Coordinating Attack Response at Internet Scale (CARIS)

Similar documents
RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance

Report on CAP Cybersecurity November 5, 2015

TRANSFORMING EXPECTATIONS FOR THREAT-INTELLIGENCE SHARING

Internet Security and Resiliency: A Collaborative Effort

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS

Internet-Draft Intended status: Informational Expires: April 20, 2016 October 18, 2015

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness

Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Cybersecurity and Incident Response Initiatives: Brazil and Americas

Securing Your Business with DNS Servers That Protect Themselves

Managed Incident Lightweight Exchange (MILE)

(BDT) BDT/POL/CYB/Circular

Cyber Security Information Exchange

ISO27032 Guidelines for Cyber Security

SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012

Workshop on Collaborative Security and Privacy Technologies

Modular Network Security. Tyler Carter, McAfee Network Security

RETHINK SECURITY FOR UNKNOWN ATTACKS

Palo Alto Networks. October 6

Using SIEM for Real- Time Threat Detection

Internet Structure and Organization

Security Practices for Online Collaboration and Social Media

How To Create Situational Awareness

Pravail 2.0 Technical Overview. Exclusive Networks

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Networking for Caribbean Development

Can We Become Resilient to Cyber Attacks?

The FBI and the Internet

Security Officer: An NREN Secondee Perspective

CERT-GOV-GE Activities & International Partnerships

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

FERPA: Data & Transport Security Best Practices

Securing Your Business with DNS Servers That Protect Themselves

Service Description DDoS Mitigation Service

All about Threat Central

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Cisco RSA Announcement Update

DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012

ITU Cybersecurity Work Programme to Assist Developing Countries

Threat Intelligence Buyer s Guide

How To Buy Nitro Security

Security, Privacy, and the Effects of Ubiquitous Encryption. Kathleen Moriarty Security Area Director (1 of 2) (Speaking for myself, not the IETF)

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

AbuseHUB: a national Abuse Report. Clearing House. Phons Bloemen. ISD Congress September 24,

Cisco Security Intelligence Operations

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

FS-ISAC CHARLES BRETZ

Threat-Centric Security for Service Providers

September 20, 2013 Senior IT Examiner Gene Lilienthal

The Hillstone and Trend Micro Joint Solution

Symantec DLP Overview. Jonathan Jesse ITS Partners

Arbor s Solution for ISP

US-CERT Overview & Cyber Threats

Modern Approach to Incident Response: Automated Response Architecture

Response to Questions CML Managed Information Security

Take the NetFlow Challenge!

Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director

Cisco Security Optimization Service

Marble & MobileIron Mobile App Risk Mitigation

Regional cyber security considerations for network operations. Eric Osterweil Principal Scientist, Verisign

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

The Mobile Problem. Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India

FBI CHALLENGES IN A CYBER-BASED WORLD

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC)

CYBER SECURITY INFORMATION SHARING & COLLABORATION

US-CERT Year in Review. United States Computer Emergency Readiness Team

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016

A Cyber Security Integrator s perspective and approach

Data Breach Response Planning: Laying the Right Foundation

5 CMDB GOOD PRACTICES

Next Generation IPS and Reputation Services

DNS Response Policy Zones Roadmap to Accellerate Adoption

DDoS attacks in CESNET2

Transcription:

Coordinating Attack Response at Internet Scale (CARIS) Overview and Summary Report July 2015 Kathleen Moriarty Security Area Director, IETF Kathleen.Moriarty.ietf@gmail.com

Agenda Coordinating Attack Response at Internet Scale (CARIS) Workshop Motivation Efficient and Effective Information Exchanges Outcomes Next Steps

CARIS Workshop Bring together diverse groups to better collaborate and scale attack response CSIRTs Operators Researchers Vendors Standards Researchers Library of response efforts and how to collaborate with each, Internet Society https://internetsociety2.wufoo.com/reports/carisworkshop-template-submissions/

Who is Sharing Data? What is Useful? Small & Medium Organizations Deploying security technologies with expectation of threat mitigation Data exchange & actions hidden Increasing Impact Potential! Large Organizations Deploying security technologies with expectation of threat mitigation Participating in multiple sharing groups Receiving multiple threat intelligence feeds Data exchange & actions: Hidden & Exposed Analysis Center Analysis for industry focused or other sharing groups National CSIRTs providing information to government, critical infrastructure, etc. Internet Service Providers performing analysis, eliminating/mitigating threats Problem specific analysis groups targeting focused threats (analysis & mitigation) Analysis & actions: Data exposed & use case/user group specific

Use Case Driven Adoption One Size Does Not Fit All Small & Medium Organizations Law Enforcement Large Organizations Proprietary OpenIOC VERIS CSV CIF IODEF/ RID STIX/TAXII Vendors Consortiums/ Alliances Operators ISACs Shared threat intelligence must be: Directed: Intelligence received must be relevant to the organization Actionable: Intelligence must identify an immediate and active security response that mitigates the risk Automated: Remediation based on intelligence must NOT impact the user experience

Potential Collaborations Regional & Sector Specific ISACS with Operational Communities Regional ISAC APWG Phishing ecrime Malware ACDC Botnets Members & Vendors Sector Specific ISAC Automated Control Deployment Brokered and Anonymized DNS & RIRs DNS, IP & ASN Internet with Reduced Threats Ubiquitous Control Deployment

CARIS Workshop Discussions Information Sharing groups Template submissions Describe your use case? Where they are focusing? How can others engage with them? Who participates? DDoS and Botnet Talk & Panel Scaling Responses to DDoS and Botnets Effectively and Safely Infrastructure: DNS & RIRs What part do they play in incident response Available resources Trust, Privacy & Data Markings Internet Architecture: How can we help?

Identified Next Steps Sampling of possible next steps, report may contain additional recommendations Education and outreach on Best Practices Simple measures like BCP 38 (ingress/egress filtering) are not widely deployed and could reduce problems Identify additional best practices and determine if updates are needed Assist RIRs with improved tools to better scale access to their public resources to assist operators and CSIRTs Protocol options to exchange formatted data Too many exist Not enough published information comparing options May require problem specific solutions, such as the exchange of telemetry data for DDoS in DOTS Protocol reviewers needed in SACM and MILE Interest expressed for future meetings, organized by neutral organization (ISOC, IAB, etc.)

Program Committee Members A BIG thank you to all the program committee members and sponsors! Program Committee: Matthew Ford, Internet Society, UK Ted Hardie, Google Joe Hildebrand, Cisco, USA Eliot Lear, Cisco, Switzerland Kathleen M. Moriarty, EMC Corporation, USA Andrew Sullivan, Dyn Brian Trammell, ETH Zurich, Switzerland Sponsors: Forum for Incident Response and Security Teams (FIRST) The Internet Society EMC Corporation

Thank you!