contain them and you've got to know if they've gotten
out of the honeypot and into your network."

That's good advice, say analysts, since once a hacker realizes he's been
duped by a honeypot, he's more apt to be angered and embarrassed enough
to want to retaliate with a destructive attack on the real network. 

Fortune and Scherr also note that once a hacker is in a honeypot, it's
up to the administrator to make sure he can't use the honeypot as a
jumping off point to attack another network.  The company running the
honeypot could be liable for any damage done to another network through
their own network. 

Ken VanWyk, director of technology in the technical risk management
department at TechMark Global Solutions, says honeypots are based on a
good concept but he hasn't yet recommended that a customer deploy one. 
He says he wants to see the honeypots more geared toward deceiving an
attacker and he wants to see them optimized for running on internal
networks, catching employees or contractors tampering with the system. 

"Very few are using them now but I think we'll see an increase," says
VanWyk.  "The technology is maturing and somewhere along the line,
someone will come up with a really useful honeypot that is feasible,
manageable and cost-effective to deploy.  They're still missing
enterprise-level manageability."

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Will You Find True Love?
Will You Meet the One?
Free Love Reading by phone!
http://us.click.yahoo.com/7dY7FD/R_ZEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT