THE INTERNET IS INSECURE AND WILL LIKELY REMAIN SO - WHAT NOW? Henning Schulzrinne FCC & Columbia University Georgia Tech, November 2012.

Slides:



Advertisements
Similar presentations
User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Basic Communication on the Internet:
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
7 Effective Habits when using the Internet Philip O’Kane 1.
Breaking Trust On The Internet
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Safe Internet Use Mark Wheatley CSI Onsite
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
Robocalling in the VoIP Age Henning Schulzrinne, FCC What does VoIP offer to robocallers? We (kind of) solved the spam problem – why not robocalls?
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Cybersecurity Test Review Introduction to Digital Technology.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
IT Security Awareness Day October 19, 2016
STOP. THINK. CONNECT. Online Safety Quiz.
IS4550 Security Policies and Implementation
Information Security Session October 24, 2005
2016 Annual CPNI Training CPNI & PI Awareness Beth Slough,
Staying safe on the internet
Protecting Yourself from Fraud including Identity Theft
Unit# 5: Internet and Worldwide Web
Protecting Yourself from Fraud including Identity Theft
Technology assistance
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

THE INTERNET IS INSECURE AND WILL LIKELY REMAIN SO - WHAT NOW? Henning Schulzrinne FCC & Columbia University Georgia Tech, November 2012

Who am I talking to? You? (Future) developer of apps (Future) sys admin Researcher (maybe) Participant in gov’t policy making (= citizen!) 2

Overview Security fallacies Stop blaming (and “educating”) users Reduce the value of targets Avoid “small mistake, huge cost” Secure key identifiers Make it hard to scale attacks Make it easy to detect loss Design fraud-resistant systems Worry about DOS attacks on humans Robo-calling and caller ID spoofing 3

Security approach: blame the victim 4 Run 10 anti-virus systems! Pay cash! Choose passwords you can’t remember! Choose another operating system! Don’t click on that link!

Nobody cares about you! Unless you have access to high-value information sometimes for individualized identity theft You are only valuable as a credit card number that can be resold in bulk ($2-$8) a machine usable for … DOS attacks spam 88% of spam sent by botnet a machine usable for advertising click fraud watch highlighted links! $ /click  $0.50-$2 CPM 5

You are (mostly) on your own Credit card liability limited to $50 US: mag stripe vs. chip & PIN Debit card two days  $50, otherwise $500 Checks no, your bank does not check your signature (or your address) Consumer bank account  Regulation E no liability if reported within 60 days Small business account No protection, no loss bound ACH fraud common 6

Example: ZeroAccess The ZeroAccess botnet infected 2.2 million home networks worldwide during Q3 [2012], making it the most active botnet for the year thus far, said a malware report from security analysis firm Kindsight. The Alcatel-Lucent subsidiary's Security Labs team found ZeroAccess infected one in 125 home networks during the quarter. “Cybercriminals are primarily using it to take over victim computers and conduct ad-click fraud,” Kindsight Security Labs security architect Kevin McNamee said Tuesday in a news release. “With ZeroAccess, they can mimic the human behavior of clicking online ads, resulting in millions of dollars of fraud.” The botnet may be costing advertisers $900,000 per day in ad-click fraud, Kindsight said. About 13 percent of home networks in North America were infected in Q3, with 6.5 percent of all home networks having high-level threats like bots and banking Trojans, Kindsight said ( 7

Identity theft is often analog 8

AUTHENTICATION 9

Traditional authentication 10 Authentication Something you know (password) Something you have (cell phone, fob) Something you are (biometrics) Where you are (light switch)

Password policies gone amuck Contradictory policies Strong passwords don’t work everywhere Password expiration and can’t use old one Don’t re-use password across sites NY Times, 11/07/

Password advice Unless you’re the CIA director, writing down passwords is safe you’ll pick safer ones if you do Stop blaming users  web sites need to tell us what they do bad: plain text, silly rules not much better: hashed good: salted hash, single sign-on Impacts password recovery bad: your dog’s name not great: send password to ok: time-limited reset link 12

More password issues With rainbow tables, only length matters 12+ characters likely safe Always next year: single sign on 13

Reduce value of goods Particularly single-factor goods if you can’t tell that they are gone 14

What about non-passwords? Replacements have been suggested: Swipe pattern (Android) Voice pattern Fingerprints Keyboard typing or swiping Face recognition Problems: not generalizable only works on some devices not precisely representable doomed if you have a cold or are in a noisy airport hard to have different ones  bad if clonable Useful as supplement for high- value transactions 15

The convergence to “what you have” Two-factor authentication Advantages: easy to recognize when lost hard to scale theft (but: see RSA) separate data path voice path vs. data path postal mail related: host recognition (e.g., via cookies) 16

Provide physical validation services Goals: make scaling hard for bad guy increase risk of arrest make geography matter But generally not integrated with digital processes! 17

SECURING THE INTERNET 18

We must make the Internet secure! knows the what & who Application layer certificate validation often wrong no client certificates (domain vs. user) integrated transport & security layer? Transport layer: TLS, DTLS deployability doesn’t know user & desired operation changes with mobility IP layer as introducer  by definition, parties may not know each other  secure infrastructure Internet layer 19

Securing the Internet – once and for all! Dream of a security layer that lets everybody else do nothing Suggested: “Internet passport” no more unauthenticated packets! what about compromised machines? Possible: “don’t talk to me unless I talked to you”  permission-based sending most useful for small-group DOS attacks but most are now trickle attacks keep out packets at coarse level “not interested in packets from Elbonia” but easily spoofed 20

Cause of death for the next big thing 21 QoSmulti- cast mobile IP active networks IPsecIPv6 not manageable across competing domains  not configurable by normal users (or apps writers)  no business model for ISPs  no initial gain  80% solution in existing system  (NAT) increase system vulnerability 

Secure key identifiers Security by: return routability cryptographic proof of ownership keeping them secret (SSN) IdentifierProof of ownership SpoofableCritical for IP addressRR, RPKI (?)egress filtering (RFC 3013) everything… AS numberRPKI?yes (BGP)routing domain nameTLSTLS failures  DANEweb sites addressRRmostlypassword recovery phone numberRRcaller-ID spoofing2-factor authentication location?yesauthentication 22

Avoid single-failure = catastrophic failure Download the wrong application  bank account gone Attacker advantage: one flaw, hundreds of thousands of victims  Make it hard to scale attacks require access to physical world multiple paths that are unpredictable to far-away third party Honey pots (e.g., trap spam senders) System design: separate systems for high-value transactions separate web browser separate VM single-purpose computer second independent path: SMS 23

SECURING END SYSTEMS 24

The old attack model 25 port 135 (DCE) port 1433, 1434 (MS SQL) port 137, 139 (NetBIOS) Internet

… and now 26 downloaded documents

Vulnerabilities dubious metric?

What can be done? Harden key libraries protocols (HTTP, IMAP, SIP, …) file type parsing  fuzzing Separate parsing & system access via pipe e.g., Google Chrome Separate VM for enterprise applications Restrict privileges Android: each app has separate user ID Permission restriction App store, rather than browser, for installing software No need to store files in system areas Limited system permissions harder with HTML5, WebRTC, SVG, … 28

Design pattern: process separation 29

App permissions are not sufficient 30

INFRASTRUCTURE SECURITY 31

32 Improving network infrastructure security FCC + industry for six months  three critical threats to the Internet: Domain Name System security Routing security Botnets Specific voluntary recommendations approved by CSRIC in March 2011 to advance deployment of DNSSEC, BGPSEC, and a domestic ISP Code of Conduct to fight botnets. Nine of the largest ISPs, representing nearly 90% of the domestic user base, publicly announced their intent to deploy the recommendations. Next step: measure deployment & impact  Measuring Broadband America 32

Anti-botnet ecosystem 33

SECURITY BEYOND VIRUSES AND PHISHING: FRAUD & HUMAN DOS ATTACKS 34

Fraud in TRS (text relay service)

DOS attacks on humans:

ROBOCALLS & CALLER-ID SPOOFING 37

The Telemarketing Sales Rule: Three Protections 38 Do not call (national) no sales calls to users on do-not-call list Do not call (entity-specific) businesses and for ‐ profit fundraisers can’t make sales or solicitation calls to consumers who have previously requested not to receive calls from that company. Robocalls businesses can’t make sales calls to consumers does not include politicians prohibited even if the consumer’s phone number is not on the Do Not Call Registry except written permission FTC (Will Maxson, 2012)

What calls are not covered? Most business to businesses telemarketing Debt collection calls Customer service or customer satisfaction calls Market research/survey calls (only if no sales pitch) Polling/political calls (get out the vote, contribution requests) Calls made by companies subject to special federal /state regulation (banks, phone companies, insurance companies) Robocalls delivering a healthcare message made by or for a covered entity, as defined by the HIPAA Privacy Rule 39 FTC (Will Maxson, 2012)

How do robocalls work? 40 FTC 2012

The geography of robo-calling 41 FTC 2012

Robocall eco system 42 FTC 2012

What you can do when robo-called 43

The enablers Robocalling Cheap VoIP Number spoofing Cheap labor 44

Law enforcement vs. robocallers Agile numbering Automated customer acquisition Transnational One faxed subpoena at a time Manual trace-back Largely domestic 45

What has changed? customer local exchange carrier one assigned number one assigned number can’t tell end user from provider  can use any number 46

Caller ID Act of 2009: Prohibit any person or entity for transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongfully obtain anything of value. 47 Caller ID spoofing

enhances theft and sale customer information through pretexting harass and intimidate (bomb threats, disconnecting services) enables identity theft and theft of services compromises and can give access to voice mail boxes can result in free calls over toll free dial-around services facilitates identification of the name (CNAM) for unlisted numbers activate stolen credit cards causes incorrect billing because the jurisdiction is incorrect impairs assistance to law enforcement in criminal and anti- terrorist investigations 48 Caller ID spoofing A. Panagia, AT&T

Switch A SPOOFER SPOOFEE Switch B STP CNAM VoIP Application IP PSTN A. Panagia, AT&T VoIP spoofing 49

Why not use spam filtering techniques? Phone calls Name spaceinfiniterelatively small Content inspectioncommonnot possible AddressesIP address – non-spoofable for TCP address – easily spoofable Phone number -- spoofable Deliveryfiltered by provider: block lists (e.g., Spamhaus) SPF, DKIM interconnection and delivery obligations Delivery traceReceived-by headersVia headers – only for end- to-end VoIP calls Limited-use addresseasy (e.g., web mail)not feasible Consent-basedCAPTCHA systems (not common) likely too annoying see also RFC

Future, part 1: trustable phone numbers previous contact 51

IP-based PSTN: build in security! Via: SIP/2.0/TLS client.biloxi.example.com:5061;branch=z9h G4bKnashds7 ;received= trace call route automatically route subpoena §§§ VoIP provider AVoIP provider B 52

53 Caller identification name unimportant bank ✔ credit card office ✔ known caller previous calls sent her s can you recommend student X? name unimportant IEEE ✔ known university ✔ what’s your SSN?

For unknown callers, care about attributes, not name SIP address-of-record (AOR)  attributes employment (bank, registered 501c3) membership (professional) age (e.g., for mail order of restricted items) geographic location Privacy  selective disclosure no need to disclose identity 54 Attribute validation

55 Attribute Validation Service Attribute Validation Server (AVS): Issuer e.g., members.ieee.org Caller: Principal Alice Student member in ieee.org tel: Callee: Relying Party Bob Accepts calls from members in ieee.org; does not know Alice’s phone number 2. Makes a call with the ARID and part of access code HTTP over TLS SIP over TLS 3. Establishes the validity of the ARID with access code and retrieves selected attributes e.g., Alice’s role {Alice’s username, credentials, user ID, role} 1. Requests an ARID, selecting attributes to disclose Attribute Reference ID (ARID) e.g., c78e9b8d1ad58eb3f4b5344a4c0d5a 35a023 55

Conclusion Internet security is a systems problem, not (primarily) a crypto or protocol problem Treat security as system failures  redundancy, time-to- repair Don’t wait for the Internet to be secure Global optimization: change processes encourage transparency and informed consumer choice 56