Cybersecurity BGP hijacking DDoS Botnets What’s next?

Slides:



Advertisements
Similar presentations
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Advertisements

The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Threats To A Computer Network
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Norman SecureSurf Protect your users when surfing the Internet.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Detecting Attacks on Internet Infrastructure and Monitoring of Service Restoration in Real Time Andy Ogielski FCC Workshop on Cyber Security 30 September.
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
Privacy and Data Mining What Do “They” Know About You?
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
1 workshop Barcelona, April 22, 2015.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
The Internet of Things(IoT) BY CODEY DISNEY. Objectives  What Is the IOT?  How are corporations at risk? What are the security risks and what can happen.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
BGP security some slides borrowed from Jen Rexford (Princeton U)
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Improving Resilience and Performance in Light of Recent Internet Outages Troy Whitney – Manager, Solutions Engineering.
International Conflict & Cyber Security
What they are and how to protect against them
VPN Joshua Turner.
Chapter 7: Identifying Advanced Attacks
CYBER SECURITY...
Instructor Materials Chapter 7 Network Security
DDoS.
Computer Network Security
The Hidden face of the Darknet
Real-time protection for web sites and web apps against ATTACKS
Securing BGP Bruce Maggs.
Overview 1. Phishing Scams
Computer Data Security & Privacy
State of the Internet Security – Q2 2017
Security Fundamentals
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
CS 465 Secure Last Updated: Nov 30, 2017.
Presented by Security Management Partners Waltham, MA
Man-in-the-Middle Attacks
Call AVG Antivirus Support | Fix Your PC
Exercise ?: TOR.
Risk of the Internet At Home
National Incident Response Discussion Exercise
Cyber Security in the Mortgage Industry
Is Your Online Security Intelligent? Internet Performance Management
Meltdown / Spectre issue?
Industry Best Practices – Security For Smartphones / Mobile Devices
Data security in iot devices
Chapter 4: Protecting the Organization
Ransomware in Web Apps OWASP Singapore.
Crypto #4 Encryption and Network Protocols
Cyber Security Challenges
COS 561: Advanced Computer Networks
How to keep the bad guys out and your data safe
Cyber security and Computer Misuse
Privacy and Data Mining
Privacy and Data Mining
Cybersecurity and Cyberhygiene
Modelli di Controllo e Mitigazione per Attacchi DDoS
Security Trends and Threats Affecting Innovations in Technology
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Introduction to Home Networking
Cybersecurity Simplified: Phishing
Botnet of Things: Cybersecurity
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

Cybersecurity BGP hijacking DDoS Botnets What’s next?

BGP hijacking The illegitimate takeover of IP addresses by corrupting BGP April 1997: The "AS 7007 incident” December 24, 2004: TTNet in Turkey hijacks the Internet May 7, 2005: Google's May 2005 Outage January 22, 2006: Con-Edison hijacks big chunk of the Internet February 24, 2008: Pakistan's attempt to block YouTube takes down YouTube entirely November 11, 2008: Brazilian ISP leaked their internal table into the global BGP table April 8, 2010: China Telecom originated 37,000 prefixes not belonging to them in 15 min February, 2014: a hacker redirected traffic targeting crypto-currency mining operations January 2017: Iranian pornography censorship

The illegitimate takeover of IP addresses by corrupting BGP BGP hijacking The illegitimate takeover of IP addresses by corrupting BGP Kind of complicated More “state’s” than hacker’s attacks Mitigation measures – but hard to get rid of Old story – no big news here

Volume of attacks increased by 10x DDoS a cyber-attack where the perpetrator seeks to make a resource unavailable by disrupting services of a host connected to the Internet. Volume of attacks increased by 10x

DDoS a cyber-attack where the perpetrator seeks to make a resource unavailable by disrupting services of a host connected to the Internet. Volume of attacks increased by 10x Often connected with botnet

DDoS a cyber-attack where the perpetrator seeks to make a resource unavailable by disrupting services of a host connected to the Internet. Volume of attacks increased by 10x Often connected with botnet Buy-as-you-go style

DDoS a cyber-attack where the perpetrator seeks to make a resource unavailable by disrupting services of a host connected to the Internet. Volume of attacks increased by 10x Often connected with botnet Buy-as-you-go style Sometimes unwanted errors (Apple DNS bug)

BOTNET a cyber-attack where the perpetrator seeks to make a resource unavailable by disrupting services of a host connected to the Internet. Volume of attacks increased by 10x Often connected with botnet Buy-as-you-go style Sometimes unwanted errors (Apple DNS bug)

Where we are FTTx: From 20Mbps/1Mbps to 1Gbps/100Mbps IOT: From 1PC to tens of devices @ home Smartphones: CPU more powerful than your laptop Mobility: 5G anyone?

SAFER Where we are FTTx: From 20Mbps/1Mbps to 1Gbps/100Mbps IOT: From 1PC to tens of devices @ home Smartphones: CPU more powerful than your laptop Mobility: 5G anyone? Encryption: more than 50% of web traffic is over HTTPS SAFER

Safer: It makes in-network protection (totally) useless Where we are The future FTTx: From 20Mbps/1Mbps to 1Gbps/100Mbps IOT: From 1PC to tens of devices Smartphone: CPU more powerful than your laptop Mobility: 5G anyone? Encryption: more than 50% of web traffic is over HTTPS Safer: It makes in-network protection (totally) useless

Your (company) privacy Next Challenge Your (company) privacy

and reports on Internet trends and behavior. Google Third-party service Welcome ScorecardResearch, […] a leading global market research effort that studies and reports on Internet trends and behavior. ScorecardResearch conducts research by collecting Internet web browsing data and then uses that data to help show how people use the Internet, what they like about it, and what they don’t. ScorecardResearch collects data through […] web tagging.

If you’re not paying for the product,then you are the product…” – Phil Zimmerman, Creator, PGP

We’ve lost control over our data

@ work Device vulnerabilities Secrets and interests of each employee Company’s activities and plans

ATTACK WORKFLOW 2. The e-mail contains a link to a malware; Leveraging social engineering techniques, the employee is induced to click the link; 1. Attackers use employee’s data to prepare e-mail based on her interests (e.g., recent purchases or trips); 3. The malware is built based on employee’s device vulnerabilities, and automatically infects the device and corporate network.

New story – How to deal with this? Can the network help?