SlideShare uma empresa Scribd logo
1 de 49
Baixar para ler offline
1/22
Theoritical Section
Practical Section
Designing Countermeasures For Tomorrows
Threats
Darwish Ahmad Herati
Herat University
Computer Science Faculty
Communication & Operatin System Department
SUPERVISOR
M.C.S. M. Sawaby Nezhat
December 21, 2014
Darwish Ahmad Herati Designing Countermeasures
2/22
Theoritical Section
Practical Section
Contents
1 Theoritical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
2 Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
4/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
We Need To Learn :
Who is Attacking Us.
How We Are Being Attacked
What the Attackers Trying to Achieve.
Darwish Ahmad Herati Designing Countermeasures
5/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Motivation
Secure Afghanistan Internal Networks
Recognize the Enemies of Afghanistan and Their Actions
Show Our Ability to The Others
How to Defend Against the Attackers.
Network Security Specialist
Learning New Types, Tactics of Attacks
Lough to the Attackers :-)
Darwish Ahmad Herati Designing Countermeasures
5/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Motivation
Secure Afghanistan Internal Networks
Recognize the Enemies of Afghanistan and Their Actions
Show Our Ability to The Others
How to Defend Against the Attackers.
Network Security Specialist
Learning New Types, Tactics of Attacks
Lough to the Attackers :-)
Darwish Ahmad Herati Designing Countermeasures
5/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Motivation
Secure Afghanistan Internal Networks
Recognize the Enemies of Afghanistan and Their Actions
Show Our Ability to The Others
How to Defend Against the Attackers.
Network Security Specialist
Learning New Types, Tactics of Attacks
Lough to the Attackers :-)
Darwish Ahmad Herati Designing Countermeasures
5/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Motivation
Secure Afghanistan Internal Networks
Recognize the Enemies of Afghanistan and Their Actions
Show Our Ability to The Others
How to Defend Against the Attackers.
Network Security Specialist
Learning New Types, Tactics of Attacks
Lough to the Attackers :-)
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
7/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Thesis Structure
Chapter 1: Introduction
Chapter 2: Computer and Network Security
Chapter 3: Honeypot Systems
Chapter 4: Honeynet Systems
Chapter 5: Honeypot and Honeynet Technologies
Chapter 6: Implementation ( Designing Countermeasrues
For Tomorrows Threats )
Darwish Ahmad Herati Designing Countermeasures
8/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Zero Concept
Zero Hour,Day: Attacks, Threats and Vulnerabilities
Security Hole Unknown to its Vendor
Exploit Unknown Vulnerability and the patch is no available
Darwish Ahmad Herati Designing Countermeasures
9/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Honeypot Systems
Definition: A computer or network that is intentially left
with common vulnerabilities that a hacker would use to
hack the system, act as a TRAP!!!
History: Fred Cohen’s Deception ToolKit in 1998 And in
2004 Virtual Honeypot Introduced
Value: Data Collection=Little Data High Value
Darwish Ahmad Herati Designing Countermeasures
9/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Honeypot Systems
Definition: A computer or network that is intentially left
with common vulnerabilities that a hacker would use to
hack the system, act as a TRAP!!!
History: Fred Cohen’s Deception ToolKit in 1998 And in
2004 Virtual Honeypot Introduced
Value: Data Collection=Little Data High Value
Darwish Ahmad Herati Designing Countermeasures
10/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Classification of Honeypot Systems
Darwish Ahmad Herati Designing Countermeasures
11/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Honeynet Systems
Definition: Multiple honeypots can be set on a network to
form the Honeynet Systems
Darwish Ahmad Herati Designing Countermeasures
11/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Honeynet Systems
Definition: Multiple honeypots can be set on a network to
form the Honeynet Systems
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
14/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Implement Different Technologies
Open Source: Honeyd, KippoSSH, Dionaa, Conpot,
Honeywall, etc...
Close Source: BackOfficer Friendly, Spectir, HoneyBot,
etc...
This Thesis: Honeyd, KippoSSH, Dionaa, Conpot,
BackOfficer Friendly, Spectir,
Let’s See The Implementation of Them. But Before!!!
Darwish Ahmad Herati Designing Countermeasures
14/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Implement Different Technologies
Open Source: Honeyd, KippoSSH, Dionaa, Conpot,
Honeywall, etc...
Close Source: BackOfficer Friendly, Spectir, HoneyBot,
etc...
This Thesis: Honeyd, KippoSSH, Dionaa, Conpot,
BackOfficer Friendly, Spectir,
Let’s See The Implementation of Them. But Before!!!
Darwish Ahmad Herati Designing Countermeasures
14/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Implement Different Technologies
Open Source: Honeyd, KippoSSH, Dionaa, Conpot,
Honeywall, etc...
Close Source: BackOfficer Friendly, Spectir, HoneyBot,
etc...
This Thesis: Honeyd, KippoSSH, Dionaa, Conpot,
BackOfficer Friendly, Spectir,
Let’s See The Implementation of Them. But Before!!!
Darwish Ahmad Herati Designing Countermeasures
15/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Used Technologies
LAMP: Apache 2, PHP, MySQL
Python: Powerful Scripting Language
Darwish Ahmad Herati Designing Countermeasures
16/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
We Love AFGHANISTAN and Proud To Be Afghans
Darwish Ahmad Herati Designing Countermeasures
17/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Solution for AFGHANISTAN
Darwish Ahmad Herati Designing Countermeasures
18/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Conclusion
The Network Security Problems In Everywhere:
Military, Organizations, Universities, Banks, Private Sectors,
ISPs, Airport, Transport... and
We Need to Learn Who, How , What.
Researches
Search about different solutions for the Problems and
Implement different Security Technologies Exist Today to
Achieve the best solution For DEFEND Against the Attackers.
Solution
The Best Solution For Afghanistan
Darwish Ahmad Herati Designing Countermeasures
19/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Challenges
Complex and Difficult Configurations
!!! NO PAIN NO GAIN !!!
Darwish Ahmad Herati Designing Countermeasures
19/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Challenges
Complex and Difficult Configurations
!!! NO PAIN NO GAIN !!!
Darwish Ahmad Herati Designing Countermeasures
20/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Future Work
Research on High Interaction Honeypot Systems
Research on Honeynet Systems
Darwish Ahmad Herati Designing Countermeasures
20/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Future Work
Research on High Interaction Honeypot Systems
Research on Honeynet Systems
Darwish Ahmad Herati Designing Countermeasures
21/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
References
Michael D. Bauer. (2005). Linux Server Security. January.
Andy Oram, John Viega. (2009). Beautiful Leading
Security Experts Explain How They Think. April
Nitesh Dhanjani, Billy Rios and Brett Hardin. (2009).
Hacking The Next Generation. September.
Lance Spitzner. (2002). Honeypots: Tracking
Hackers.September.
etc...
Darwish Ahmad Herati Designing Countermeasures
22/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Thank You For Your
Attention
Darwish Ahmad Herati Designing Countermeasures

Mais conteúdo relacionado

Mais procurados

Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksSatish Reddy
 
Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Kapil Rode
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Routerphanleson
 
Difference between Routing & Routed Protocol
Difference between Routing & Routed ProtocolDifference between Routing & Routed Protocol
Difference between Routing & Routed ProtocolNetwax Lab
 
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6newbie2019
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)Shweta Kumari
 
ROUTER PPT
ROUTER PPTROUTER PPT
ROUTER PPTJw Media
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to routerFarhan Galib
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan Singh
 

Mais procurados (20)

Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS)
Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS) Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS)
Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS)
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
 
Router and types
Router and types Router and types
Router and types
 
Router
RouterRouter
Router
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
 
Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
 
Difference between Routing & Routed Protocol
Difference between Routing & Routed ProtocolDifference between Routing & Routed Protocol
Difference between Routing & Routed Protocol
 
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
ROUTER PPT
ROUTER PPTROUTER PPT
ROUTER PPT
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......router
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Ns lecture2: Introduction to LAN Technology
Ns lecture2: Introduction to LAN TechnologyNs lecture2: Introduction to LAN Technology
Ns lecture2: Introduction to LAN Technology
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
 

Destaque

Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationDarwish Ahmad
 
Como ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalComo ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalStrong Security Brasil
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesBrian Huff
 
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignYosuke Sakai
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação CyberpunkOrlando Simões
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogenswarwick_amr
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Jeremiah Grossman
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldJason Edelstein
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresAmerican Astronautical Society
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011International Atomic Energy Agency
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingpolichen
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaCampus Party Brasil
 

Destaque (20)

Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
 
Como ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalComo ser um Hacker Ético Profissional
Como ser um Hacker Ético Profissional
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best Practices
 
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction Design
 
Apresenta cyber (2)
Apresenta cyber (2)Apresenta cyber (2)
Apresenta cyber (2)
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação Cyberpunk
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogens
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
 

Semelhante a Designing Countermeasures For Tomorrows Threats

ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxbartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxannette228280
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfChristo Ananth
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Advanced pc security final exam results
Advanced pc security final exam resultsAdvanced pc security final exam results
Advanced pc security final exam resultsDale Vick
 
Dealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsArosha Bandara
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The SecurityRachel Phillips
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Christo Ananth
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An OverviewIRJET Journal
 

Semelhante a Designing Countermeasures For Tomorrows Threats (20)

ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Advanced pc security final exam results
Advanced pc security final exam resultsAdvanced pc security final exam results
Advanced pc security final exam results
 
Dealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure Things
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
G011123539
G011123539G011123539
G011123539
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
M0704071074
M0704071074M0704071074
M0704071074
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Security
SecuritySecurity
Security
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 

Último

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Designing Countermeasures For Tomorrows Threats

  • 1. 1/22 Theoritical Section Practical Section Designing Countermeasures For Tomorrows Threats Darwish Ahmad Herati Herat University Computer Science Faculty Communication & Operatin System Department SUPERVISOR M.C.S. M. Sawaby Nezhat December 21, 2014 Darwish Ahmad Herati Designing Countermeasures
  • 2. 2/22 Theoritical Section Practical Section Contents 1 Theoritical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems 2 Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Darwish Ahmad Herati Designing Countermeasures
  • 3. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 4. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 5. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 6. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 7. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 8. 4/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement We Need To Learn : Who is Attacking Us. How We Are Being Attacked What the Attackers Trying to Achieve. Darwish Ahmad Herati Designing Countermeasures
  • 9. 5/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Motivation Secure Afghanistan Internal Networks Recognize the Enemies of Afghanistan and Their Actions Show Our Ability to The Others How to Defend Against the Attackers. Network Security Specialist Learning New Types, Tactics of Attacks Lough to the Attackers :-) Darwish Ahmad Herati Designing Countermeasures
  • 10. 5/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Motivation Secure Afghanistan Internal Networks Recognize the Enemies of Afghanistan and Their Actions Show Our Ability to The Others How to Defend Against the Attackers. Network Security Specialist Learning New Types, Tactics of Attacks Lough to the Attackers :-) Darwish Ahmad Herati Designing Countermeasures
  • 11. 5/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Motivation Secure Afghanistan Internal Networks Recognize the Enemies of Afghanistan and Their Actions Show Our Ability to The Others How to Defend Against the Attackers. Network Security Specialist Learning New Types, Tactics of Attacks Lough to the Attackers :-) Darwish Ahmad Herati Designing Countermeasures
  • 12. 5/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Motivation Secure Afghanistan Internal Networks Recognize the Enemies of Afghanistan and Their Actions Show Our Ability to The Others How to Defend Against the Attackers. Network Security Specialist Learning New Types, Tactics of Attacks Lough to the Attackers :-) Darwish Ahmad Herati Designing Countermeasures
  • 13. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 14. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 15. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 16. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 17. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 18. 7/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Thesis Structure Chapter 1: Introduction Chapter 2: Computer and Network Security Chapter 3: Honeypot Systems Chapter 4: Honeynet Systems Chapter 5: Honeypot and Honeynet Technologies Chapter 6: Implementation ( Designing Countermeasrues For Tomorrows Threats ) Darwish Ahmad Herati Designing Countermeasures
  • 19. 8/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Zero Concept Zero Hour,Day: Attacks, Threats and Vulnerabilities Security Hole Unknown to its Vendor Exploit Unknown Vulnerability and the patch is no available Darwish Ahmad Herati Designing Countermeasures
  • 20. 9/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Honeypot Systems Definition: A computer or network that is intentially left with common vulnerabilities that a hacker would use to hack the system, act as a TRAP!!! History: Fred Cohen’s Deception ToolKit in 1998 And in 2004 Virtual Honeypot Introduced Value: Data Collection=Little Data High Value Darwish Ahmad Herati Designing Countermeasures
  • 21. 9/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Honeypot Systems Definition: A computer or network that is intentially left with common vulnerabilities that a hacker would use to hack the system, act as a TRAP!!! History: Fred Cohen’s Deception ToolKit in 1998 And in 2004 Virtual Honeypot Introduced Value: Data Collection=Little Data High Value Darwish Ahmad Herati Designing Countermeasures
  • 22. 10/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Classification of Honeypot Systems Darwish Ahmad Herati Designing Countermeasures
  • 23. 11/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Honeynet Systems Definition: Multiple honeypots can be set on a network to form the Honeynet Systems Darwish Ahmad Herati Designing Countermeasures
  • 24. 11/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Honeynet Systems Definition: Multiple honeypots can be set on a network to form the Honeynet Systems Darwish Ahmad Herati Designing Countermeasures
  • 25. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 26. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 27. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 28. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 29. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 30. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 31. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 32. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 33. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 34. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 35. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 36. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 37. 14/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Implement Different Technologies Open Source: Honeyd, KippoSSH, Dionaa, Conpot, Honeywall, etc... Close Source: BackOfficer Friendly, Spectir, HoneyBot, etc... This Thesis: Honeyd, KippoSSH, Dionaa, Conpot, BackOfficer Friendly, Spectir, Let’s See The Implementation of Them. But Before!!! Darwish Ahmad Herati Designing Countermeasures
  • 38. 14/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Implement Different Technologies Open Source: Honeyd, KippoSSH, Dionaa, Conpot, Honeywall, etc... Close Source: BackOfficer Friendly, Spectir, HoneyBot, etc... This Thesis: Honeyd, KippoSSH, Dionaa, Conpot, BackOfficer Friendly, Spectir, Let’s See The Implementation of Them. But Before!!! Darwish Ahmad Herati Designing Countermeasures
  • 39. 14/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Implement Different Technologies Open Source: Honeyd, KippoSSH, Dionaa, Conpot, Honeywall, etc... Close Source: BackOfficer Friendly, Spectir, HoneyBot, etc... This Thesis: Honeyd, KippoSSH, Dionaa, Conpot, BackOfficer Friendly, Spectir, Let’s See The Implementation of Them. But Before!!! Darwish Ahmad Herati Designing Countermeasures
  • 40. 15/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Used Technologies LAMP: Apache 2, PHP, MySQL Python: Powerful Scripting Language Darwish Ahmad Herati Designing Countermeasures
  • 41. 16/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution We Love AFGHANISTAN and Proud To Be Afghans Darwish Ahmad Herati Designing Countermeasures
  • 42. 17/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Solution for AFGHANISTAN Darwish Ahmad Herati Designing Countermeasures
  • 43. 18/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Conclusion The Network Security Problems In Everywhere: Military, Organizations, Universities, Banks, Private Sectors, ISPs, Airport, Transport... and We Need to Learn Who, How , What. Researches Search about different solutions for the Problems and Implement different Security Technologies Exist Today to Achieve the best solution For DEFEND Against the Attackers. Solution The Best Solution For Afghanistan Darwish Ahmad Herati Designing Countermeasures
  • 44. 19/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Challenges Complex and Difficult Configurations !!! NO PAIN NO GAIN !!! Darwish Ahmad Herati Designing Countermeasures
  • 45. 19/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Challenges Complex and Difficult Configurations !!! NO PAIN NO GAIN !!! Darwish Ahmad Herati Designing Countermeasures
  • 46. 20/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Future Work Research on High Interaction Honeypot Systems Research on Honeynet Systems Darwish Ahmad Herati Designing Countermeasures
  • 47. 20/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Future Work Research on High Interaction Honeypot Systems Research on Honeynet Systems Darwish Ahmad Herati Designing Countermeasures
  • 48. 21/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution References Michael D. Bauer. (2005). Linux Server Security. January. Andy Oram, John Viega. (2009). Beautiful Leading Security Experts Explain How They Think. April Nitesh Dhanjani, Billy Rios and Brett Hardin. (2009). Hacking The Next Generation. September. Lance Spitzner. (2002). Honeypots: Tracking Hackers.September. etc... Darwish Ahmad Herati Designing Countermeasures
  • 49. 22/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Thank You For Your Attention Darwish Ahmad Herati Designing Countermeasures