Virtual Honeypots: From Botnet Tracking to Intrusion Detection
暫譯: 虛擬蜜罐:從僵屍網路追蹤到入侵偵測

Niels Provos, Thorsten Holz

  • 出版商: Addison Wesley
  • 出版日期: 2007-07-01
  • 定價: $2,160
  • 售價: 8.0$1,728
  • 語言: 英文
  • 頁數: 440
  • 裝訂: Paperback
  • ISBN: 0321336321
  • ISBN-13: 9780321336323
  • 相關分類: 資訊安全
  • 立即出貨 (庫存 < 4)

買這商品的人也買了...

商品描述

Description

Praise for Virtual Honeypots

"A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader’s eyes."

—Lenny Zeltser, Information Security Practice Leader at Gemini Systems

"This is one of the must-read security books of the year."

—Cyrus Peikari, CEO, Airscanner Mobile Security, author, security warrior

"This book clearly ranks as one of the most authoritative in the field of honeypots. It is comprehensive and well written. The authors provide us with an insider’s look at virtual honeypots and even help us in setting up and understanding an otherwise very complex technology."

—Stefan Kelm, Secorvo Security Consulting

"Virtual Honeypots is the best reference for honeypots today. Security experts Niels Provos and Thorsten Holz cover a large breadth of cutting-edge topics, from low-interaction honeypots to botnets and malware. If you want to learn about the latest types of honeypots, how they work, and what they can do for you, this is the resource you need."

—Lance Spitzner, Founder, Honeynet Project

"Whether gathering intelligence for research and defense, quarantining malware outbreaks within the enterprise, or tending hacker ant farms at home for fun, you’ll find many practical techniques in the black art of deception detailed in this book. Honeypot magic revealed!"

—Doug Song, Chief Security Architect, Arbor Networks

"Seeking the safest paths through the unknown sunny islands called honeypots? Trying to avoid greedy pirates catching treasures deeper and deeper beyond your ports? With this book, any reader will definitely get the right map to handle current cyber-threats.

Designed by two famous white hats, Niels Provos and Thorsten Holz, it carefully teaches everything from the concepts to practical real-life examples with virtual honeypots. The main strength of this book relies in how it covers so many uses of honeypots: improving intrusion detection systems, slowing down and following incoming attackers, catching and analyzing 0-days or malwares or botnets, and so on.

Sailing the high seas of our cyber-society or surfing the Net, from students to experts, it’s a must-read for people really aware of computer security, who would like to fight against black-hats flags with advanced modern tools like honeypots."

—Laurent Oudot, Computer Security Expert, CEA

"Provos and Holz have written the book that the bad guys don’t want you to read. This detailed and comprehensive look at honeypots provides step-by-step instructions on tripping up attackers and learning their tricks while lulling them into a false sense of security. Whether you are a practitioner, an educator, or a student, this book has a tremendous amount to offer. The underlying theory of honeypots is covered, but the majority of the text is a ‘how-to’ guide on setting up honeypots, configuring them, and getting the most out of these traps, while keeping actual systems safe. Not since the invention of the firewall has a tool as useful as this provided security specialists with an edge in the never-ending arms race to secure computer systems. Virtual Honeypots is a must-read and belongs on the bookshelf of anyone who is serious about security."

—Aviel D. Rubin, Ph.D., Computer Science Professor and Technical Director of the Information Security Institute at Johns Hopkins University, and President and Founder, Independent Security Evaluators

"An awesome coverage of modern honeypot technologies, both conceptual and practical."

—Anton Chuvakin

"Honeypots have grown from simple geek tools to key components in research and threat monitoring at major entreprises and security vendors. Thorsten and Niels comprehensive coverage of tools and techniques takes you behind the scene with real-world examples of deployment, data acquisition, and analysis."

—Nicolas Fischbach, Senior Manager, Network Engineering Security, COLT Telecom, and Founder of Sécurité.Org

Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain.

In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you’ll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you’ve never deployed a honeypot before.

You’ll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation.

After reading this book, you will be able to

  • Compare high-interaction honeypots that provide real systems and services and the low-interaction honeypots that emulate them
  • Install and configure Honeyd to simulate multiple operating systems, services, and network environments
  • Use virtual honeypots to capture worms, bots, and other malware
  • Create high-performance "hybrid" honeypots that draw on technologies from both low- and high-interaction honeypots
  • Implement client honeypots that actively seek out dangerous Internet locations
  • Understand how attackers identify and circumvent honeypots
  • Analyze the botnets your honeypot identifies, and the malware it captures
  • Preview the future evolution of both virtual and physical honeypots 

  

Table of Contents

Preface xiii

Acknowledgments xxi

About the Authors xxiii

Chapter 1 Honeypot and Networking Background 1

1.1 Brief TCP/IP Introduction 1

1.2 Honeypot Background 7

1.3 Tools of the Trade 13

Chapter 2 High-Interaction Honeypots 19

2.1 Advantages and Disadvantages 20

2.2 VMware 22

2.3 User-Mode Linux 41

2.4 Argos 52

2.5 Safeguarding Your Honeypots 62

2.6 Summary 69

Chapter 3 Low-Interaction Honeypots 71

3.1 Advantages and Disadvantages 72

3.2 Deception Toolkit 73

3.3 LaBrea 74

3.4 Tiny Honeypot 81

3.5 GHH—Google Hack Honeypot 87

3.6 PHP.HoP—A Web-Based Deception Framework 94

3.7 Securing Your Low-Interaction Honeypots 98

3.8 Summary 103

Chapter 4 Honeyd—The Basics 105

4.1 Overview 106

4.2 Design Overview 109

4.3 Receiving Network Data 112

4.4 Runtime Flags 114

4.5 Configuration 115

4.6 Experiments with Honeyd 125

4.7 Services 129

4.8 Logging 131

4.9 Summary 134

Chapter 5 Honeyd—Advanced Topics 135

5.1 Advanced Configuration 136

5.2 Emulating Services 139

5.3 Subsystems 142

5.4 Internal Python Services 146

5.5 Dynamic Templates 148

5.6 Routing Topology 150

5.7 Honeydstats 154

5.8 Honeydctl 156

5.9 Honeycomb 158

5.10 Performance 160

5.11 Summary 161

Chapter 6 Collecting Malware with Honeypots 163

6.1 A Primer on Malicious Software 164

6.2 Nepenthes—A Honeypot Solution to Collect Malware 165

6.3 Honeytrap 197

6.4 Other Honeypot Solutions for Learning About Malware 204

6.5 Summary 207

Chapter 7 Hybrid Systems 209

7.1 Collapsar 211

7.2 Potemkin 214

7.3 RolePlayer 220

7.4 Research Summary 224

7.5 Building Your Own Hybrid Honeypot System 224

7.6 Summary 230

Chapter 8 Client Honeypots 231

8.1 Learning More About Client-Side Threats 232

8.2 Low-Interaction Client Honeypots 241

8.3 High-Interaction Client Honeypots 253

8.4 Other Approaches 263

8.5 Summary 272

Chapter 9 Detecting Honeypots 273

9.1 Detecting Low-Interaction Honeypots 274

9.2 Detecting High-Interaction Honeypots 280

9.3 Detecting Rootkits 302

9.4 Summary 305

Chapter 10 Case Studies 307

10.1 Blast-o-Mat: Using Nepenthes to Detect Infected Clients 308

10.2 Search Worms 327

10.3 Red Hat 8.0 Compromise 332

10.4 Windows 2000 Compromise 343

10.5 SUSE 9.1 Compromise 351

10.6 Summary 357

Chapter 11 Tracking Botnets 359

11.1 Bot and Botnet 101 360

11.2 Tracking Botnets 373

11.3 Case Studies 376

11.4 Defending Against Bots 387

11.5 Summary 390

Chapter 12 Analyzing Malware with CWSandbox 391

12.1 CWSandbox Overview 392

12.2 Behavior-Based Malware Analysis 394

12.3 CWSandbox—System Description 401

12.4 Results 405

12.5 Summary 413

Bibliography 415

Index 423

商品描述(中文翻譯)

**描述**

對於《虛擬蜜罐》的讚譽

「這是一本充滿技術性和深刻見解的資源,讓讀者眼前一亮,揭示了蜜罐的世界。」
—Lenny Zeltser,Gemini Systems 資訊安全實務領導者

「這是今年必讀的安全書籍之一。」
—Cyrus Peikari,Airscanner Mobile Security 首席執行官,作者,安全戰士

「這本書無疑是蜜罐領域中最具權威性的著作之一。內容全面且寫得很好。作者為我們提供了虛擬蜜罐的內部視角,甚至幫助我們設置和理解這種非常複雜的技術。」
—Stefan Kelm,Secorvo Security Consulting

「《虛擬蜜罐》是當今蜜罐的最佳參考資料。安全專家 Niels Provos 和 Thorsten Holz 涵蓋了從低互動蜜罐到僵屍網路和惡意軟體等大量前沿主題。如果你想了解最新類型的蜜罐、它們的運作方式以及它們能為你做什麼,這就是你需要的資源。」
—Lance Spitzner,Honeynet Project 創始人

「無論是為研究和防禦收集情報、在企業內部隔離惡意軟體爆發,還是為了娛樂而在家中照顧駭客蟻農,你都會在這本書中找到許多實用的技巧,揭示了欺騙的黑暗藝術。蜜罐的魔法大公開!」
—Doug Song,Arbor Networks 首席安全架構師

「尋找穿越未知陽光島嶼的最安全路徑,這些島嶼被稱為蜜罐?試圖避免貪婪的海盜在你港口深處捕獲寶藏?有了這本書,任何讀者都能獲得應對當前網路威脅的正確地圖。

由兩位著名的白帽子 Niels Provos 和 Thorsten Holz 設計,它仔細教導從概念到實際生活中的虛擬蜜罐範例。這本書的主要優勢在於它涵蓋了蜜罐的多種用途:改善入侵檢測系統、減緩並追蹤來襲的攻擊者、捕獲和分析零日漏洞或惡意軟體或僵屍網路等等。

在我們的網路社會的公海上航行或在網路上衝浪,從學生到專家,這是對於真正意識到電腦安全的人來說必讀的書籍,他們希望用像蜜罐這樣的先進現代工具對抗黑帽子的旗幟。」
—Laurent Oudot,電腦安全專家,CEA

「Provos 和 Holz 寫下了壞人不希望你閱讀的書。這本對蜜罐的詳細和全面的探討提供了逐步指導,幫助你設置陷阱來絆倒攻擊者,並在讓他們產生錯誤的安全感的同時學習他們的技巧。無論你是從業者、教育者還是學生,這本書都有大量的內容可以提供。蜜罐的基本理論得到了涵蓋,但大部分內容是關於如何設置蜜罐、配置它們以及如何充分利用這些陷阱,同時保持實際系統的安全。自從防火牆發明以來,沒有任何工具像這樣為安全專家提供在保護電腦系統的無休止軍備競賽中佔據優勢的機會。《虛擬蜜罐》是必讀之作,應該放在任何對安全認真對待的人的書架上。」
—Aviel D. Rubin,博士,約翰霍普金斯大學計算機科學教授及資訊安全研究所技術總監,獨立安全評估機構總裁及創始人

「對現代蜜罐技術的精彩覆蓋,無論是概念還是實踐。」
—Anton Chuvakin

「蜜罐已經從簡單的極客工具發展成為主要企業和安全供應商在研究和威脅監控中的關鍵組件。Thorsten 和 Niels 對工具和技術的全面覆蓋讓你深入了解實際部署、數據獲取和分析的真實案例。」
—Nicolas Fischbach,COLT Telecom 網路工程安全高級經理,Securite.Org 創始人

蜜罐在網際網路安全中展現了巨大的價值,但實體蜜罐的部署可能過於複雜、耗時且昂貴。現在,有了一個突破性的解決方案。虛擬蜜罐擁有許多傳統蜜罐的特徵,但你可以在單一系統上運行數千個,使其更容易且更便宜地構建、部署和維護。

在這本實用且易於接觸的書中,兩位領先的蜜罐先驅系統地介紹了虛擬蜜罐技術。一步一步地,你將學會如何在自己的環境中實施、配置、使用和維護虛擬蜜罐,即使你從未部署過蜜罐。

你將通過範例學習,包括由共同作者 Niels Provos 創建的著名虛擬蜜罐 Honeyd。作者還展示了虛擬蜜罐的多種實際應用,包括網路誘餌、蠕蟲檢測、垃圾郵件防範和網路模擬。

閱讀完這本書後,你將能夠:

- 比較提供真實系統和服務的高互動蜜罐與模擬它們的低互動蜜罐
- 安裝和配置 Honeyd 以模擬多個操作系統、服務和網路環境
- 使用虛擬蜜罐捕獲蠕蟲、機器人和其他惡意軟體
- 創建高性能的「混合」蜜罐,結合低互動和高互動蜜罐的技術
- 實施主動尋找危險網際網路位置的客戶端蜜罐
- 理解攻擊者如何識別和繞過蜜罐
- 分析你的蜜罐識別的僵屍網路及其捕獲的惡意軟體
- 預覽虛擬和實體蜜罐的未來演變

**目錄**

前言 xiii
致謝 xxi
關於作者 xxiii
第一章 蜜罐與網路背景 1
1.1 TCP/IP 簡介 1
1.2 蜜罐背景 7
1.3 工具介紹 13
第二章 高互動蜜罐 19
2.1 優缺點 20
2.2 VMware 22
2.3 使用者模式 Linux 41
2.4 Argos 52
2.5 保護你的蜜罐 62
2.6 總結 69
第三章 低互動蜜罐 71
3.1 優缺點 72
3.2 欺騙工具包 73
3.3 LaBrea 74
3.4 Tiny Honeypot 81
3.5 GHH—Google Hack 蜜罐 87
3.6 PHP.HoP—基於網頁的欺騙框架 94
3.7 保護你的低互動蜜罐 98
3.8 總結 103
第四章 Honeyd—基礎 105
4.1 概述 106
4.2 設計概述 109
4.3 接收網路數據 112
4.4 執行時標誌 114
4.5 配置 115
4.6 Honeyd 實驗 125
4.7 服務 129
4.8 日誌 131
4.9 總結 134
第五章 Honeyd—進階主題 135
5.1 進階配置 136
5.2 模擬服務 139
5.3 子系統 142
5.4 內部 Python 服務 146
5.5 動態模板 148
5.6 路由拓撲 150
5.7 Honeydstats 154
5.8 Honeydctl 156
5.9 Honeycomb 158
5.10 性能 160
5.11 總結 161
第六章 使用蜜罐收集惡意軟體 163
6.1 惡意軟體入門 164
6.2 Nepenthes—收集惡意軟體的蜜罐解決方案 165
6.3 Honeytrap 197
6.4 其他學習惡意軟體的蜜罐解決方案 204
6.5 總結 207
第七章 混合系統 209
7.1 Collapsar 211
7.2 Potemkin 214
7.3 RolePlayer 220
7.4 研究總結 224
7.5 建立自己的混合蜜罐系統 224
7.6 總結 230
第八章 客戶端蜜罐 231
8.1 了解更多關於客戶端威脅 232
8.2 低互動客戶端蜜罐 241
8.3 高互動客戶端蜜罐 253
8.4 其他方法 263
8.5 總結 272
第九章 偵測蜜罐 273
9.1 偵測低互動蜜罐 274
9.2 偵測高互動蜜罐 280
9.3 偵測 Rootkits 302
9.4 總結 305
第十章 案例研究 307
10.1 Blast-o-Mat:使用 Nepenthes 偵測受感染的客戶端 308
10.2 搜索蠕蟲 327
10.3 Red Hat 8.0 受損 332
10.4 Windows 2000 受損 343
10.5 SUSE 9.1 受損 351
10.6 總結 357
第十一章 追蹤僵屍網路 359