addition, several email servers with IMAP and other mail protocols are as a number of
attacks are carried out through email and related services.
The Cisco PIX 501 Firewall, shown in Figure 1, is configured to send traffic only
outside the system, masking the traffic generator behind the firewall. The PIX 515
Firewall uses 3 interfaces as described below:
1. The first interface used is for DMZ 1. Logging and monitoring is performed
through the span port connected to the Cisco 2950 switch. The information from
this port is parsed and passed to our monitoring system. SNORT [1] Tcpdump
[2], and various other tools are then used to analyze the network traffic.
Analyzing this traffic, and the actions taken in response to it, is described in
Section 3.
2. The second interface is connected to the existing lab that consists of two functional
areas. The first functional area consists of personal computers connected to the
internet. The second functional area is relegated to other experiments and is
separated by a firewall which isolates it from the rest of the network.
3. The outside interface is connected to the internet.
4. Traffic flow policies are implemented using different filtering rules on the
firewalls. For example, in the current design, the policy we implement is as
follows:
• Allow HTTP, SMTP, ICMP etc. to enter into DMZ 1 on the Pix 515E
• Only allow established traffic into the Inside interface of the Pix 515E
• Do not allow any traffic into the Pix 501 from outside
The experiment will measure the effects of multiple policies on different hardware
devices and how they dynamically switch according to specific security requirements.
In this manner, the Honeynet can be customized dynamically. Dynamic changes in
policies can be used in response to the traffic that is already in the Honeynet or
contained in data received from external resources.
A Linux server connects the Internet to the Honeynet. The decision maker box
detects the attack and sends notification to remote system. A smart algorithm
integrated into the decision maker box accomplishes the notification task. A
communication system required to collect data has also been developed to
communicate between distributed entities (either between Honeynets or from a
Honeynet to a production network) using Java.
The test first calculates the timing delays in the data sharing mechanism that alerts
a client system, instating a new policy to safeguard itself. This is accomplished by
sending a flag through a VPN connection. PIX 515E firewalls can sustain traffic
associated with a small office environment. A flushing mechanism implemented at
the firewall base, addresses the undetected flooding attack causing the Denial of
Service (DOS or clog) on the system. In order to solve the DoS problem, as
suggested by the test and review material from Cisco and other router vendors, we use
the clear arp command to flush the ARP cache [3] in the PIX 515 firewall. Our initial
tests with one DoS Attack tool (using our Arbornet Traffic generator) support this
proposal. We have tested this architecture and quantify its ability to withstand DoS
attacks by devising mechanisms that flush them during high traffic periods.
79