DESS SSIC 2011/2012 - univ-Metz - MIM
Discovering and Learning Security Threats and Attackers
Using Honeynet/pot Technologies
Course Description
The subject of this course is to use the Honeynet/pot technologies as a tool to discover and learn existing and new threats to networked/distributed information system and better understand attackers behaviour. The course includes a project to build a custom honeypot or related tools to turn the theory into a practical session. The course requires a high involvement from the participants. The student will have access to an operational system during the sessions to operate a real world honeypot.
Project Details
During the period of the course, there will be a specific project to realize. The project is fully integrated into the course sessions that means some topics covered will help to enhance or complete your work.
Project definition and group composition (2 max) should be sent before end of January 2012. Project will be released under a free software license and using one of the following programming language: Python, Perl, Ruby, Go, Lua, Bash or Zsh. As the development of the project will be done on an operational system, the project along with its tools might evolve following the feedback received from the attackers themselves.
Caveats
You may find that the subject is too experimental and not yet mature for real-life application. If you have any issue with the course (including the way I teach it), don't hesitate to talk about as early as possible.
Sessions
Date/Where | Topics and support |
---|---|
Saturday Jan 14, 09:00-13:00 @computer room | |
Saturday Jan 21, 09:00-13:00 @computer room | |
Saturday Jan 28, 09:00-12:30 @computer room |
|
Saturday Feb 11, 09:00-12:45 @computer room | |
Saturday Feb 18, 09:00-12:45 @computer room | |
Saturday March 2nd, 09:00-12:45 @computer room |
|
IP, TCP, UDP headers + TCP state transition diagram from TCP/IP illustrated, Volume 1
Bibliography
- Know Your Enemy : Learning about Security Threats (2nd Edition) by Honeynet Project The (2004), Addison Wesley,ISBN:0321166469
- The Internet Motion Sensor: A Distributed Blackhole Monitoring System by M Bailey, E Cooke, F Jahanian, J Nazario, D Watson
- A Virtual Honeypot Framework by Niels Provos, USENIX Security '04 Paper
- Towards an estimation of the accuracy of TCP reassembly in network forensics by Gerard Wagener, Alexandre Dulaunoy and Thomas Engel. Published in FGCN (2) 2008: 273-278.