How the Internet Goes Wrong Jon Crowcroft,

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Technology In My World A stand-alone instruction resource for children exiting 2 nd grade. Click on the play button -- By: Vickie Lehtonen To move to.
IT253: Computer Organization
Personal Computer Safety. What's the point? ● Computers/Internet are a huge part of our lives – A place to store our family photos – A way to pay bills.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Nummenmaa & Thanish: Practical Distributed Commit in Modern Environments PDCS’01 PRACTICAL DISTRIBUTED COMMIT IN MODERN ENVIRONMENTS by Jyrki Nummenmaa.
How computers changed the world.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
8 February How Computers Work: Algorithms The Internet.
Mobility in the Internet Part II CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Department of Information Engineering 1 Objectives A basic understanding of the following –What is Internet? –What is client-server computing? –What is.
How the Internet Works Jon Crowcroft,
By Laura Trawin.
Computer Networks IGCSE ICT Section 4.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
Computer Networks.
Introduction to Computers and the Internet. What is a computer? An "intelligent" machine  You tell a person to do a job and the person follows your “instruction”
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Review Academic Talent Search. All About Networking DevicesDevices Packet TransferPacket Transfer HardwareHardware SoftwareSoftware Wiring/CablingWiring/Cabling.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
How the Internet Works. The Internet and the Web The Web is actually just one of many computer applications that run on the Internet Among others are.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
20.3 Electric Circuits
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Audacity Audacity web address:
Anitvirus and Firewall Nathan Wun, Adam Staron, Kyle Tarnowski, Ryan Bywater.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Networks Mr Hewitt. Objectives By the end of this lesson you will be able to: Compare stand alone, networked and laptop computers Define a Network Explain.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Have fun on the internet while being safe!!  Do you know what cyber safety means?.. YesNo.
science/internet-intro
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Routing Algorithms Lecture Static/ Dynamic, Direct/ Indirect, Shortest Path Routing, Flooding, Distance Vector Routing, Link State Routing, Hierarchical.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
KS2 E-Safety assembly How to be smart and keep safe online.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Installation and Setting up a Wireless LAN. Why would you want a Wireless LAN? Because it would take a lot of cable to set up your Internet, and a wireless.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Online Safety! By: Michelle Deng.
Academic Talent Search
INTRODUCTION TO NETWORKS AND COMMUNICATIONS
Introduction to Computers
Introduction to Networking
AP CSP: Making a reliable Internet & DNS
Security in Networking
Unit 11- Computer Networks
Tonga Institute of Higher Education IT 141: Information Systems
Overview of Networking
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Tonga Institute of Higher Education IT 141: Information Systems
Presentation transcript:

How the Internet Goes Wrong Jon Crowcroft,

Let’s look at what can go wrong We take the Internet for granted Until something doesn’t work! Let’s look at three common problems 1. Why can’t I get to a web site? 2. Why’s my download suddenly go slow? 3. Why’s my computer just got virused?

Outage! Aside from wires coming unplugged, or computers crashing (yours or theirs) there are several reasons you might not be able to get to a website :- 1. Names 2. Addresses 3. Routes

The Wires…

Flakey hardware improved by Smart Software Wires get broken People kick cables out Turn computers off Power fails Can we make up for this by making the whole Smarter than the sum of the parts? Yes - control software!!

The Domain Name System When you type (or cut&paste) what you want… a “lookup” is done to Find the IP Address Which is Where it is The DNS may be broken.. Or you might just type something slightly wrong

Routing An address is where, but then you need a map and a compass to find the route The net does this For you in a Distributed way Which can go wrong!

Dynamics Even as things change, software can keep track

Congestion Traffic jams can happen anywhere…on the internet too…

The Internet is shared, like roads Not so much like railways or flight paths So you have to wait your turn If there’s a lot of users, the wait gets longer This is “implemented” by software in your computer which runs a protocol Called TCP - which cooperates with other computers implicitly to give a fair share…think about card games or anything where there are rounds…but where you can pass if you like It isn’t exactly like that as it would take to long in a network, so instead it uses statistics

Insecurity! You may program your computer, But most the programmes you use were written by someone else (Microsoft, Apple, open source contributers) When you download a programme, how do you know who really wrote it, and what they really want to do with it? This is as true on your cell phone as it is on a notebook. This is true for Facebook Apps (and photo tagging) that invade your privacy.

Why do people write “malware” Sometimes they want to steal your ideas or your money But other times they want to use your computer to do things like Spam Botnets/ddos attacks Really bad guys pretend To be trying to help:

The Internet is quite complicated It isn’t (usually) complex - it’s just made of a lot of pieces, each of which is really very simple. For an “end to end” path to work Properly, as expected, and to perform well All the pieces have to function correctly Amazingly, it does work most the time Largely because we have got a lot better at designing and building computer software and hardware in the last years But there’s a lot more to do still!

Highly Optimized Tolerance There are two possible problems that present a high risk 1. Topological 2. Temporal

Topology Problems The Internet exhibits scale-freeness At many levels (link level and web level) It also exhibits clustering So we have small world…. which is good (for finding stuff) But bad for attacks, due to “hub-iness” Nodes of high betweenness (or spectral centrality) have to be protected/hardened Its software, doh, and it’s a net so it isn’t just thick lead walls and airgaps We can reboot

Temporal Problems There are lots of synchronisation phenomena Some happen all the time – the routing system is driven by clocks, for example This can self-synchronise The topology makes this more likely, not less Bad stuff can synchronise with the routing system – an scanning attack can oscillate and end up blocking routing updates, Leads to breaking connectivity, even if capacity, per se, wasn’t in question We can put in randomness to defend agains this

Cascades, Feedback, Dependencies The single biggest risk to the net is If we connect other nets to it E.g. the power grid, transport, water ctl We’ve measured HVAC vulnerabilities already Imagine a cascading fail between power+comms We’ve put all our eggs in one basket already for comms - Radio, TV and Telephone (including 3G/4G) already depend on IP… How do you tell the population to keep calm if the net is under attack, and all your comms are out Now imagine there’s no power either You are literally (and figuratively) in the dark.

Take Homes Risk if Internet Breaks is very bad indeed, if more other utilities come to depend on it for control – this should be prevented by legal/policy means – we need diverse networks (for energy, transport, food, knowledge), we do NOT want to couple them closely (or at all) The Internet itself could be made more robust/resilient, esp. to emergent bad behaviour People are aware of this in the tech community