SPAMTRACER TRACKING FLY- BY SPAMMERS
|
|
|
- Martina Curtis
- 10 years ago
- Views:
Transcription
1 SPAMTRACER TRACKING FLY- BY SPAMMERS RIPE 67 PIERRE- ANTOINE VERVIER SYMANTEC RESEARCH LABS Pierre- RIPE 67 - Athens - Oct. 14 th - 18 th,
2 2 Where It All Begins CONJECTURE Spammers would use BGP hijacking to send spam from the stolen IP space and remain untraceable Short- lived (< 1 day) routes to unused IP space + spam [Ramachandran2006, Hu2007] Anecdotal reports on mailing lists POTENTIAL EFFECTS Misa]ribute a]acks launched from hijacked networks due to hijackers stealing IP idenfty Spam filters heavily rely on IP reputaaon as a first layer of defense 2
3 Fly- By Spammers :: Myth or Reality? 3 3
4 4 BGP Hijacking CAUSE The injecaon of erroneous rouang informaaon into BGP No widely deployed security mechanism yet E.g., ROA, BGPsec EFFECTS Blackhole or MITM [Pilosof 2008] of the vicam network EXPLANATIONS Router misconfiguraaon, operaaonal fault E.g., Hijack of part of Youtube network by Pakistan Telecom Malicious intent? 4
5 Your Mission, Should You Accept It 5 Validate or invalidate on a large scale the conjecture about fly- by spammers Assess the prevalence of this phenomenon SPAMTRACER collect roufng informaaon about spam networks extract abnormal rouang behaviors to detect possible BGP hijacks 5
6 6 SPAMTRACER :: PresentaFon ASSUMPTION When an IP address block is hijacked for stealthy spamming, a roufng change will be observed when the block is released by the spammer to remain stealthy METHOD Collect BGP routes and IP/AS traceroutes to spamming networks just aier spam is received and during several days Look for a rouang change from the hijacked state to the normal state of the network 6
7 SPAMTRACER :: System Architecture 7 Symantec.cloud Live spam feed Data collection Select Spams IP Monitored IP's IP i Team Cymru Bogon IP prefixes Data analysis IP/AS traceroute BGP routes IP/AS & BGP routes to IP i BGP & Traceroute Anomaly Detection Identification of Hijackings Possible Hijack/ Suspicious Benign 7
8 29 hijacked prefixes from Jan. to Jul
9 Hijack durafon between 1 and 20 days 9 9
10 Fly- By Spammers :: Hijack Signature 10 Hijacked networks were dormant address blocks, i.e., by the ame the networks were hijacked they had been lei idle by their owner adverased for a short period of ame adverased from an apparently legifmate origin AS but via a rogue upstream AS see [Huston2005] In pracace, we observed idle intervals between 3 months and 7 years hijack durafons between 1 day and 20 days, mostly < 5 days rogue upstream ASes were hijacked too 10
11 Case Studies :: 11 Suspicious BGP Routes & Spam Suspicious BGP announcements 11
12 Case Studies :: 12 Suspicious BGP Routes & Spam Strong temporal correlaaon between suspicious BGP announcements and spam BGP announcements are quite short- lived! No idenafied spam bot! A lot of scam web sites adverased in spam mails were hosted in the hijacked networks 12
13 Case Studies :: 13 Suspicious BGP Routes & DNSBLs Only 2 address blocks appeared in the Uceprotect* blacklist at the ame of the suspicious BGP announcements Suspicious BGP announcements Noace: blacklist entries automaacally expire aier 7 days *h]p:// 13
14 How Stealthy Were Spammers? 14 Out of 29 hijacked address blocks 6 (21%) were listed in Uceprotect 13 (45%) were listed in Spamhaus DROP (Don t Route Or Peer) DROP is supposed to list hijacked address blocks but li]le is known about their lisang policy 29 (100%) were observed only once during the ame period of the experiment Fly- by spammers seem to manage to remain under the radar! 14
15 Which Networks Were Targeted? All hijacked address blocks were assigned to a different organizaaon (i.e., a different owner) Out of 29 organizaaons 12 (41%) were found to be dissolved or very likely out of business 17 (59%) were found to be sfll in business or no conclusive evidence of them being out of business could be found Fly- by spammers seem to simply target dormant address blocks regardless of their owner sall being business or not 15 15
16 What About Long- Lived Hijacks? 16 We looked specifically for short- lived hijacks each spam network was monitored for 1 week aier spam was received But what about long- lived ones it happens also, e.g., LinkTelecom hijack [Nanog2011, ISTR2012, Vervier2013, Schlamp2013] lasted 5 months but they are less straightorward to detect and it seems to defeat the assumed purpose of evading blacklisang We are working on updaang our framework to detect these cases 16
17 How To Prevent Fly- By Spammers? 17 In the observed hijack cases, spammers did not tamper with the origin of the address blocks but adverased the address blocks via rogue upstream ASes BGPsec is currently the most promising architecture for securing BGP both Route OriginaFon and Route PropagaFon must be secured to prevent fly- by spammers secured Route Originaaon via ROAs is being more and more deployed but secured Route Propagaaon is sall at a too early stage The soluaon for now is thus to encourage the following of rouang best pracfces and use detecfon systems to miagate the effect of these a]acks, e.g., by feeding IP- based reputaaon systems with hijacked address blocks 17
18 18 Conclusion The observed fly- by spammer cases show that this phenomenon is happening though it does not currently seem to be a very prevalent technique to send spam, e.g., compared to botnets However, it is important to detect those a]acks because hijacking address blocks hinder traceability of a]ackers and can lead to misacribufng a]acks when responding with possibly legal acaons! 18
19 19 PerspecFves Provide an interface for network operators to query idenafied hijacks Ongoing collaborafon with Insatut Eurécom (FRA) and TU München (GER) to build a comprehensive system for the detecaon and invesagaaon of malicious BGP hijacks 19
20 20 Thank you! Time for Q&A! 20
21 21 Some references [Ramachandran 2006] A. Ramachandran and N. Feamster. Understanding the network- level behavior of spammers. In SIGCOMM 06: Proceedings of the 2006 conference on Applicaaons, technologies, architectures, and protocols for computer communicaaons, pages , [Hu 2007] X. Hu and Z. M. Mao. Accurate Real- Time Idenaficaaon of IP Prefix Hijacking. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P), pages 3-17, [Pilosov 2008] A. Pilosov and T. Kapela. Stealing the Internet: An Internet- Scale Man In The Middle A]ack. Defcon 16, Las Vegas, NV, August [Huston 2005] G. Huston. Auto- Detecang Hijacked Prefixes? RIPE 50, May [Nanog 2011] Prefix hijacking by Michael Lindsay via Internap, h]p://mailman.nanog.org/pipermail/ nanog/2011- August/ html, August [ISTR 2012] Symantec Internet Security Threat Report: Future Spam Trends: BGP Hijacking. Case Study - Beware of "Fly- by Spammers". h]p:// April [Vervier 2013] P.- A. Vervier and O. Thonnard. Spamtracer: How Stealthy Are Spammers? In the 5 th IEEE Internaaonal Traffic Monitoring and Analysis Workshop (TMA), pages , [Schlamp 2013] J. Schlamp, G. Carle, and E. W. Biersack. A Forensic Case Study on AS Hijacking: The A]acker's Perspecave. ACM Computer Communica0on Review (CCR), pages 5-12,
THE Internet is partitioned into tens of thousands
IEEE NETWORK MAGAZINE - SPECIAL ISSUE ON COMPUTER NETWORK VISUALIZATION, NOV./DEC. 2012 ISSUE 1 Visual Analytics for BGP Monitoring and Prefix Hijacking Identification Ernst Biersack 1, Quentin Jacquemart
arxiv:1412.5052v2 [cs.ni] 20 Apr 2015
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire arxiv:1412.5052v2 [cs.ni] 20 Apr 2015 Johann Schlamp 1, Josef Gustafsson 1, Matthias Wählisch 2, Thomas C. Schmidt
SysSec 7 Network Security. Aurélien Francillon
SysSec 7 Network Security Aurélien Francillon News of the week 2 Overview Reconnaissance: discovering topology and servers Using network tools Fingerprinting Offensive Man In The Middle attacks, Bugs,
BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <[email protected]>, <[email protected]>
BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)
BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE
Are BGP Routers Open To Attack? An Experiment
Are BGP Routers Open To Attack? An Experiment Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna University of California, Santa Barbara {cavedon,chris,vigna}@cs.ucsb.edu Abstract. The BGP protocol
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna
DDOS Mi'ga'on in RedIRIS SIG- ISM. Vienna Index Evolu'on of DDOS a:acks in RedIRIS Mi'ga'on Tools Current DDOS strategy About RedIRIS Spanish Academic & research network. Universi'es, research centers,.
Understanding the Network-Level Behavior of Spammers
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran and Nick Feamster College of Computing, Georgia Tech {avr, feamster}@cc.gatech.edu ABSTRACT This paper studies the network-level
Detecting BGP hijacks in 2014
Detecting BGP hijacks in 2014 Guillaume Valadon & Nicolas Vivet Agence nationale de la sécurité des systèmes d information http://www.ssi.gouv.fr/en NSC - November 21th, 2014 ANSSI - Detecting BGP hijacks
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
A Strategy for Transitioning to BGP Security
NANOG 52 Denver, CO June 14, 2011 A Strategy for Transitioning to BGP Security Sharon Goldberg Boston University Phillipa Gill University of Toronto Michael Schapira Princeton University Princeton University
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
Policy-Based AS Path Verification with Enhanced Comparison Algorithm to Prevent 1-Hop AS Path Hijacking in Real Time
, pp.11-22 http://dx.doi.org/10.14257/ijmue.2016.11.1.02 Policy-Based AS Path Verification with Enhanced Comparison Algorithm to Prevent 1-Hop AS Path Hijacking in Real Time Je-Kuk Yun 1 and Jin-Hee Song
Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident
Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident Rahul Hiran 1, Niklas Carlsson 1, and Phillipa Gill 2 1 Linköping University, Sweden 2 Citizen Lab, Munk School
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Informa4on Security Management at Cer4ficate Authori4es
Informa4on Security Management at Cer4ficate Authori4es István Zsolt BERTA [email protected] Public Key Cryptographic Primi4ves 1 PKI lectures 1. Public key cryptography primiaves 2. CerAficates, CerAficate
Network Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
The RouteNormalizer and Network Routing Anomalification
A Firewall for Routers: Protecting Against Routing Misbehavior Ying Zhang Z. Morley Mao Jia Wang University of Michigan AT&T Labs Research Abstract In this work, we present the novel idea of route normalization
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone
3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement
BBM467 Data Intensive ApplicaAons
Hace7epe Üniversitesi Bilgisayar Mühendisliği Bölümü BBM467 Data Intensive ApplicaAons Dr. Fuat Akal [email protected] Overview What is Cloud CompuAng? VirtualizaAon Service Oriented CompuAng What is
Cisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Luciano Minuchin CIO Sebastian Motta CSO DIRECCIÓN NACIONAL DEL REGISTRO DE DOMINIOS DE INTERNET
Luciano Minuchin CIO Sebastian Motta CSO Security Infrastructure NIC.AR The security structure was increased by installing hardware in different physical layers. New security policies were defined and
Kaspersky DDoS Prevention
Kaspersky DDoS Prevention The rapid development of the online services industry and remote customer service systems forces entrepreneurs to consider how they can protect and ensure access to their resources.
Firewall Security. Presented by: Daminda Perera
Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING 20 APRIL 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to
Symantec Email Security.cloud - Skeptic Whitepaper
TECHNICAL BRIEF: SYMANTEC EMAIL SECURITY.CLOUD........................................ Symantec Email Security.cloud - Skeptic Whitepaper Who should read this paper This white paper outlines the technical
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
A very short history of networking
A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology
Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:
Practical BGP Security: Architecture, Techniques and Tools
renesys WHITE PAPER Practical BGP Security: Architecture, Techniques and Tools Laris Benkis A practical approach to identify weaknesses and highlight strategies for the detection of internetwork failures
Detecting spam machines, a Netflow-data based approach
Detecting spam machines, a Netflow-data based approach Gert Vliek February 24, 2009 Chair for Design and Analysis of Communication Systems (DACS) Faculty of Electrical Engineering, Mathematics and Computer
Tools and Techniques for the Analysis of Large Scale BGP Datasets. Manish Karir, Larry Blunk (Merit) Dion Blazakis, John Baras (UMd)
Tools and Techniques for the Analysis of Large Scale BGP Datasets Manish Karir, Larry Blunk (Merit) Dion Blazakis, John Baras (UMd) The Problem Large amounts of data are now, or soon will be available:
Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka
Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka Tim Evens ([email protected]) NANOG-65 Traditional Method: VTY (cli/netconf/xml) Data is polled instead of pushed (not real-time) Large queries
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Embedded BGP Routing Monitoring. Th. Lévy O. Marcé
Embedded BGP Routing Monitoring Th. Lévy O. Marcé Introduction & Motivations Off-line BGP routing monitoring initiatives (i.e based on router logs) already exist: Periodic report : The CIDR Report Objective
MITIGATING SPAM USING NETWORK-LEVEL FEATURES
MITIGATING SPAM USING NETWORK-LEVEL FEATURES A Thesis Presented to The Academic Faculty by Anirudh V. Ramachandran In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in Computer
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
DDoS attacks in CESNET2
DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities
The OpenDNS Global Network Delivers a Secure Connection Every Time. Everywhere.
The OpenDNS Global Network Delivers a Secure Connection Every Time. Everywhere. Network Performance Users devices create multiple simultaneous connections each time we exchange data with other Internet
The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet
The Coremelt Attack Ahren Studer and Adrian Perrig 1 We ve Come to Rely on the Internet Critical for businesses Up to date market information for trading Access to online stores One minute down time =
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior Danilo Michalczuk Taveira and Otto Carlos Muniz Bandeira Duarte UFRJ - PEE/COPPE/GTA - DEL/POLI P.O. Box 6854-2945-97, Rio de Janeiro, RJ,
RFC 4264 : BGP Wedgies ---- Bad Policy Interactions that Cannot be Debugged
RFC 464 : BGP Wedgies ---- Bad Policy Interactions that Cannot be Debugged Timothy G. Griffin Geoff Huston http://www.cl.cam.ac.uk/~tgg What is a BGP Wedgie? full wedgie ¾ wedgie BGP policies make sense
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Know Your Foe. Threat Infrastructure Analysis Pitfalls
Know Your Foe Threat Infrastructure Analysis Pitfalls Who Are We? Founders of PassiveTotal Analysts/researchers with 10+ years of collective experience Interested in Better UX/UI for security systems Improving/re-thinking
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected]
BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected] ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS
How To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip
Globally Distributed Content (Using BGP to Take Over the World) Horms (Simon Horman) [email protected] November 2001 http://supersparrow.org/ 1 Introduction Electronic content is becoming increasingly
No Cloud Allowed. Denying Service to DDOS Protection Services
No Cloud Allowed Denying Service to DDOS Protection Services Presented by: Allison Nixon [email protected] Pentesting, Incident Response PaulDotCom host Cloud Based DDOS Protection How it works
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
Intelligent Routing Platform White Paper
White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Evolving Threat Landscape
Evolving Threat Landscape Briefing Overview Changing Threat Landscape Profile of the Attack Bit9 Solution Architecture Demonstartion Questions Growing Risks of Advanced Threats APT is on the rise 71% increase
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Detecting Spam at the Network Level
Detecting Spam at the Network Level Anna Sperotto, Gert Vliek, Ramin Sadre, and Aiko Pras University of Twente Centre for Telematics and Information Technology Faculty of Electrical Engineering, Mathematics
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
Internet Routing Protocols Lecture 04 BGP Continued
Internet Routing Protocols Lecture 04 BGP Continued Advanced Systems Topics Lent Term, 008 Timothy G. Griffin Computer Lab Cambridge UK Two Types of BGP Sessions AS External Neighbor (EBGP) in a different
Inspecting DNS Flow Traffic for Purposes of Botnet Detection
Inspecting DNS Flow Traffic for Purposes of Botnet Detection Vojtěch Krmíček, GEANT3 JRA2 T4 Internal Deliverable 2011 Abstract The goal of this report is to examine DNS IP flow traffic and its relation
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
technical Operations Area IP Resource Management
IP Resource Management technical The IP Resource management is one of the critical areas of AfriNIC's activities. 27 has shown a great growth in its activity through new members and Resources Allocation/Assignment.
