Welcome to EECS 450 Internet Security. Why Internet Security The past decade has seen an explosion in the concern for the security of information –Malicious.

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
CS 345 Distributed Systems Fabián E. Bustamante, Winter 2004 Welcome to Advanced OS Fabián E. Bustamante (Instructor) Yi Qiao (Ad Honorem TA) Communication.
Introduction to Security Computer Networks Computer Networks Term B10.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Welcome to EECS 350 Introduction to Computer Security.
Welcome to CS 395/495 Introduction to Computer Security.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
Welcome to CS 395/495 Internet Security: A Measurement-based Approach.
Welcome to EECS 354 Network Penetration and Security.
Welcome to CS 450 Internet Security: A Measurement-based Approach.
Welcome to CS 395/495 Basic Information Security: Technology, Business and Law.
Welcome to EECS 440 Advanced Networking. What is this class about? Goal: to help you learn how to do the networking research –Read research papers –Argue.
Welcome to EECS 450 Internet Security. 2 Why Internet Security The past decade has seen an explosion in the concern for the security of information –Malicious.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Welcome to CS 395/495 Internet Measurement and its Reverse Engineering.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Welcome to CS 395/495 Internet Architectures. What is this class about? (1) Goal: to help you understand what the future Internet will look like –What.
Project Management Take a Tour of the Online Course.
ECS15: Introduction to Computers Fall 2013 Patrice Koehl
Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs
Welcome to EECS 450 Internet Security. 2 Why Internet Security The past decade has seen an explosion in the concern for the security of information –Malicious.
EECS 354 Network Security Introduction. Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
COMP Introduction to Programming Yi Hong May 13, 2015.
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
TEL581. Outline “Divide and Conquer” Potential Topic Areas Teams Schedule Grading Benefits Assistance Lecture Slides Lab Assignment Homework Assignment.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Computer & Network Security
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Advanced Computer Networking Course Overview 1. This is a graduate-level course which covers advanced topics in computer networks including current hot.
CSci8211: Logistics1 CSci8211: Advanced Computer Networks and Their Applications aka Basic Architecture, Mechanisms and Research Issues in Emerging Software-
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2010.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
David Evans Nate Paul Anh Nguyen-Tuong CS851: Malware University of Virginia Computer Science Malware Seminar Fall 2004.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
Computer Viruses By: Eyad Al-Hazmi. Roadmap Introduction : Computer Viruses in brief Danger of Virus attacks Virus Attacks and Ethics Economic Impact.
Unit 9: Distributing Computing & Networking Kaplan University 1.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
Network Economics -- Introduction and rules Patrick Loiseau EURECOM Fall 2012.
Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor.
1 NES554: Computer Networks Defense Course Overview.
Welcome to EECS 395/495 Online Advertising: A Systems Approach.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Spring 2016.
1 What will be the Coming Super Worms and Viruses By Alan S H Lam.
History of the Internet Pat Morin COMP Outline Origins of the Internet Internet timeline from 1970s until today The Internet today.
Welcome to EECS 395/495 IoT Networks Seminar
Welcome to EECS 395/495 Networking Problems in Cloud Computing
CDA6938/COT4932 Special Topic: Research in Computer and Network Security (spring’06) Class Overview.
CNT 4704 Computer Communication Networking (not “analysis”)
CNT 4704 Computer Communication Networking (not “analysis”)
CSCD 433/533 Advanced Computer Networks
Internet Worm propagation
CSCD 330 Network Programming Spring
CSCD 433/533 Advanced Computer Networks
CSCD 330 Network Programming Spring
Welcome to CSci8211: Advanced Computer Networks and Their Applications aka Basic Architecture, Mechanisms and Research Issues in Emerging Software-Defined.
Presentation transcript:

Welcome to EECS 450 Internet Security

Why Internet Security The past decade has seen an explosion in the concern for the security of information –Malicious codes (viruses, worms, etc.) caused over $28 billion in economic losses in 2003Security specialists markets are expanding ! –“ Full-time information security professionals will rise almost 14% per year around the world, going past 2.1 million in 2008” (IDC report) Security has become one of the hottest jobs even with downturn of economy

Why Internet Security (cont’d) Internet attacks are increasing in frequency, severity and sophistication Denial of service (DoS) attacks –Cost $1.2 billion in 2000 –1999 CSI/FBI survey 32% of respondents detected DoS attacks directed to their systems –Thousands of attacks per week in 2001 –Yahoo, Amazon, eBay, Microsoft, White House, etc., attacked

Why Internet Security (cont’d) Virus and worms faster and powerful –Melissa, Nimda, Code Red, Code Red II, Slammer … –Cause over $28 billion in economic losses in 2003, growing to over $75 billion in economic losses by –Code Red (2001): 13 hours infected >360K machines - $2.4 billion loss –Slammer (2003): 15 minutes infected > 75K machines - $1 billion loss Spams, phishing … New Internet security landscape emerging: BOTNETS !

The History of Computing For a long time, security was largely ignored in the community –The computer industry was in “survival mode”, struggling to overcome technological and economic hurdles –As a result, a lot of comers were cut and many compromises made –There was lots of theory, and even examples of systems built with very good security, but were largely ignored or unsuccessful E.g., ADA language vs. C (powerful and easy to use)

Computing Today is Very Different Computers today are far from “survival mode” –Performance is abundant and the cost is very cheap –As a result, computers now ubiquitous at every facet of society Internet –Computers are all connected and interdependent –This codependency magnifies the effects of any failures

Biological Analogy Computing today is very homogeneous. –A single architecture and a handful of OS dominates In biology, homogeneous populations are in danger –A single disease or virus can wipe them out overnight because they all share the same weakness –The disease only needs a vector to travel among hosts Computers are like the animals, the Internet provides the vector. –It is like having only one kind of cow in the world, and having them drink from one single pool of water!

The Spread of Sapphire/Slammer Worms

The Flash Worm Slammer worm infected 75,000 machines in <15 minutes A properly designed worm, flash worm, can take less than 1 second to compromise 1 million vulnerable machines in the Internet –The Top Speed of Flash Worms. S. Staniford, D. Moore, V. Paxson and N. Weaver, ACM WORM Workshop 2004.The Top Speed of Flash Worms –Exploit many vectors such as P2P file sharing, intelligent scanning, hitlists, etc.

Logistics Instructor Yan Chen Location and time Tu. and Th. 2-3:20pm, M166 Tech

Seminar class: paper reading + a big project Start with overview of Internet attack landscape Introducing BGP and Internet routing security –IP hijacking Major attack force: botnet and the underground economy Main defense mechanism: intrusion detection/prevention system Most important emerging threat: Web security Other topics –Wireless net security, honeynet/honeyfarm, spam, etc. Course Overview

Prerequisites and Course Materials Required: EECS340 (Intro to computer networking) or any introductory networking course, or talk to me Highly Recommended: EECS350 No required textbook – paper reading! Recommended books on computer security (see webpage for a complete list)

Grading No exams for this class Class participation 10% Paper reading summary 10% In class paper presentation and debate 25% Project 55% –Proposal and survey 5% –Midterm presentation and report 10% –Weekly report and meeting 10% –Final presentation 10% –Final report 20%

Paper Reading Write a very brief summary of each paper, to be ed to me before the class Summary should include: –Paper title and its author(s) –Brief one-line summary –A paragraph of the one or two most significant new insight(s) you took away from the paper –A paragraph of at least two most significant flaw(s) of the paper –A last paragraph where you state the relevance of the ideas today, potential future research suggested by the article

Class Format - Presentation Student presentations of one paper or two closely related papers –Introduction of the basic problems, survey of the related work, give overview to the general problems (30 minutes) –40 minutes for particular solutions presented in these two papers –Each non-speaker need to ask at least two questions about the shortcoming for the paper or any issues raised from the presentation Summarize with the last 10 minutes

Format of the Presentation Presentation should include the following –Motivation –Classification of related work/background –Main ideas –Evaluation and results –Open issues Send the slides to me for review at least 24 hours ahead of the class Guidelines online

Projects The most important part of class –Group of 2 or 3 people (an undergrad will be paired w/ a grad) Project list to be discussed soon Proposal – 1/18 –3-4 pages describing the purpose of the project, work to be done, expected outcome/results and related work Weekly Meeting and Progress Report – 1/12-3/8 –Each team will schedule a weekly meeting (30 minutes) with me. An accumulative work-in-progress report (with 1-2 page new content) is due 24 hours ahead of the meeting. Midterm presentation – 2/10 Midterm report – 2/8 Project Presentation – 3/10 and 3/12 Final Report – 3/18

Next … Sign up for Presentation Symantec Internet Threat Report Discussion of potential projects –Web security, e.g., malicious code that modifies Web pages (Alex, Yi 4pm) –Web plug-in security: vulnerability and/or defense (Ben, Yinzhi 3:30pm Tu) –High-throughput Network IDS/IPS (Hongyu, Clint 1:15pm Tu) –Viruses through removable media and shrink-wrapped devices as a new threat E.g., USB rather than floopy disk –Measurement study of social networking and online auction/payment sites for phishing (Kai, Issac 5pm)