- The Wireless Honeypot
Presented By
[Link]
[Link]
Contents:
Introduction to Honeypot.
Introduction to Honeyspots.
Types of attacks.
Types of Honeyspots.
Honeyspot design.
Honeyspot architecture.
Advantages and Disadvantages.
Conclusion.
References
Introduction:
Wireless technologies are fastest growing segments
of today’s telecommunications and computing industry.
ACKING
Attackers/hackers are
always looking to compromise
networks.
Customizing the settings will
help prevent easy access for
hackers.
Honeypots are important
technologies which can deter
an attacker from
compromising the network.
Honeypot…….?
•“HONEYPOT IS A HACKER TRAP”
•A honeypot is a system designed to learn
how “black-hats” probe.
•It is defined as “an information system
resource whose value lies in unauthorized
or illicit use of that resource”.
“HONEYSPOT”
“Honey”pot + Hot“Spot”=
HONEYSPOT.
• “A HoneySpot is a venue that offers Wi-Fi
access whose
value is being probed, attacked, or
compromised, you want the
bad guys to interact with it”.
Types of Attacks
A : attacks directed towards wired networks
B : attacks directed towards wireless users
C : attacks directed towards the wireless network infrastructure
Then what honeyspot
do……??
Divert an attacker from accessing critical
systems.
Collect information about the attacker’s
activity.
Encourage the attacker to stay on system
long enough for administrators to respond.
Types of Honeyspots
A Public HoneySpot
A Private HoneySpot
Public honeyspot is mainly interested in:
Direct client attacks.
Attacks focused on wireless infrastructure such as the access point.
Attacks focused on by passing the
Security controls imposed by the controller and obtaining full
network access without being a legitimate subscriber.
Private honeyspot is mainly interested in:
Direct client attacks.
Attacks focused on wireless infrastructure such as the access point.
Attacks focused on by passing other security mechanisms available on
wireless deployments,like MACaddress filtering,turned off SSID broad
cast etc..with the goal of getting full network layer-2 access.
Honeyspot design
A honeyspot must cover attacks that target both
infrastructure and client systems.
HONEY SPOT SYSTEM
Focused on
Wireless attacks
Wireless
clients infrastructure
Access
servers points
The main goal of a honeyspot from a design
perspective is to
Reveal real statistics about wireless attacks
Frequency of attacks
The attackers level,goals and methods
Even help to determine the hacking tools being
used.
Types of modules
Wireless access point(WAP)module
Wireless clients(WC)module
Wireless Monitor(WMON)module
Wireless data analysis(WDA)module
Wired infrastructure(WI)module(optional)
Honeyspot Architecture
ADVANTAGES:
They are clearly a useful tool for trapping attackers.
They generate alerts when someone is interacting with
them.
The activities of attackers provides valuable information
for analysing their attacking techniques and methods.
Drawbacks:
They only track and capture activity that
directly interacts with hackers.
Furthermore, deploying honeypots without
enough planning and consideration may introduce
more risks to an existing network.
Honeyspots are targeted to research the real
security threats.
One of the goals of this paper is to create
awareness about the current wireless threats.
The current honeyspot design is focused on attacks
on wireless networks and technologies, learning about
the attackers tools.
References:
[1].“Wi-Fi Honeypots a New Hacker Trap”. Kevin Poulsen.
[Link]
[2].“Wireless Honeypot Countermeasures”. Laurent Oudot.
[Link]
[3].“Network Security Essentials” Applications and standards by
WILLIAM STALLINGS