Network Security & Network Virtualization

Size: px
Start display at page:

Download "Network Security & Network Virtualization"

Transcription

1 Network Security & Network Virtualization Akihiro Nakao Applied Computer Science Course Graduate School of Interdisciplinary Information Studies 2012/5/24 1

2 SPAM: The Most Annoying Problem of Today Source: APWG 3

3 Spam Coupons coupon is more attractive word than discount (kaspersky lab) 4

4 Sources of Spam in March 2012 (TOP 20) (kaspersky lab) 5

5 Spam Category Fraud Dominates in Spams (34%) (kaspersky lab) 6

6 Phishing 1. Forged Address 2. Forged Company Logo 3. Fake company site to steal your identity / privacy info 7

7 Phishing in March 2012 Finance/E-Commerce Dominate (24.6%+18.3%) SNS follows (22.85%) (kaspersky lab) 8

8 Threat of Bot/BotNets 9

9 Bot/BotNets Actions Send nuisance s (spams) Launch DDoS attacks Network infection Network scanning Spying / Eavesdropping Offered in black markets 10

10 Top-10 Spamming BotNets 11

11 Mobile Botnet Android phones are exploited as of 2012 (10k-30k devices) RootSmart backdoor (remotely controlling Android phones) Number of malware modifications for Android OS 12

12 Mac BotNets Flashback infected 700k macs in march

13 BotNets Reloaded Botnets are one of the primary technologies utilized by cyber-criminals cyber-criminals were relatively silent In Q1 2012, cyber-criminals created a botnet using an invisible bot, a fileless bot for the first time. 14

14 Slices (accommodate(diverse(nws( Network(Virtualiza/on(Infrastructure 15

15 16

16 In-Network DPI Best Spot 17

17 18

18 19

19 20

20 Processing Detail Cluster 0 Cluster1 Mails Cluster2 Cluster3 Cluster

21 BotNets on Sale! DDoS attacks typically use large botnets that rent bots on the black market for $0.03 per week PAXSON, V. private communication, December million zombie computers currently exist, and spammers can rent botnets for $.05 to 0.10 per minute. Above the Clouds: A Berkeley View of Cloud Computing February 10, $5,000 per day for a botnet of 50,000 to 70,000 PCs The New Front Line, Michael Lesk, Martin R. Stytz, Roland L. Trope 22

22 Where can I buy a BotNet? Black Market is the source of all the troubles... J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 23

23 IRC Internet Relay Chat (IRC): standard protocol for real-time message exchange over the Internet public (one-to-many) and private (one-to-one) authenticated by nickname and password 24

24 Data Collection 2.4GB of IRC logs archived over 7 month (2006) 13 M messages from 100 K nicknames timestamp, IRC server, source id, channel, message CAVEATS: Market Visibility (no private message) Assertions vs. Intentions (intention not known) Monitored Individuals Biasing Analysis J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 25

25 Market Activity Advertisements J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 26

26 Market Activity Sensitive Data Identity Information Banking Information J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 27

27 Sensitive Data Distribution J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 28

28 Luhn Algorithm X (X: Check Digit) X=3 Double every other digit Multiply by 9 (603) Compute the sum of the digits (67) Take the last digit (3) as check digit The sum with the check digit should be module

29 Luhn Check in Ruby def luhn(cc) cc = cc.gsub(/d/,'').split(//).collect{ d d.to_i } parity = cc.length % 2 sum = 0 cc.each_with_index do d,i d = d * 2 if i%2==parity d = d - 9 if d > 9 sum = sum + d end return (sum%10)==0 end 30

30 Credit Card Arrival 402 valid cards / day (17 cards / hour) 88 invalid cards / day J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 31

31 Hacking Related Ads Bank Login Sales Ads (5%) Hacked Host Sales Ads (3%) Bank Login Demand (2%) Hacked Host Demand (1%) Mailer Sales Ads (3.5%) List Sales Ads (2.5%) J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 32

32 Compromised Host Demand About 100 unique, over 1000 total demands per day J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 33

33 Compromised Host Sales About 200 unique, over 2000 total supply per day J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 34

34 Distribution of Ads of Services Cashier: a miscreant who converts financial accounts to cash Confirmer: a miscreant who helps verification for money transfer DoS, Phishing, Carder (Purchasing Goods with Others Cards J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 35

35 Prices for Compromised Hosts Extract a $ sign and non-zero digits Use SVM classifier to identify sales Ads Important to know the prices to combat attackes J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 36

36 Efficient Countermeasures Sybil Attack (1) Sybil Generation - Join channels (multiple times) (2) Achieving Verified Status - Use disjoint markets and relay sensitive data to increase status (3) Deceptive Sales - Utilize verified status Sybils to rip - Decrease buyer and seller confidence in verification system - Buyers cannot distinguish between honest and dishonest sellers - Create Lemon Market J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 37

37 Efficient Countermeasures Slander Attack - Similar to Sybil attack - Uses false defamation to reduce the status of honest sellers - Current verification uses chat transcripts as evidence J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 38

38 Is Spam Efficient? Spam is inefficient! 350 M spam messages result in 28 sales* botnets used with other form of crimes at the same time (e.g., phishing, online scam) *C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the Conference on Computer and Communications Security (CCS), Alexandria, VA, October

39 Cyber Clean Center ( ) 40

40 One-Click Fraud One-Click Fraud is a very successful online confident fraud in Japan Significant loss of 26B JPY ($260M) / year New laws being passed and special help desk Only 657 arrests and 2859 solved cases /year Ministry of Justice, Japan. Act on special provisions to the civil code concerning electronic consumer contracts and electronic acceptance notice. Japanese Information Technology Promotion Agency. Virus detection reports, October

41 OneClick Fraud Statistics Japanese Information Technology Promotion Agency. Virus detection reports, October

42 Data Collection 2 Channel BBS: The largest bulletin board in Japan, which provides discussion threads on various topics ranging from Japanese anime to sports. Several ongoing threads are dedicated to denouncing One Click Frauds. Koguma-neko Teikoku: Privately owned website providing help to solve consumer problems related with online activities. A section of the site is devoted to describing One Click Frauds, including informatio about scam incidents. Wan-Cli Zukan: Privately owned website solely devoted to exposing websites partaking in One Click Frauds. Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security43

43 Extracted Incidents Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security44

44 2 Channel Thread 45

45 Financial Damages Caused by One-Click Frauds Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security46

46 Amout of Money Requested Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security47

47 Correlation with Other Incidents One-Click site domain involves other illicit activities Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security48

48 Popular Registrar for One Click Fraud Market Share Fraudulent Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security49

49 maido3.com Top 8 Domain Resellers That Miscreants Prefer Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security50

50 DNS Changer 51

51 Literature Underground Cyber Markets DeepSight Analyst Team. Online Fraud Communities and Tools. Technical report, Symantec, January Rob Thomas and Jerry Martin. the underground economy: priceless. USENIX ;login:, 31(6), December 2006 J. Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ACM CCS 07 Economics Approach Ross Anderson. Why Information Security is Hard - An Economic Perspective. In 17th Annual Computer Security Applications Conference, J. Aspnes, J. Feigenbaum, M. Mitzenmacher, and D. Parkes. Towards better definitions and measures of internet security. In Workshop on Large-Scale Network Security and Deployment Obstacles,

52 Literature Bot-nets and spams C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the Conference on Computer and Communications Security (CCS), Alexandria, VA, October B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. In Proceedings of ACM CCS 09, Chicago, IL, October G. Wondracek, T. Holz, C. Platzer, E. Kirda, and C. Kruegel. Is the internet for porn? An insight into the onlineadult industry. In Proceedings (online) of the 9th Workshop on Economics of Information Security, Cambridge, MA, June

53 Literature One Click Fraud Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki,"Dissecting one click frauds", Proceeding CCS '10 Proceedings of the 17th ACM conference on Computer and communications security Japanese Information Technology Promotion Agency. Virus detection reports, October

54 Conclusion Cyber-crimes are advancing not only in the technical viewpoint but in economics Financial incentives back up the evolution of cybercrimes, especially accelerated by black markets Legislating laws and arresting cyber-criminals may not be effective for resolving cyber-crime issues Economics approach and/or game changes necessary to combat cyber- crimes 55

INTERNET SECURITY SEMINAR

INTERNET SECURITY SEMINAR INTERNET SECURITY SEMINAR Paper : An inquiry into the nature and causes of the wealth of internet miscreants By Jason Franklin &Vern Paxson presented by Matimbila Lyuba at University of Birmingham 28/01/2013

More information

An Efficient Methodology for Detecting Spam Using Spot System

An Efficient Methodology for Detecting Spam Using Spot System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

An analysis of the effectiveness of personalized spam using online social network public information

An analysis of the effectiveness of personalized spam using online social network public information An analysis of the effectiveness of personalized spam using online social network public information Enaitz Ezpeleta 1, Urko Zurutuza 1, and José María Gómez Hidalgo 2 1 Electronics and Computing Department,

More information

Security A to Z the most important terms

Security A to Z the most important terms Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

A Critical Investigation of Botnet

A Critical Investigation of Botnet Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Countermeasures against Bots

Countermeasures against Bots Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer

More information

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.

More information

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance Evolving Threats and Attacks: A Cloud Service Provider s viewpoint John Howie Senior Director Online Services Security and Compliance Introduction Microsoft s Cloud Infrastructure Evolution of Threats

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Computer Crime and Intellectual Property Section Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Albert Rees Computer Crime and Intellectual Property Section (CCIPS) Criminal Division,

More information

GUEST LECTURE CS475 Computer and Network Security

GUEST LECTURE CS475 Computer and Network Security GUEST LECTURE CS475 Computer and Network Security AYLIN CALISKAN-ISLAM PHD CANDIDATE AT PSAL-DREXEL UNIVERSITY ADVISOR: DR. RACHEL GREENSTADT MARCH 6, 2014 CREDITS TO DR. RACHEL GREENSTADT DR. ALESSANDRO

More information

The Economics of Attack and Defense : Spam Ecosystem"

The Economics of Attack and Defense : Spam Ecosystem The Economics of Attack and Defense : Spam Ecosystem" Jeffrey Avery Dependable Computing Systems Lab (DCSL) Purdue University Slide 1/22 Papers Presenting" Click Trajectories: End-To-End Analysis of the

More information

The Tricks of the Trade: What Makes Spam Campaigns Successful?

The Tricks of the Trade: What Makes Spam Campaigns Successful? The Tricks of the Trade: What Makes Spam Campaigns Successful? Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {7 am,

More information

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious

More information

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way

More information

Marble & MobileIron Mobile App Risk Mitigation

Marble & MobileIron Mobile App Risk Mitigation Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park 21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon

More information

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.

More information

Current counter-measures and responses by CERTs

Current counter-measures and responses by CERTs Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Operation Liberpy : Keyloggers and information theft in Latin America

Operation Liberpy : Keyloggers and information theft in Latin America Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation

More information

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection

More information

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Examining the Creation, Distribution, and Function

More information

About Botnet, and the influence that Botnet gives to broadband ISP

About Botnet, and the influence that Botnet gives to broadband ISP About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology

More information

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends

More information

Modeling the economic incentives of DDoS attacks: femtocell case study 1

Modeling the economic incentives of DDoS attacks: femtocell case study 1 Modeling the economic incentives of DDoS attacks: femtocell case study 1 Vicente Segura, Javier Lahuerta Department of Network and Services Security Telefónica I+D {vsg, javilc}@tid.es Abstract: Many of

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

The SMB Cyber Security Survival Guide

The SMB Cyber Security Survival Guide The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Botnets: The Advanced Malware Threat in Kenya's Cyberspace Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)

More information

Spyware. Summary. Overview of Spyware. Who Is Spying?

Spyware. Summary. Overview of Spyware. Who Is Spying? Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it

More information

10 Things Every Web Application Firewall Should Provide Share this ebook

10 Things Every Web Application Firewall Should Provide Share this ebook The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security

More information

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today

More information

Current Threat Scenario and Recent Attack Trends

Current Threat Scenario and Recent Attack Trends Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

A TASTE OF HTTP BOTNETS

A TASTE OF HTTP BOTNETS Botnets come in many flavors. As one might expect, these flavors all taste different. A lot of Internet users have had their taste of IRC, P2P and HTTP based botnets as their computers were infected with

More information

How To Protect Your Online Banking From Fraud

How To Protect Your Online Banking From Fraud DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

2012 NORTON CYBERCRIME REPORT

2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,

More information

Fraud and Abuse Policy

Fraud and Abuse Policy Fraud and Abuse Policy 2015 FRAUD AND ABUSE POLICY 2015 1 Contents 4. Introduction 6. Policy Goal 7. Combatting Customer Fraud and Abuse 8. Reporting Breaches 9. How Alleged Breaches Will Be Investigated

More information

CSC474: Network Security

CSC474: Network Security CSC474: Network Security Lecture 20 Prof. William Enck Fall 2015 (Derived from slides by Micah Sherr and Adam Aviv) Spam: Unsolicited Email The enemy: Spiced Ham 2004 study: 40% of email traffic costs

More information

Information Security Threat Trends

Information Security Threat Trends Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: scleung@hkcert.org 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing

More information

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information

More information

Using big data analytics to identify malicious content: a case study on spam emails

Using big data analytics to identify malicious content: a case study on spam emails Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime

More information

Botnet Detection by Abnormal IRC Traffic Analysis

Botnet Detection by Abnormal IRC Traffic Analysis Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National

More information

Protecting DNS Query Communication against DDoS Attacks

Protecting DNS Query Communication against DDoS Attacks Protecting DNS Query Communication against DDoS Attacks Ms. R. Madhuranthaki 1, Ms. S. Umarani, M.E., (Ph.D) 2 II M.Tech (IT), IT Department, Maharaja Engineering College, Avinashi, India 1 HOD, IT Department,

More information

Before the DEPARTMENT OF COMMERCE Internet Policy Task Force

Before the DEPARTMENT OF COMMERCE Internet Policy Task Force Before the DEPARTMENT OF COMMERCE Internet Policy Task Force In the Matter of Cybersecurity, Innovation Docket No. 100721305-0305-01 and the Internet Economy COMMENTS OF VeriSign, Inc Joe Waldron Director,

More information

Introduction: 1. Daily 360 Website Scanning for Malware

Introduction: 1. Daily 360 Website Scanning for Malware Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover

More information

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics. Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based

More information

Cybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical

Cybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical Crime and Cybercrime An act committed or omitted in violation of a law forbidding or commanding it and for which punishment is imposed upon conviction http://www.thefreedictionary.com/crime Deviant behavior

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

The anatomy of an online banking fraud

The anatomy of an online banking fraud The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to valentin@xenuser.org (March2010) I. What this document is about II. Introduction III. The anatomy of an

More information

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,

More information

Email David-Kovarik@northwestern.edu Phone 847-467-5930 Fax 847-467-6000

Email David-Kovarik@northwestern.edu Phone 847-467-5930 Fax 847-467-6000 Information Technology Information and Systems Security/Compliance Northwestern University 1800 Sherman Av Suite 209 Evanston, IL 60201 Email David-Kovarik@northwestern.edu Phone 847-467-5930 Fax 847-467-6000

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

CS 6262 - Network Security: Botnets

CS 6262 - Network Security: Botnets CS 6262 - Network Security: Botnets Professor Patrick Traynor Fall 2011 Story 2 Botnets A botnet is a network of software robots (bots) run on zombie machines which run are controlled by command and control

More information

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains

More information

Big Data and Cyber Security A bibliometric study Jacky Akoka, Isabelle Comyn-Wattiau, Nabil Laoufi Workshop SCBC - 2015 (ER 2015) 1 Big Data a new generation of technologies and architectures, designed

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Protecting the Infrastructure: Symantec Web Gateway

Protecting the Infrastructure: Symantec Web Gateway Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options

More information

Cloud Security VS Cybercrime Economy: The Kaspersky Vision. Eugene Kaspersky Co-founder & CEO, Kaspersky Lab

Cloud Security VS Cybercrime Economy: The Kaspersky Vision. Eugene Kaspersky Co-founder & CEO, Kaspersky Lab Cloud Security VS Cybercrime Economy: The Kaspersky Vision Eugene Kaspersky Co-founder & CEO, Kaspersky Lab The Digital World is Under Attack 20 000 000 The last five years have become the 18 000 000 Golden

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

A Review on IRC Botnet Detection and Defence

A Review on IRC Botnet Detection and Defence A Review on IRC Botnet Detection and Defence Bernhard Waldecker St. Poelten University of Applied Sciences, Austria Bachelor programme: IT-Security 1 Introduction Nowadays botnets pose an enormous security

More information

Cyber Security and Critical Information Infrastructure

Cyber Security and Critical Information Infrastructure Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes

More information

Protect Your Business and Customers from Online Fraud

Protect Your Business and Customers from Online Fraud DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently

More information

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd michaels@radware.com Riga. Baltic IT&T. 21.04.

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd michaels@radware.com Riga. Baltic IT&T. 21.04. Data Centers Protection from DoS attacks. Trends and solutions Michael Soukonnik, Radware Ltd michaels@radware.com Riga. Baltic IT&T. 21.04.2010 Cybercrime Trends Page 2 Types of DoS attacks and classical

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security. Applying the 80/20 approach for Operational Excellence How to combat new age threats, optimize investments and increase security Vinod Vasudevan Agenda Current Threat Landscape The 80/20 Approach Achieving

More information

SAC 025 SSAC Advisory on Fast Flux Hosting and DNS

SAC 025 SSAC Advisory on Fast Flux Hosting and DNS Fast and Double Flux Attacks 1 SAC 025 SSAC Advisory on Fast Flux Hosting and DNS An Advisory from the ICANN Security and Stability Advisory Committee (SSAC) January 2008 Fast and Double Flux Attacks 2

More information

Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy

Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy Cormac Herley and Dinei Florêncio Microsoft Research One Microsoft Way Redmond, WA, USA c.herley@ieee.org,

More information

BotNets- Cyber Torrirism

BotNets- Cyber Torrirism BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation

More information

Information Security. Be Aware, Secure, and Vigilant. https://www.gosafeonline.sg/ Be vigilant about information security and enjoy using the internet

Information Security. Be Aware, Secure, and Vigilant. https://www.gosafeonline.sg/ Be vigilant about information security and enjoy using the internet Be Aware, Secure, and Vigilant Information Security Use the Internet with Confidence Be vigilant about information security and enjoy using the internet https://www.gosafeonline.sg/ The Smartphone Security

More information

Innovations in Network Security

Innovations in Network Security Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

Security Intelligence Services. Cybersecurity training. www.kaspersky.com

Security Intelligence Services. Cybersecurity training. www.kaspersky.com Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Collateral Effects of Cyberwar

Collateral Effects of Cyberwar Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Detecting Spamming Activities by Network Monitoring with Bloom Filters

Detecting Spamming Activities by Network Monitoring with Bloom Filters Detecting Spamming Activities by Network Monitoring with Bloom Filters Ping-Hai Lin, Po-Ching Lin, Pin-Ren Chiou, Chien-Tsung Liu Department of Computer Science and Information Engineering National Chung

More information

CYBERCRIME AND THE HEALTHCARE INDUSTRY

CYBERCRIME AND THE HEALTHCARE INDUSTRY CYBERCRIME AND THE HEALTHCARE INDUSTRY Access to data and information is fast becoming a target of scrutiny and risk. Healthcare professionals are in a tight spot. As administrative technologies like electronic

More information

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing THE BEST WAY TO CATCH A THIEF Patrick Bedwell, Vice President, Product Marketing AlienVault Vision Accelerating and simplifying threat detection and incident response for IT teams with limited resources,

More information

MALWARE TOOLS FOR SALE ON THE OPEN WEB

MALWARE TOOLS FOR SALE ON THE OPEN WEB MALWARE TOOLS FOR SALE ON THE OPEN WEB May 2014 RSA Research, while investigating a Zeus Trojan sample, discovered an additional drop server used by a fraudster who is offering a set of spyware tools for

More information

Protection for Mac and Linux computers: genuine need or nice to have?

Protection for Mac and Linux computers: genuine need or nice to have? Protection for Mac and Linux computers: genuine need or nice to have? The current risk to computers running non-windows platforms is small but growing. As Mac and Linux computers become more prevalent

More information

ACCEPTABLE USE AND TAKEDOWN POLICY

ACCEPTABLE USE AND TAKEDOWN POLICY ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words

More information

Temporal Correlations between Spam and Phishing Websites

Temporal Correlations between Spam and Phishing Websites Temporal Correlations between Spam and Phishing Websites Tyler Moore Center for Research on Computation and Society, Harvard University tmoore@seas.harvard.edu Richard Clayton Computer Laboratory, University

More information

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure! INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!

More information

RESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market

RESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market RESEARCHBRIEF Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market Lion Gu After taking a grand tour of the Chinese underground market last year, let s revisit it and see what has

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques

More information

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V Subject Name: Cyber Security and Forensics (CSF) (Elective-II) Subject Code: 2650008 1. Learning Objectives: To understand

More information

The Evolution of Computer Security Attacks and Defenses. Angelos D. Keromytis Columbia University angelos@cs.columbia.edu

The Evolution of Computer Security Attacks and Defenses. Angelos D. Keromytis Columbia University angelos@cs.columbia.edu The Evolution of Computer Security Attacks and Defenses Angelos D. Keromytis Columbia University angelos@cs.columbia.edu This talk A look at the evolution of: nature of attackers and their goals cyber

More information