Working Group 5: Remediation of Server-Based DDoS Attacks. Status Update. March 20, 2014
|
|
|
- Nickolas McDaniel
- 10 years ago
- Views:
Transcription
1 Working Group 5: Remediation of Server-Based DDoS Attacks Status Update March 20, 2014 Peter Fonash (DHS), Co-Chair Michael Glenn (CenturyLink), Co-Chair
2 WG5 Objectives Description: Critical infrastructure sectors, including the financial sector, have been under assault from a barrage of DDoS attacks emanating from data centers and hosting providers. This Working Group will examine and make recommendations to the Council regarding network level best practices and other measures to mitigate the effects of DDoS attacks from large data centers and hosting sites. These recommendations should include technical and operational methods and procedures to facilitate stakeholder implementation of the recommended solution(s). Deliverable: Recommended measures communications providers can take to mitigate the incidence and impact of DDoS attacks from data centers and hosting providers, particularly those targeting the information systems of critical sectors. 2
3 WG5 Members WG5 has assembled a team of 48 members, including representatives from ISPs, banks, hosting providers, non-profits, associations, academia, federal and state governments, and security experts to accomplish the CSRIC IV charge Name Organization Name Organization Name Organization Peter Fonash (Co-Chair) DHS Dale Drew Level 3 Eric Osterweil VeriSign, Inc. Mike Glenn (Co-Chair) CenturyLink David Fernandez Prolexic Technologies Wayne Pacine Fed Reserve Board of Governors Paul Diamond (Co-Editor) CenturyLink Michael Geller ATIS Glen Pirrotta Comcast Bob Thornberry (Co-Editor) Bell Labs, Alcatel-Lucent Mark Ghassemzadeh ACS R.H. Powell Akamai Vern Mosley (FCC Liaison) FCC Darren Grabowski NTT Nick Rascona Sprint Jared Allison Verizon Sam Grosby Wells Fargo Jim Reavis Cloud Security Alliance Don Blumenthal Public Interest Registry Rodney Joffe Neustar Chris Roosenraad Time Warner Cable Chris Boyer AT&T Dave LaBianca FS-ISAC Craig Spiezle Online Trust Alliance Matt Bretan Goldman Sachs John Levine CAUCE David Stoline Drupal Matt Carothers Cox Communications Greg Lucak Windstream Joe St Sauver Univ of Oregon/Internet2 Roy Cormier Nsight John Marinho CTIA Kevin Sullivan Microsoft Kyle Davis Department of Treasury Dan Massey IEEE Bernie Thomas CSG International Dave DeCoster Shadowserver Ron Mathis Intrado Matt Tooley NCTA John Denning Bank of America Bill McInnis Internet Identity Jason Trizna Amazon Web Services Roland Dobbins Arbor Networks Chris Morrow Google Errol Weiss FSSCC Martin Dolly ATIS Mike O'Reirdan MAAWG Pam Witmer PA PUC 3
4 WG5 Approach Identify WG5 subgroups: ISPs, Financial Community, Internet Security Experts, and Best Practices Review Best Practices Review subgroup identifies applicable BPs for DDoS server-based attacks The ISPs, Financial Community, and Internet Security Experts subgroups develop representative case studies for server-based DDoS attacks Whole WG5 then integrates subgroups work and documents or develops network level best practices and other measures to mitigate the effects of DDoS attacks from large data centers and hosting sites 4
5 WG5 Status WG5 has held biweekly conference calls with its working group members to accomplish the tasking Subgroups have held biweekly conference calls to solicit input and review their case study deliverables WG5 held a two-day face-to-face meeting in January to facilitate discussion among, and receive initial readouts, from the subgroups WG5 subgroups in final stages of preparing case study deliverables for review by all WG5 members 5
6 Best Practice Review Subgroup Reviewed approximately 600 cybersecurity BPs to determine whether or not they were within scope of WG5 tasking (i.e., BPs to mitigate server-based DDoS attacks) Initial review suggests approximately 10% - 15% of BPs reviewed are within scope of WG5 tasking Subset of BPs determined to be within scope provided to other subgroups for their use in analysis of case studies 6
7 ISP, Financial, and Internet Security Experts Subgroup Status Actions underway to: Confirm the In-Scope/Out-of-Scope determination made by the Best Practices subgroup Determine which Best Practices apply to their case studies Identify gaps Propose new Best Practices to address gaps 7
8 WG5 Wiki In order to facilitate information sharing amongst WG5 members, WG5 maintains a wiki 8
9 WG5 Schedule Bi-weekly conference calls with all WG5 members Quarterly face-to-face meetings (with phone-in option for those unable to travel) January 8 th & 9 th April 9 th & 10 th scheduled August - tentative June 18, 2014 Draft Interim WG5 Report Detailed plan developed seen as an aggressive schedule September 30, 2014 Final WG5 Report 9
10 Next Steps Finalize review of initial subset of Best Practices for applicability to server-based DDoS attacks Subgroups finalize case studies Integrate subgroups work into recommended Best Practices Begin preparation of draft interim report Continue bi-weekly conference calls Hold second face-to-face meeting in preparation for draft interim report Provide periodic status updates to Steering Committee and Council 10
Working Group 5: Remediation of Server-Based DDoS Attacks. Status Update
Working Group 5: Remediation of Server-Based DDoS Attacks Status Update June 18, 2014 Peter Fonash (DHS), Co-Chair Michael Glenn (CenturyLink), Co-Chair WG5 Objectives Description: Critical infrastructure
Working Group 5: Remediation of Server Based DDoS Attacks. Status Update
Working Group 5: Remediation of Server Based DDoS Attacks Status Update September 12, 2013 Peter Fonash (DHS), Co Chair Michael Glenn (CenturyLink), Co Chair WG5 Objectives Description: Critical infrastructure
September, 2014. WORKING GROUP 5 Remediation of Server-Based DDoS Attacks Final Report
September, 2014 WORKING GROUP 5 Remediation of Server-Based DDoS Attacks Final Report Table of Contents 1 Results in Brief... 3 1.1 Executive Summary... 3 2 Introduction... 3 2.1 CSRIC IV Structure...
CSRIC IV - Working Group 4: Cybersecurity Best Practices Status Update
CSRIC IV - Working Group 4: Cybersecurity Best Practices Status Update March 20, 2014 Co-Chair: Robert Mayer, US Telecom Co-Chair: TBD Agenda Background and Perspectives Objectives Planned Approach Working
CYBERSECURITY RISK MANAGEMENT AND BEST PRACTICES WORKING GROUP 4: Final Report March 2015
CYBERSECURITY RISK MANAGEMENT AND BEST PRACTICES WORKING GROUP 4: Final Report March 2015 1 TABLE of CONTENTS I. EXECUTIVE SUMMARY... 4 A. Voluntary Mechanisms... 6 B. Guidance to Individual Companies
CYBERSECURITY RISK MANAGEMENT AND BEST PRACTICES WORKING GROUP 4: Final Report March 2015
CYBERSECURITY RISK MANAGEMENT AND BEST PRACTICES WORKING GROUP 4: Final Report March 2015 1 TABLE of CONTENTS I. EXECUTIVE SUMMARY... 4 A. Voluntary Mechanisms... 6 B. Guidance to Individual Companies
Working Group 6: Best Practice Implementation
Working Group 6: Best Practice Implementation Final Report March 14, 2011 Stacy Hartman Steve Malphrus Co-Chairs Scott Tollefsen Co-Presenter Overview of the U.S. Financial System U.S. Financial System:
CSRIC V Working Group Descriptions and Leadership
CSRIC V Working Group Descriptions and Leadership CSRIC Chair John Schanz, Comcast Cable Steering Committee Chair Theresa Hennesy, Comcast Cable Working Group 1 Evolving 911 Services Co-Chair: Susan Sherwood,
IT LEADERSHIP COUNCIL STRATEGIC PLAN. 2012 State of Idaho
IT LEADERSHIP COUNCIL STRATEGIC PLAN 2012 State of Idaho CONTENTS IT LEADERSHIP COUNCIL MISSION 3 MEMBERSHIP 3 BACKGROUND 4 STRATEGIC GOALS AND ALIGNMENT OF ACTIONS 9 2 P a g e IT LEADERSHIP COUNCIL MISSION
THE INDUSTRY How have technological changes affected the telecommunications industry, including entities that want to make automated calls?
THE INDUSTRY How have technological changes affected the telecommunications industry, including entities that want to make automated calls? MODERATOR: Roberto Anguizola, FTC PANELISTS: Kevin Rupy, US Telecom
Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder
Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder Friday, October 25, 2013 The Suburban Collection Showplace - Novi, Michigan Tentative Agenda as of October 4, 2013 Friday, October 25,
ISA99 Working Group 5 ISA99 Working Group 5
Date: May 14, 2015 Time: 11:00 ET US Lead: E. Cosman Notes: E. Cosman Distribution: ISA99 committee and stakeholders ISA99 Working Group 5 ISA99 Working Group 5 ISA 67 Alexander Drive PO Box 12277 Research
Lab Researching Broadband Internet Access Technologies (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Investigate Broadband Distribution Part 2: Research Broadband
Virtual Node Integrated Project Team (IPT) Charter
Virtual Node Integrated Project Team (IPT) Charter This Charter defines the objectives, leadership, and membership of an Integrated Project Team (IPT) that will guide the requirements definition for a
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:
Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony
National Communications System. December 6, 2007
1 National Communications System December 6, 2007 2 National Communications System (NCS) Established in 1963 in response to communications failures associated with the Cuban Missile Crisis The mandate
DDoS Open Threat Signaling (DOTS) Working Group. Operational Requirements. Chris Morrow <morrowc@ops- netman.net> Network Security Engineer, Google
DDoS Open Threat Signaling (DOTS) Working Group Operational Requirements Chris Morrow Network Security Engineer, Google Roland Dobbins Principal Engineer,
Toward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
Clinical Research Improvement in Systems and Processes Kickoff, January 15, 2015
Clinical Research Improvement in Systems and Processes Kickoff, January 15, 2015 Improve the clinical research process, enhancing value to our research faculty, staff, patients, the Charlottesville community
ServiceNow Phase I: Service Desk Consolidation Project Charter
Prepared By: Jodi Muller and Rebecca Nguyen Date of Publication: 06/6/2011 Version 1.6 Table of Contents PROJECT OVERVIEW... 3 PROJECT SCOPE... 3 OUT OF SCOPE... 3 PROJECT APPROACH... 4 ESTIMATED COST...
8x8, Inc. (Nasdaq: EGHT) Corporate Overview
8x8, Inc. (Nasdaq: EGHT) Corporate Overview Jefferies 2013 Global Technology, Media and Telecom Conference May 7, 2013 2013 NASDAQ-LISTED: EGHT Safe Harbor Statement During the course of this meeting,
Homeland Security Grant Program Senior Advisory Committee Charter
Homeland Security Grant Program Senior Advisory Committee Charter Overall Roles and Responsibilities The Senior Advisory Committee exists to build and implement homeland security initiatives that leverage
Above My Pay Grade: Incident Response at the National Level
Above My Pay Grade: Incident Response at the National Level Jason Healey Atlantic Council Traditional Incident Response But at the national level, incident response is a different game Implications for
(IEEE Standards Coordinating Committee on Transportation)
IEEE SCC42 (IEEE Standards Coordinating Committee on Transportation) Overview 5 October 2015 Dr. Yu Yuan Chair, IEEE SCC42 (IEEE Standards Coordinating Committee on Transportation) Email: [email protected]
CPE Powering Best Practices. Final Report CPE Powering
September, 2014 WORKING GROUP 10B CPE Powering Best Practices Final Report CPE Powering Table of Contents 1 Results in Brief... 3 1.1 Executive Summary... 3 2 Introduction... 3 2.1 CSRIC Structure... 4
How the Netflix ISP Speed Index Documents Netflix Congestion Problems
How the Netflix ISP Speed Index Documents Netflix Congestion Problems By Peter Sevcik June 2014 NetForecast Report NFR5117 2014 NetForecast, Inc. As of this writing, a comedic YouTube video featuring Netflix
Solar America Board for Codes and Standards (Solar ABCs) Solar ABCs
Solar America Board for Codes and Standards (Solar ABCs) Andrew Rosenthal Southwest Technology Development Institute New Mexico State University Solar ABCs Solar ABCs is a collaborative effort among experts
Administrative Services
Gary L. Pratt Vice President for Information Technology and Chief Information Officer Greg Crary Chief Technology/ Security Officer Dave Dean Director ITDDDSS Denise Campitelli Executive Associate to the
LIFE INSURANCE NEEDS Mark Sasko
LIFE INSURANCE NEEDS Do your clients have sufficient life insurance? Are both the Client and Spouse insured? Life Insurance coverage can be calculated in many ways. Below is a quick Multiple of Earnings
Delving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Delving Into FCC's 'Damn Important' Cybersecurity
CABLE COMPANIES. Armstrong Utilities Tad Sedwick 100 East 2 nd Street Ashland, Ohio 44805 419-289-0161 x. 224 Ashland County, Lorain tsedwick@agoc.
CABLE COMPANIES Tad Sedwick 100 East 2 nd Street Ashland, Ohio 44805 419-289-0161 x. 224 Ashland County, Lorain [email protected] Mike Sammon 1141 Lafayette Road Medina, Ohio 44256 330-722-3141, ext. 224
Landlord Contact Information
Landlord Contact Information Last Name First Name Leasing Company Phone # Cell Phone E-mail Website 2M Properties John Macdonald 2M Properties 610-823-8852 [email protected] 2m-properties.com
Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance
Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing?
August DoD Agile Meeting Integrated Program Management Division Agile EV Working Group Update 9/22/15
August DoD Agile Meeting Integrated Program Management Division Agile EV Working Group Update 9/22/15 1 Background There are differences in managerial approach and lifecycle development in the application
NIST Cloud Computing Forensic Science Working Group
NIST Cloud Computing Forensic Science Working Group Dr. Martin Herman Information Technology Laboratory (ITL) National Institute of Standards and Technology [email protected] NIST Cloud Computing
Project Management for Telecommunications Projects - Ensuring Success
Project Management for Telecommunications Projects - Ensuring Success Celia Desmond President World Class Telecommunications 2006 IEEE Vice President Technical Activities 2002-2003 President IEEE Communications
10:00 10:30. Kevin Lyday, CISSP, PMP, CIPP/G Associate Director, Information Resources Office of Public Health Preparedness and Response
Role of IR Governance in Stage Gate Reviews Enterprise & Local Governance 10:00 10:30 Kevin Lyday, CISSP, PMP, CIPP/G Associate Director, Information Resources Office of Public Health Preparedness and
How To Protect The Internet From Natural Disasters
Network Security Policy: The U.S. Experience Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security: The U.S. Experience Network Security: How we define it U.S. Approach:
STATEMENT OF CRAIG LABOVITZ, PHD Co-Founder and CEO of DeepField Before the House Judiciary Committee Subcommittee on Regulatory Reform, Commercial
STATEMENT OF CRAIG LABOVITZ, PHD Co-Founder and CEO of DeepField Before the House Judiciary Committee Subcommittee on Regulatory Reform, Commercial and Antitrust Law Hearing on Competition in the Video
P4P: ISPs and P2P. Laird Popkin, Pando Networks Doug Pasko, Verizon Communications
P4P: ISPs and P2P Laird Popkin, Pando Networks Doug Pasko, Verizon Communications Overview P2P and ISPs P2P market is maturing What are ISPs telling us? How can P2P firms work with ISPs? P4P What is in
Cyber Security Best Practices. Final Report. Page 1 of 24
March 2011 Working Group 2A Cyber Security Best Practices Final Report Page 1 of 24 The Communications Security, Reliability and Interoperability Council Working Group 2A Final Report March 2011 Table
How Convergence of IT, Telecom and. the M&A Market
Consolidation Continues: How Convergence of IT, Telecom and Managed Services Will Impact the M&A Market Monday, October 3, 2011 2:30-3:15 p.m. M&A COMPTEL PLUS 2011 Orlando PLEASE SILENCE YOUR CELL PHONES
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Board of Directors. Lewis Bear *** The Lewis Bear Co. Gulf Breeze. Alan Becker * Becker & Poliakoff, P.A. Ft. Lauderdale
Jason Altmire * Florida Blue Jacksonville Jeff Atwater *** Florida Department of Financial Services Lewis Bear *** The Lewis Bear Co. Gulf Breeze Alan Becker * Becker & Poliakoff, P.A. Ft. Lauderdale Jay
Case 1:09-cv-00300-JB -KBM Document 138 Filed 03/22/11 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF NEW MEXICO
Case 1:09-cv-00300-JB -KBM Document 138 Filed 03/22/11 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF NEW MEXICO GENESEE COUNTY EMPLOYEES ) No. 1:09-cv-00300-JB-KBM RETIREMENT SYSTEM, et al., On
Research Notes. Leichtman Research Group, Inc. Life Cycle Differences. 2Q 2014 Actionable Research on the Broadband, Media & Entertainment Industries
Leichtman Research Group, Inc. Research Notes 2Q 2014 Actionable Research on the Broadband, Media & Entertainment Industries In this issue: Life Cycle Differences Life Cycle Differences A 49% of U.S. Households
National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey
PRESS RELEASE Oct. 1, 2012, 9:00 a.m. EDT National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey WASHINGTON, Oct. 1, 2012
PREX15 - Agenda Conference on Preservation Excellence
PREX15 - Agenda Conference on Preservation Excellence Wednesday, September 16, 2015 6:00-8:00pm Conference Welcome Reception Thursday, September 17, 2015 7:30am 8:30am Breakfast Welcome to PREX 2015 Conference
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
Information Technology Services ServiceNow: Change Management Phase I Project Charter
ServiceNow: Change Management Phase I Project Charter VERSION: 1.3 REVISION DATE: 9/28/2011 Approval of the Project Charter indicates an understanding of the purpose and content described in this deliverable.
the next generation & state commitment
Conference of State Bank Supervisors Examination Tools: the next generation & state commitment Vaughn Noring: Chair, SSPC Bank Bureau Chief Iowa Division of Banking Jim Cooper: ETS Executive Steering Committee
Midwest Coin Concepts 224 33rd Ave S Waite Park, MN 56387 (320) 258-5958. Location Stats Report for 908 - Opole Rice Royalton Area
http://www.leagueleader.net/index.php?actions=home,generatereport:911;23 Page 1 of 4 Midwest Coin Concepts 224 33rd Ave S Waite Park, MN 56387 (320) 258-5958 Location Stats Report for 908 - Opole Rice
Office of Information Technology Executive Reports
Office of Information Technology Executive Reports Rodolfo Arevalo President Gary L. Pratt Chief Information Officer Greg Crary Director Customer Support Systems Erick Keating Director Information Systems
Enterprise Infrastructure and Technology Services
Enterprise Infrastructure and Technology Kameron Kelly Student Employee Greg Crary CTSO Mike Owens Associate CTO Enterprise Application Support John Kissack Project Management Data Center Matt Brown Security
IT Governance Committee Charter
IT Governance Committee Charter 1 Purpose IT Governance Committee IT Governance Committee purpose is to: Understand IT as a business(projects, Costs, Investments, Resource Management) Make recommendations
