Download presentation
Presentation is loading. Please wait.
Published byElfrieda Davis Modified over 9 years ago
1
Protecting the irreplaceable | f-secure.com Internet threat monitoring and reporting service Idar Kvernevik Senior Researcher, Network Security Security Research Olli Salminen, Senior Manager, Lab Development F-Secure Labs
2
Project idea F-Secure has sensors that collect data about infected computers and suspicious activity on the Internet There is no easy way to mine and share this data with the network owners Create a system for processing and sharing infection data with partners © F-Secure May 8, 20152
3
Technologies Preferably Python, Java (etc.) acceptable MySQL / PostgreSQL Django or some other similar framework can be used Linux Server (Debian) © F-Secure May 8, 20153
4
Most important areas and our expectations User experience Interfaces with existing and future systems Collecting data from different sources into one system Security Data confidentiality, non-exploitable system, securing the shared data, etc. Prototype of the system and documentation © F-Secure May 8, 20154
5
Why F-Secure? Interesting, real-life project F-Secure provides dedicated people for follow-up F-Secure is a professional software development organization, and will help make this project a success … but at the same relaxed and nice atmosphere We have done T4115 project many times and succeeded always: Result has been 4 or 5 every time F-Secure has hired people after T4115 project earlier, this might be your chance We will arrange p roject kick-off party and project post-mortem party with food, snacks, beer, etc. © F-Secure May 8, 20155
6
What kind of information do we have? Compromised computers (IP address and time stamp) Botnet controllers and other malicious servers (IP addresses, DNS names) Sites distributing high-risk malware (URLs) DNS domain registration information (who registers what, known bad guys?) → stored to SQL database © F-Secure May 8, 20156
7
System overview - TKK project work © F-Secure May 8, 20157 Host ID database Normaliser Database administration interface Locator Account management Data sub- scription GUI Visualisation tool Report generator Report mailer Sinkhole system Response systems Honeypots etc. DNS mining Other systems External systems Web Portal
8
User story: infected host 1.A home user gets infected with malware 2.His computer tries to connect back to the malware command server 3.The connection hits the F-Secure sinkhole 4.F-Secure systems collect the host’s IP address, a timestamp, and type of infection 5.This information is passed on to the user’s service provider 6.The service provider informs the user and provides him with correct disinfection instructions © F-Secure May 8, 20158
9
User story: suspect DNS domain 1.Salli Olminen has registered many malicious domains in the past 2.He registers a new domain called malware-r-us.com 3.Our systems discover that this new domain is owned by Salli Olminen 4.The info sharing system passes this information to the domain registrar 1.The domain registrar disables the domain © F-Secure May 8, 20159
10
User story: impending phishing attack 1.F-Secure Labs discover that a new malware is targeting customers of one particular bank. 2.They register this information in the ITMRS 3.The bank receives a notification from the system 4.The bank notifies its customers and hardens the net banking system ahead of the attack 5.The attack fails © F-Secure May 8, 201510
11
Thank you! Idar Kvernevik idar.kvernevik@f-secure.com 040-506 5137
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.