CyberSecurity Research in Crete



Similar documents
Εmerging Ways to Protect your Network

How To Monitor Network Traffic On A Network With A Network Monitor

LOBSTER: Large-Scale Monitoring of Broadband Internet Infrastructures An FP6 IST Research Infrastructures project

Emerging Risks in Network and Information Systems Security


Cyber Security: Beginners Guide to Firewalls

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Network Security and the Small Business

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Computer Security Maintenance Information and Self-Check Activities

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Common Cyber Threats. Common cyber threats include:

How Spyware and Anti-Spyware Work

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Don t Fall Victim to Cybercrime:

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

OPC & Security Agenda

Protecting your business from fraud

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Open an attachment and bring down your network?

OIG Fraud Alert Phishing

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Cyber Security Awareness

BE SAFE ONLINE: Lesson Plan

Current counter-measures and responses by CERTs

COSC 472 Network Security

Safety and security are simply good business.

Threat Events: Software Attacks (cont.)

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CYBERSPACE SECURITY CONTINUUM

Cyber Security Awareness

Emerging Security Technological Threats

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Cracking and Computer Security

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Defending Against Data Beaches: Internal Controls for Cybersecurity

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

How to stay safe online

F-Secure Anti-Virus for Mac. User's Guide

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

E-BUSINESS THREATS AND SOLUTIONS

Computer Viruses: How to Avoid Infection

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

N-Dimension Solutions Cyber Security for Utilities

CRYPTUS DIPLOMA IN IT SECURITY

Vulnerability Assessment & Compliance

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account

Recommended Practice Case Study: Cross-Site Scripting. February 2007

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

F-Secure Anti-Virus for Mac 2015

Data Security 2. Implement Network Controls

System Administrator Guide

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Payment Fraud and Risk Management

Protecting Organizations from Cyber Attack

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Different Types of Adware and Services

What you can do prevent virus infections on your computer

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Cyber Security Awareness. Internet Safety Intro.

Contents. McAfee Internet Security 3

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Enterprise K12 Network Security Policy

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Banking Security using Honeypot

Top tips for improved network security

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

PROFESSIONAL SECURITY SYSTEMS

COB 302 Management Information System (Lesson 8)

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

WHITE PAPER. Understanding How File Size Affects Malware Detection

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

A solution for comprehensive network security

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli

Network Incident Report

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Promoting Network Security (A Service Provider Perspective)

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Transcription:

CyberSecurity CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science (ICS) Foundation for Research and Technology Hellas (FORTH) Crete, Greece 1

Roadmap The problem: The trust that we used to place on our network is slowly eroding away We are being attacked Viruses, Worms, Trojans, keyboard loggers continue to plague our computers What do people say about this? Europe ENISA USA PITAC What can be done? The DCS approach Understand mechanisms and causes of cyberattacks Automate Detection of, fingerprinting of, and reaction to cyberattacks Summary and Conclusions 2

The erosion of trust on the Internet We used to trust computers we interacted with on the Internet Not any more Address bar spoofing: Do you know that the web server http://www.paypal.com is the real one? 3

The erosion of trust on the Internet We used to trust our network Not any more Our network is the largest source of all attacks We used to trust our own computer Not any more (keyboard loggers can easily get all our personal information) 4

The erosion of trust on the Internet We used to trust our own eyes with respect to the content we were viewing on the Internet Not any more Phishing: sophisticated social engineering Attackers send users email On behalf of a legitimate sender (e.g. a bank) Inviting them to sign-up for a service When users click they are requested to give their password Which ends up in the attacker s database 5

A simple phishing attack 6

A sophisticated phishing attack: Setting the stage Attackers send email inviting Bank of America customers to change their address on-line 7

A phishing attack: hiding the tracks Legitimate Web site Pop-up Window Bank of America web site opens in the background Pop-up window (from www.bofalert.com!) requests user name and password 8

The boiling cauldron of Security Security on the Internet is getting increasingly important Worms, Viruses, and trojians, continue to disrupt our everyday activities Spywareand backdoors continue to steal our credit card numbers, our passwords, and snoop into our private lives Keyboard loggers can empty our bank accounts if they choose to do so 9

It used to be a problem of PCs Not any more PocketPC virus: Duts Mobile phone virus: Cabir Infects the Symbian operating system 10

Mobile phone viruses: The Mosquitos virus Mosquitos Virus: Attaches itself to an illegal copy of Mosquitos game Once installed it starts sending potentially expensive SMS messages to premium numbers free to download but expensive to play 11

Once installed Searches or nearby phones Sends itself to the owner's address list through MMS Using random names Difficult to filter out The CommWarrior Worm 12

How much does it cost? Financial Cost: worms cost billions of euros to lost productivity CodeRED Worm: $2.6 billion Slammer: $1.2 billion LoveLetter virus: $8.8 billion Could cyberattacks lead to loss of life? What if a medical equipment gets infected by a worm? Wrong diagnosis? Wrong treatment? What if a car gets infected by a worm? Could this lead to fatal car crash? How about Critical Infrastructures? What if a Nuclear power plant gets infected? Would this lead to failure of safety systems? Is this possible? 13

How much does it cost? Worms have penetrated Nuclear Power plants. The Slammer worm penetrated a private computer network at Ohio's Davis-Besse nuclear power plant in January and disabled a safety monitoring system for nearly five hours Security Focus News Luckily no harm was made The reactor was not operating at that time There was a fall-back analog monitoring system Will we be so lucky next time? 14

What do people say about this? ENISA ENISA: European Network and Information Security Agency PSG: Permanent Stakeholders Group Vision Document 15

ENISA Vision The longer-term impact of worm compromised hosts is likely to be greater in total than at present Organized Crime and terrorists introduce a level of sophistication and funding of (cyber)attacks that is far beyond what we have commonly seen in the previous 20 years of cyber security ENISA PSG i.e. things are bad and are going to get worse! 16

What does the community say about this? What should we do? Feb. 2005 President s Information Technology Advisory Committee (in U.S.) Cyber-Security Sub-committee David Patterson, UC Berkeley Tom Leighton, MIT, and several others 17

Cyber-security Report Provide expert advice In IT security 18

Research Priorities Identified They identified 10 Research Priorities We should do Research in: Global Scale Monitoring (for cyber-attacks) Real-time Data collection storage and analysis (for cyberattacks) Automated (cyberattack) discovery from monitoring data Develop forensic-friendly architectures To summarize: Monitor for cyber-attacks and detect them early 19

Cybersecurity Research in Crete At DCS we do just that Monitor, detect, and fingerprint Cyberattacks 20

Project Coordination LOBSTER: Large Scale Monitoring of Broadband Internet Infrastructure SSA, Research Networking Testbed, funded by IST, 9 partners NoAH: Network of Affined Honeypots SSA (Design Study), Research Infrastructure Funded by DG Research, 8 partners 21

Publicity 22

What is a honeypot? An undercover computer which has no ordinary users which provides no regular service Or a few selected services if needed Just waits to be attacked Its value lies on being compromised Or in being exploited, scanned, etc. Honeypots are an easy target But heavily monitored ones If attacked, they log as much information as possible 23

When was a honeypot first used? Widely publicized: The cuckoo s egg By Cliff Stoll Cliff Stoll noticed a 75-cent accounting error in the computer he managed This led Cliff to discover an intruder named Hunter Instead of shutting Hunter out, Cliff started to study him He connected the modem lines to a printer He created dummy top-secret directories to lure Hunter into coming back He was paged every time Hunter was in He traced Hunter to a network of hackers Paid in cash and drugs and Reporting directly to KGB 24

How do we receive attacks? Three types of sensors: Traditional honeypots who wait to be attacked Collaborating organizations who install lowinteraction honeypots and forward interesting attacks to NoAH core Honey@Home: A screensaver who forwards all unwanted traffic to NoAH Unwanted traffic received at unused IP addresses unused TCP/UDP ports 25

In Closing In a week from today (May 17 th) is the World Telecommunication Day 2006 (WTD) Commemorates the founding of ITU WTD 200 is Dedicated to Promoting Global Cybersecurity 26

In Closing Let us take this opportunity Of the World Telecommunication Day Dedicated to promoting Global Cybersecurity And promote cybersecurity and Internet Safety By promoting awareness By empowering small organizations By empowering people to contribute and make a difference Thank you all... 27

CyberSecurity CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science (ICS) Foundation for Research and Technology Hellas (FORTH) Crete, Greece 28