Technical Reports
- Report Date Covered Start
2020-01-15
- Report Date Covered End
2020-06-28
- Report Submission Date
2020-06-28
- Project Implementation Countries
Indonesia
- Project Leaders
- Charles Lim
- Team Members
- Kalpin Erlangga Silaen [email protected]Andi Yusuf, M.T. [email protected]
- Partner Organizations
Indonesia Honeynet Project, Badan Siber dan Sandi Negara
- Total Budget Approved
US$20,000
Honeynet Threat Sharing Platform
SWISS GERMAN UNIVERSITY (SGU)
With the continuous rise of cyber security threats, monitoring security potential threats and attacks become essential to plan for cyber defense. Honeypot, a decoy system designed to lure attackers, has been used to track and learn attacker’s behavior. Collecting attacker’s interactions with honeypot at different location inside different organization’s premises provide useful and more complete picture of the landscape of current cyber security threats. The log of the attacks to the honeypots become an essential cyber security threat information that could be shared to many of the security incident analyst at different organization to provide a relevant and contextual threat intelligence. The goal of this project is to develop and implement honeynet threat sharing platform that could collect, store, add contextual information pertaining to the threat and share these threat information to the relevant organization. The result of the project will be first implemented in Indonesia then ASEAN and Asia Pacific countries, providing organizations security threat information on a collaborative effort among particating organizations.
Background and Justification:[Back to table of contents]
Swiss German University (SGU) signed a Memorandum of Understanding (MOU) with Badan Siber & Sandi Negara (BSSN) on the 28th November 2018 to collaborate on research in two major areas: Malware and Threat Intelligence. With the honeypots installed on different organizations in various provinces of Indonesia. We need a platform that can provide repository for the security threats captured by these honeypots and share threat intelligence to all relevant organizations at different provinces. Previously, most of these security threats collected from honeypots were not shared in any way and they are used locally by the relvant organization that implemented these honeypots. The project currently have categorized security threats from SSH, SMB, Web, Database services, etc. in the form of Indicator of Compromises, which include IP addresses, URLs, and hashes of binary captured by installed honeypots. With the avilability of this platform, security threat information could be shared to different provinces in the country, the overall security posture of a province or a region can be potentially raised. With the collaboration effort between interested organizations and comunities, the project provide means to raise the involved researchers to be more aware of cyber security threats and how to share them more effectively. This means more people will be involved in collecting, analyzing and sharing the security threats captured by the honeypots, the delta of change of this effort will be multiplied greatly. In addition, to be useful the security threat information need to be correlated not only among the data captured from different honeypots as well as other open source threat intelligence from around the world. We will propose the enhanced platform that include this capability in the second phase of the research grant to include ASEAN and/or APAC countries in the near future.Project Implementation:[Back to table of contents]
The objective of this research is to provide a sharing platform for any organizations in Indonesia (later can be applied to ASEAN and/or Asia Pacific countries) to share security threats information collected using honeypots in the relevant organization in the related countries to other organizations in Asia Pacific. To start with, the research will begin to develop and share the security threat information collected from different provinces to all related organizations in Indonesia. The project is open to any researchers (men or women) who is interested to help building better security posture in their respected countries or any Asia Pacific countries. The completed project is expected to bring significant contribution to raise not only the participation of security threat information contribution but also the overall potential security posture of the Internet in Asia Pacific. This is the first time we combine research effort between government, education institution and cyber security community to build a security threat information platform. As expected, the team member from each organization or community is expected to contribute ideas, efforts and time to ensure the project is completed as proposed. We have to change our original design from distributed model to a more centralized after several experiment trying to handle huge traffic from all participating honeypots. The orirginal design also put MISP as the central processing and correlation for all our captured honeypot data, as shown in Figure 1.


Project Evaluation:[Back to table of contents]
Following are the project lesson learned during the design and development of honeynet threat sharing platform:- The project demonstrated that the triple helix, introduced by Prof Henry at Stanford U. - http://ojs.stanford.edu/ojs/index.php/intersect/article/view/849), works. In our case, the institutions involved are higher education, government and cyber security community.
- We are glad that we have at least 2 women as part of our team members in the project, allowing diversity as part of our project
- With the stable platform (after some few months testing), we are now more comfortable to promote to multi stakeholder to participate in our project this year. Leveraging IHP communities and BSSN multi stakeholder will be aim for this year implementation tasks.
- Equipped with the 2-day threat analysis capability training in December and more experience with threat categorization and analysis, we are now more confident to share to the public our experience, raising the bar on threat analysis capability to the next level.
- We have discovered the most suitable distributed model for threat sharing for current and future needs (allowing participants from different countries of ASEAN or ASIA PACIFIC). This model allows correlation of data in data lake farm providing future of many related research possibilities in the future, as shown in Figure 1, our roadmap.
- Operational challenge to maintain this platform is the key success factor, since we need to maintain a team of analyst to continuosly analyze the traffic for the unknown threats, not categorized by the system automatically.
- Another operational challenge is to continuously fine tune and possibly update the system (hardware upgrade) to provide better performance when working with the system, given the volume of attacks will increase exponentially as more honeypot data are fed into the system for analysis.
- This is the first research project, in which all the project members learned together how to develop the platform to solve the real problem using open source software. In addition, all members also are forced in a good way to work with dockerized system components supporting the platform, minimizing the impact when upgrading certain component in the system.
- Even tough it is a big challenge to manage team virtually in the pandemic, every team members learn to be punctual for the meeting, realizing everyone has his/her own tight meeting schedule to attend. Hence from the project management aspects, ensuring every members completed assigned tasks on time is the key succes factor of the project.

Indicators | Baseline | Project activities related to indicator | Outputs and outcomes | Status |
---|---|---|---|---|
How do you measure project progress, linked to the your objectives and the information reported on the Implementation and Dissemination sections of this report. | Refers to the initial situation when the projects haven’t started yet, and the results and effects are not visible over the beneficiary population. | Refer to how the project has been advancing in achieving the indicator at the moment the report is presented. Please include dates. | We understand change is part of implementing a project. It is very important to document the decision making process behind changes that affect project implementation in relation with the proposal that was originally approved. | Indicate the dates when the activity was started. Is the activity ongoing or has been completed? If it has been completed add the completion dates. |
Delivery Time
|
Software Beta Ver.
|
Docker Development
|
The Delivery was late by 2 weeks
|
Completed (15 Mar 20) |
System Tested
|
Dashboard Beta Ver.
|
Load Testing
|
System Crashes several time, due to slow disk performance. Added SSD
|
Crash Solved (SSD 5 Jun 20) |
System Perf Improved
|
Dashboard Query Speed
|
Load High Volume Data
|
Slow Performance due to running out memory space
|
In Progress (RAM orderd) |
Number of Participant
|
Stakeholder Awareness
|
Promotion
|
Public Awarenss via Seminar
|
Completed (18 Jan 20) |
Number of Participants
|
Stakeholder Participation
|
Promotion
|
Targeted stakeholder to be invited on 22 July 2020
|
In Progress |
Number of Participants
|
Public Awareness
|
Presentation
|
Presentation Project Update in Apricot 2020
|
Cancel Participation (due to Pandemic) |
Publication of Research
|
Paper Publication
|
Research Publication
|
International Journal Paper is still written up
|
In Progress (Target End of July Submission) |
Gender Equality and Inclusion:[Back to table of contents]
Since the beginning of the project, it is a challenge to recruit women who are interested in Cyber Security research to participate in our project. On the average, we have a maximum of 10 percent for number of students who are intereted in cyber security from one batch of students admitted to our Bachelor of IT program. We will be very fortunate to find one woman interested in cyber security for every batch of students. Nevertheless, We are grateful to have 2 women in our research team: one from undergraduate student in SGU dan one from BSSN staff. Technical capability of undergraduate student is also another challenge: need sometime to mentor and train to develop the required skills to perform the work. On the other hand, BSSN staff didn't have any trouble to participate in the research work.Project Communication Strategy:[Back to table of contents]
To raise awareness for our stakeholder, SGU in partnership with IHP and BSSN, conducted a cyber security seminar and workshop in SGU on 18 January 2020. The event is intended to announce our research collaboration, research grant obtained from ISIF Asia and opportunity to participate in our activities. About 160 participants registered both for seminar and workshop, which exceed our expectation (150 planned). Below is the flyer we use to promote the event.