Electronics For You

D T S S U C Sd d uc c ui udc

To track hackers’ activities, a system or a networked environmen­t is needed where at each place every activity is gathered, so that it can be analysed either in real time or offline. honeynets have enormous capabiliti­es to gather malicious data, control d

-

According to the Honeynet mroject and Research Alliance, a honeynet is a tool that can be used to learn about targets, and methods and tools used by intruders to attack a system. It has a network of systems that are designed to be compromise­d.

Conceptual­ly, honeynets are very simple networks. These contain one or more honeypots. Since honeypots are not production systems, the honeynet itself has neither production activity nor authorised services. As a result, any interactio­n with a honeynet implies malicious or unauthoris­ed activity. Any connection inbound to the honeynet is most likely a probe, scan or attack. Any unauthoris­ed outbound connection from honeynet implies that someone has compromise­d the system and initiated outbound activity.

A honeynet is an architectu­re. This architectu­re creates a highly controlled network, which can control and monitor all the activity that happens within it (Fig. 1). The system administra­tor places target systems, or honeypots, within the architectu­re. In many ways, a honeynet is like a fishbowl. It is an environmen­t where anyone can watch everything happening inside it.

Honeynets are used to build antivirus signatures, spam signatures and filters, identify compromise­d systems, assist law-enforcemen­ts authoritie­s in tracking criminals, hunt and shutdown botnets, collect and analyse malware, and detect zero-day attacks.

To successful­ly deploy a honeynet, it is necessary to correctly deploy the honeynet architectu­re. The key to the honeynet architectu­re is a honeywall. This is a gateway device that separates honeypots from rest of the world. Any traffic going to or from a honeypot must go through the honeywall. den-III honeynets implement a new data model independen­t of the data source—according to the paper ‘ Towards A Third deneration Data Capture Architectu­re for Honeynets’ by Edward Balas and Camilo siecco presented at mroceeding­s of the Sixth IEEE Informatio­n Assurance Workshop in June 2005.

Tracking hackers’ activities using honeynets

To monitor and track malicious activities, a system or networked environmen­t is needed where at each place from the network to the host system every activ-

 ??  ??

Newspapers in English

Newspapers from India