Network Security & Network Virtualization
|
|
- Miranda Bradford
- 8 years ago
- Views:
Transcription
1 Network Security & Network Virtualization Akihiro Nakao Applied Computer Science Course Graduate School of Interdisciplinary Information Studies 2012/5/24 1
2 SPAM: The Most Annoying Problem of Today Source: APWG 3
3 Spam Coupons coupon is more attractive word than discount (kaspersky lab) 4
4 Sources of Spam in March 2012 (TOP 20) (kaspersky lab) 5
5 Spam Category Fraud Dominates in Spams (34%) (kaspersky lab) 6
6 Phishing 1. Forged Address 2. Forged Company Logo 3. Fake company site to steal your identity / privacy info 7
7 Phishing in March 2012 Finance/E-Commerce Dominate (24.6%+18.3%) SNS follows (22.85%) (kaspersky lab) 8
8 Threat of Bot/BotNets 9
9 Bot/BotNets Actions Send nuisance s (spams) Launch DDoS attacks Network infection Network scanning Spying / Eavesdropping Offered in black markets 10
10 Top-10 Spamming BotNets 11
11 Mobile Botnet Android phones are exploited as of 2012 (10k-30k devices) RootSmart backdoor (remotely controlling Android phones) Number of malware modifications for Android OS 12
12 Mac BotNets Flashback infected 700k macs in march
13 BotNets Reloaded Botnets are one of the primary technologies utilized by cyber-criminals cyber-criminals were relatively silent In Q1 2012, cyber-criminals created a botnet using an invisible bot, a fileless bot for the first time. 14
14 Slices (accommodate(diverse(nws( Network(Virtualiza/on(Infrastructure 15
15 16
16 In-Network DPI Best Spot 17
17 18
18 19
19 20
20 Processing Detail Cluster 0 Cluster1 Mails Cluster2 Cluster3 Cluster
21 BotNets on Sale! DDoS attacks typically use large botnets that rent bots on the black market for $0.03 per week PAXSON, V. private communication, December million zombie computers currently exist, and spammers can rent botnets for $.05 to 0.10 per minute. Above the Clouds: A Berkeley View of Cloud Computing February 10, $5,000 per day for a botnet of 50,000 to 70,000 PCs The New Front Line, Michael Lesk, Martin R. Stytz, Roland L. Trope 22
22 Where can I buy a BotNet? Black Market is the source of all the troubles... J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 23
23 IRC Internet Relay Chat (IRC): standard protocol for real-time message exchange over the Internet public (one-to-many) and private (one-to-one) authenticated by nickname and password 24
24 Data Collection 2.4GB of IRC logs archived over 7 month (2006) 13 M messages from 100 K nicknames timestamp, IRC server, source id, channel, message CAVEATS: Market Visibility (no private message) Assertions vs. Intentions (intention not known) Monitored Individuals Biasing Analysis J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 25
25 Market Activity Advertisements J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 26
26 Market Activity Sensitive Data Identity Information Banking Information J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 27
27 Sensitive Data Distribution J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 28
28 Luhn Algorithm X (X: Check Digit) X=3 Double every other digit Multiply by 9 (603) Compute the sum of the digits (67) Take the last digit (3) as check digit The sum with the check digit should be module
29 Luhn Check in Ruby def luhn(cc) cc = cc.gsub(/d/,'').split(//).collect{ d d.to_i } parity = cc.length % 2 sum = 0 cc.each_with_index do d,i d = d * 2 if i%2==parity d = d - 9 if d > 9 sum = sum + d end return (sum%10)==0 end 30
30 Credit Card Arrival 402 valid cards / day (17 cards / hour) 88 invalid cards / day J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 31
31 Hacking Related Ads Bank Login Sales Ads (5%) Hacked Host Sales Ads (3%) Bank Login Demand (2%) Hacked Host Demand (1%) Mailer Sales Ads (3.5%) List Sales Ads (2.5%) J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 32
32 Compromised Host Demand About 100 unique, over 1000 total demands per day J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 33
33 Compromised Host Sales About 200 unique, over 2000 total supply per day J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 34
34 Distribution of Ads of Services Cashier: a miscreant who converts financial accounts to cash Confirmer: a miscreant who helps verification for money transfer DoS, Phishing, Carder (Purchasing Goods with Others Cards J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 35
35 Prices for Compromised Hosts Extract a $ sign and non-zero digits Use SVM classifier to identify sales Ads Important to know the prices to combat attackes J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 36
36 Efficient Countermeasures Sybil Attack (1) Sybil Generation - Join channels (multiple times) (2) Achieving Verified Status - Use disjoint markets and relay sensitive data to increase status (3) Deceptive Sales - Utilize verified status Sybils to rip - Decrease buyer and seller confidence in verification system - Buyers cannot distinguish between honest and dishonest sellers - Create Lemon Market J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 37
37 Efficient Countermeasures Slander Attack - Similar to Sybil attack - Uses false defamation to reduce the status of honest sellers - Current verification uses chat transcripts as evidence J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 38
38 Is Spam Efficient? Spam is inefficient! 350 M spam messages result in 28 sales* botnets used with other form of crimes at the same time (e.g., phishing, online scam) *C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the Conference on Computer and Communications Security (CCS), Alexandria, VA, October
39 Cyber Clean Center ( ) 40
40 One-Click Fraud One-Click Fraud is a very successful online confident fraud in Japan Significant loss of 26B JPY ($260M) / year New laws being passed and special help desk Only 657 arrests and 2859 solved cases /year Ministry of Justice, Japan. Act on special provisions to the civil code concerning electronic consumer contracts and electronic acceptance notice. Japanese Information Technology Promotion Agency. Virus detection reports, October
41 OneClick Fraud Statistics Japanese Information Technology Promotion Agency. Virus detection reports, October
42 Data Collection 2 Channel BBS: The largest bulletin board in Japan, which provides discussion threads on various topics ranging from Japanese anime to sports. Several ongoing threads are dedicated to denouncing One Click Frauds. Koguma-neko Teikoku: Privately owned website providing help to solve consumer problems related with online activities. A section of the site is devoted to describing One Click Frauds, including informatio about scam incidents. Wan-Cli Zukan: Privately owned website solely devoted to exposing websites partaking in One Click Frauds. Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security43
43 Extracted Incidents Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security44
44 2 Channel Thread 45
45 Financial Damages Caused by One-Click Frauds Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security46
46 Amout of Money Requested Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security47
47 Correlation with Other Incidents One-Click site domain involves other illicit activities Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security48
48 Popular Registrar for One Click Fraud Market Share Fraudulent Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security49
49 maido3.com Top 8 Domain Resellers That Miscreants Prefer Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security50
50 DNS Changer 51
51 Literature Underground Cyber Markets DeepSight Analyst Team. Online Fraud Communities and Tools. Technical report, Symantec, January Rob Thomas and Jerry Martin. the underground economy: priceless. USENIX ;login:, 31(6), December 2006 J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 Economics Approach Ross Anderson. Why Information Security is Hard - An Economic Perspective. In 17th Annual Computer Security Applications Conference, J. Aspnes, J. Feigenbaum, M. Mitzenmacher, and D. Parkes. Towards better definitions and measures of internet security. In Workshop on Large-Scale Network Security and Deployment Obstacles,
52 Literature Bot-nets and spams C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the Conference on Computer and Communications Security (CCS), Alexandria, VA, October B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. In Proceedings of ACM CCS 09, Chicago, IL, October G. Wondracek, T. Holz, C. Platzer, E. Kirda, and C. Kruegel. Is the internet for porn? An insight into the onlineadult industry. In Proceedings (online) of the 9th Workshop on Economics of Information Security, Cambridge, MA, June
53 Literature One Click Fraud Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security Japanese Information Technology Promotion Agency. Virus detection reports, October
54 Conclusion Cyber-crimes are advancing not only in the technical viewpoint but in economics Financial incentives back up the evolution of cybercrimes, especially accelerated by black markets Legislating laws and arresting cyber-criminals may not be effective for resolving cyber-crime issues Economics approach and/or game changes necessary to combat cyber- crimes 55
INTERNET SECURITY SEMINAR
INTERNET SECURITY SEMINAR Paper : An inquiry into the nature and causes of the wealth of internet miscreants By Jason Franklin &Vern Paxson presented by Matimbila Lyuba at University of Birmingham 28/01/2013
More informationAn Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationAn analysis of the effectiveness of personalized spam using online social network public information
An analysis of the effectiveness of personalized spam using online social network public information Enaitz Ezpeleta 1, Urko Zurutuza 1, and José María Gómez Hidalgo 2 1 Electronics and Computing Department,
More informationSecurity A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
More informationDetailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
More informationDON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
More informationA Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationCountermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
More informationOverview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
More informationEvolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance
Evolving Threats and Attacks: A Cloud Service Provider s viewpoint John Howie Senior Director Online Services Security and Compliance Introduction Microsoft s Cloud Infrastructure Evolution of Threats
More informationWhat legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn
More informationSymantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
More informationLarge-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity
Computer Crime and Intellectual Property Section Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Albert Rees Computer Crime and Intellectual Property Section (CCIPS) Criminal Division,
More informationGUEST LECTURE CS475 Computer and Network Security
GUEST LECTURE CS475 Computer and Network Security AYLIN CALISKAN-ISLAM PHD CANDIDATE AT PSAL-DREXEL UNIVERSITY ADVISOR: DR. RACHEL GREENSTADT MARCH 6, 2014 CREDITS TO DR. RACHEL GREENSTADT DR. ALESSANDRO
More informationThe Economics of Attack and Defense : Spam Ecosystem"
The Economics of Attack and Defense : Spam Ecosystem" Jeffrey Avery Dependable Computing Systems Lab (DCSL) Purdue University Slide 1/22 Papers Presenting" Click Trajectories: End-To-End Analysis of the
More informationThe Tricks of the Trade: What Makes Spam Campaigns Successful?
The Tricks of the Trade: What Makes Spam Campaigns Successful? Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {7 am,
More informationBOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL
BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious
More informationLASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
More informationMarble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
More informationHong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
More informationENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
More informationUSER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
More informationImplementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
More information1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5
Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.
More informationCurrent counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
More informationWhen a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More informationOperation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
More informationPANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection
More informationThe author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Examining the Creation, Distribution, and Function
More informationAbout Botnet, and the influence that Botnet gives to broadband ISP
About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology
More informationChristos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
More informationModeling the economic incentives of DDoS attacks: femtocell case study 1
Modeling the economic incentives of DDoS attacks: femtocell case study 1 Vicente Segura, Javier Lahuerta Department of Network and Services Security Telefónica I+D {vsg, javilc}@tid.es Abstract: Many of
More informationOVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3
More informationThe SMB Cyber Security Survival Guide
The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today
More informationSpyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
More informationBotnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
More informationSpyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
More information10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
More informationKASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today
More informationCurrent Threat Scenario and Recent Attack Trends
Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks
More informationPractical tips for a. Safe Christmas
Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see
More informationPhishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
More informationA TASTE OF HTTP BOTNETS
Botnets come in many flavors. As one might expect, these flavors all taste different. A lot of Internet users have had their taste of IRC, P2P and HTTP based botnets as their computers were infected with
More informationHow To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
More informationKaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
More informationCybercrime in Canadian Criminal Law
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
More information2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
More informationFraud and Abuse Policy
Fraud and Abuse Policy 2015 FRAUD AND ABUSE POLICY 2015 1 Contents 4. Introduction 6. Policy Goal 7. Combatting Customer Fraud and Abuse 8. Reporting Breaches 9. How Alleged Breaches Will Be Investigated
More informationCSC474: Network Security
CSC474: Network Security Lecture 20 Prof. William Enck Fall 2015 (Derived from slides by Micah Sherr and Adam Aviv) Spam: Unsolicited Email The enemy: Spiced Ham 2004 study: 40% of email traffic costs
More informationInformation Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: scleung@hkcert.org 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
More informationCYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
More informationUsing big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
More informationBotnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
More informationProtecting DNS Query Communication against DDoS Attacks
Protecting DNS Query Communication against DDoS Attacks Ms. R. Madhuranthaki 1, Ms. S. Umarani, M.E., (Ph.D) 2 II M.Tech (IT), IT Department, Maharaja Engineering College, Avinashi, India 1 HOD, IT Department,
More informationBefore the DEPARTMENT OF COMMERCE Internet Policy Task Force
Before the DEPARTMENT OF COMMERCE Internet Policy Task Force In the Matter of Cybersecurity, Innovation Docket No. 100721305-0305-01 and the Internet Economy COMMENTS OF VeriSign, Inc Joe Waldron Director,
More informationIntroduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
More informationSymantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
More informationCybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical
Crime and Cybercrime An act committed or omitted in violation of a law forbidding or commanding it and for which punishment is imposed upon conviction http://www.thefreedictionary.com/crime Deviant behavior
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationThe anatomy of an online banking fraud
The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to valentin@xenuser.org (March2010) I. What this document is about II. Introduction III. The anatomy of an
More informationExtending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
More informationEmail David-Kovarik@northwestern.edu Phone 847-467-5930 Fax 847-467-6000
Information Technology Information and Systems Security/Compliance Northwestern University 1800 Sherman Av Suite 209 Evanston, IL 60201 Email David-Kovarik@northwestern.edu Phone 847-467-5930 Fax 847-467-6000
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationCS 6262 - Network Security: Botnets
CS 6262 - Network Security: Botnets Professor Patrick Traynor Fall 2011 Story 2 Botnets A botnet is a network of software robots (bots) run on zombie machines which run are controlled by command and control
More informationWE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
More informationBig Data and Cyber Security A bibliometric study Jacky Akoka, Isabelle Comyn-Wattiau, Nabil Laoufi Workshop SCBC - 2015 (ER 2015) 1 Big Data a new generation of technologies and architectures, designed
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationProtecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
More informationCloud Security VS Cybercrime Economy: The Kaspersky Vision. Eugene Kaspersky Co-founder & CEO, Kaspersky Lab
Cloud Security VS Cybercrime Economy: The Kaspersky Vision Eugene Kaspersky Co-founder & CEO, Kaspersky Lab The Digital World is Under Attack 20 000 000 The last five years have become the 18 000 000 Golden
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationA Review on IRC Botnet Detection and Defence
A Review on IRC Botnet Detection and Defence Bernhard Waldecker St. Poelten University of Applied Sciences, Austria Bachelor programme: IT-Security 1 Introduction Nowadays botnets pose an enormous security
More informationCyber Security and Critical Information Infrastructure
Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes
More informationProtect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
More informationData Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd michaels@radware.com Riga. Baltic IT&T. 21.04.
Data Centers Protection from DoS attacks. Trends and solutions Michael Soukonnik, Radware Ltd michaels@radware.com Riga. Baltic IT&T. 21.04.2010 Cybercrime Trends Page 2 Types of DoS attacks and classical
More informationSoftware Engineering 4C03 SPAM
Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as
More informationApplying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.
Applying the 80/20 approach for Operational Excellence How to combat new age threats, optimize investments and increase security Vinod Vasudevan Agenda Current Threat Landscape The 80/20 Approach Achieving
More informationSAC 025 SSAC Advisory on Fast Flux Hosting and DNS
Fast and Double Flux Attacks 1 SAC 025 SSAC Advisory on Fast Flux Hosting and DNS An Advisory from the ICANN Security and Stability Advisory Committee (SSAC) January 2008 Fast and Double Flux Attacks 2
More informationNobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy
Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy Cormac Herley and Dinei Florêncio Microsoft Research One Microsoft Way Redmond, WA, USA c.herley@ieee.org,
More informationBotNets- Cyber Torrirism
BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation
More informationInformation Security. Be Aware, Secure, and Vigilant. https://www.gosafeonline.sg/ Be vigilant about information security and enjoy using the internet
Be Aware, Secure, and Vigilant Information Security Use the Internet with Confidence Be vigilant about information security and enjoy using the internet https://www.gosafeonline.sg/ The Smartphone Security
More informationInnovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationCybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
More informationSecurity Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
More informationPractical guide for secure Christmas shopping. Navid
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
More informationCollateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
More informationCountermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
More informationDetecting Spamming Activities by Network Monitoring with Bloom Filters
Detecting Spamming Activities by Network Monitoring with Bloom Filters Ping-Hai Lin, Po-Ching Lin, Pin-Ren Chiou, Chien-Tsung Liu Department of Computer Science and Information Engineering National Chung
More informationCYBERCRIME AND THE HEALTHCARE INDUSTRY
CYBERCRIME AND THE HEALTHCARE INDUSTRY Access to data and information is fast becoming a target of scrutiny and risk. Healthcare professionals are in a tight spot. As administrative technologies like electronic
More informationTHE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing
THE BEST WAY TO CATCH A THIEF Patrick Bedwell, Vice President, Product Marketing AlienVault Vision Accelerating and simplifying threat detection and incident response for IT teams with limited resources,
More informationMALWARE TOOLS FOR SALE ON THE OPEN WEB
MALWARE TOOLS FOR SALE ON THE OPEN WEB May 2014 RSA Research, while investigating a Zeus Trojan sample, discovered an additional drop server used by a fraudster who is offering a set of spyware tools for
More informationProtection for Mac and Linux computers: genuine need or nice to have?
Protection for Mac and Linux computers: genuine need or nice to have? The current risk to computers running non-windows platforms is small but growing. As Mac and Linux computers become more prevalent
More informationACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
More informationTemporal Correlations between Spam and Phishing Websites
Temporal Correlations between Spam and Phishing Websites Tyler Moore Center for Research on Computation and Society, Harvard University tmoore@seas.harvard.edu Richard Clayton Computer Laboratory, University
More informationINFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
More informationRESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market
RESEARCHBRIEF Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market Lion Gu After taking a grand tour of the Chinese underground market last year, let s revisit it and see what has
More informationThe FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
More informationAgenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
More informationGUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V
GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V Subject Name: Cyber Security and Forensics (CSF) (Elective-II) Subject Code: 2650008 1. Learning Objectives: To understand
More informationThe Evolution of Computer Security Attacks and Defenses. Angelos D. Keromytis Columbia University angelos@cs.columbia.edu
The Evolution of Computer Security Attacks and Defenses Angelos D. Keromytis Columbia University angelos@cs.columbia.edu This talk A look at the evolution of: nature of attackers and their goals cyber
More information