02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.10.5 Research<br />

CSIRTs and security experts are always looking to understand <strong>the</strong> intruder community better<br />

to help teams and sites proactively protect <strong>the</strong>ir systems, networks, and critical assets. With<br />

<strong>the</strong> computer security and incident response discipline still being relatively new, <strong>the</strong>re are<br />

different research projects currently in progress related to learning more about securing networks<br />

and systems and also about effective incident handling. The following is one project in<br />

progress.<br />

3.10.5.1 The Honeynet Project<br />

The Honeynet Project is a non-pr<strong>of</strong>it research group composed <strong>of</strong> volunteers from <strong>the</strong> security<br />

field who are interested in researching tools, techniques, and activities <strong>of</strong> <strong>the</strong> intruder<br />

community through <strong>the</strong> use <strong>of</strong> a Honeynet [Honeynet 03].<br />

A Honeynet is essentially a network <strong>of</strong> systems deployed in a controlled environment that can<br />

be watched and monitored for attacks and intruder activity. By watching attacks and probes<br />

against <strong>the</strong> system or by monitoring how <strong>the</strong> system is compromised and used to attack o<strong>the</strong>rs,<br />

<strong>the</strong> system owners can learn about <strong>the</strong> techniques and tools used by <strong>the</strong> intruder community.<br />

This information can <strong>the</strong>n be used to improve <strong>the</strong> knowledge and understanding <strong>of</strong> o<strong>the</strong>r<br />

computer security pr<strong>of</strong>essionals.<br />

The Honeynet Project is now in <strong>the</strong> third <strong>of</strong> four phases. The first phase provided a pro<strong>of</strong> <strong>of</strong><br />

concept and provided <strong>the</strong> opportunity to capture and study attacks. The second phase was to<br />

improve <strong>the</strong> methodology for <strong>the</strong> implementation, infrastructure, and deployment <strong>of</strong> a<br />

Honeynet. The third phase, starting in 2003, is to develop a bootable CD that will allow participants<br />

to easily deploy a standardized Honeynet. The fourth phase will be to develop a system<br />

to automatically collect and syn<strong>the</strong>size data from <strong>the</strong> various Honeynet research projects.<br />

The main purposes <strong>of</strong> <strong>the</strong> project are to raise awareness, teach and inform, and do research.<br />

For more information see:<br />

http://www.honeynet.org/<br />

3.11 Current Problems<br />

Problems and challenges faced by CSIRTs that are commonly mentioned in classes, conferences,<br />

or o<strong>the</strong>r discussion venues include<br />

• lack <strong>of</strong> funding<br />

• lack <strong>of</strong> management support<br />

• lack <strong>of</strong> trained incident handling staff<br />

128 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!