Regional cyber security considerations for network operations. Eric Osterweil Principal Scientist, Verisign

Similar documents
DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

How to launch and defend against a DDoS

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Malicious Network Traffic Analysis

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net

Protecting Your Organisation from Targeted Cyber Intrusion

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

CS5008: Internet Computing

Acquia Cloud Edge Protect Powered by CloudFlare

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

CloudFlare advanced DDoS protection

How To Mitigate A Ddos Attack

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Reducing the Impact of Amplification DDoS Attack

First Line of Defense

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

DDoS attacks in CESNET2

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Hunting down a DDOS attack

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Frequent Denial of Service Attacks

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

SSL/TLS and MITM attacks. A case study in Network Security By Lars Nybom & Alexander Wall

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Flow processing and the rise of the middle.

Cloud Security In Your Contingency Plans

Cisco SAFE: A Security Reference Architecture

How Cisco IT Protects Against Distributed Denial of Service Attacks

Defending Against Cyber Attacks with SessionLevel Network Security

DDoS Overview and Incident Response Guide. July 2014

Public Key Infrastructure (PKI)

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Network Infrastructure Under Siege

Where every interaction matters.

Corporate Security in 2016.

Securing Your Business with DNS Servers That Protect Themselves

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016

Integrating MSS, SEP and NGFW to catch targeted APTs

Effect of anycast on K-root

How to Evaluate DDoS Mitigation Providers:

Locking down a Hitachi ID Suite server

Web App Security Audit Services

Automated Mitigation of the Largest and Smartest DDoS Attacks

Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Securing Your Business with DNS Servers That Protect Themselves

Network Security. Mobin Javed. October 5, 2011

External Supplier Control Requirements

Network Security Fundamentals

Reference Architecture: Enterprise Security For The Cloud

Securing Linux Servers Best Practice Document

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

How To Create An Intelligent Infrastructure Solution

SecurityDAM On-demand, Cloud-based DDoS Mitigation

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Cisco IOS Flexible NetFlow Technology

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Seven Strategies to Defend ICSs

Overview of computer and communications security

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Chapter 1 Personal Computer Hardware hours

DDoS Protection on the Security Gateway

IBM Security IBM Corporation IBM Corporation

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Distributed Denial of Service Attack Tools

Internal Server Names and IP Address Requirements for SSL:

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Transcription:

Regional cyber security considerations for network operations Eric Osterweil Principal Scientist, Verisign

Internet operations and cyber security These two fields are deeply intertwined But, one could argue these are different communities There are many cases where Internet operations can provide critical insights to cyber security There are cases where cyber security practices can guide Internet operations 2

Cyber security problems and core protocols Cyber security concerns come from a wide rage Mobile malcode DDoS attacks Data exfiltration Watering hole attacks etc. We have become comfortable with looking at these attacks in isolation Malcode is an OS problem, DDoS is a resource problem, etc. We need to realize that adversaries have goals, and attacks can be mere components in campaigns From this realization, Internet operations can address weaknesses in attack campaigns 3

Outline How have core protocols succeeded, this long Liabilities and problems Remediations Conclusions 4

Core protocols are the foundations of cyber security Routing (BGP) and naming (DNS) underlie most online activities One way to look at BGP: establishes reachability between those holding IPs and ASNs One way to look at DNS: lets those holding names map them to resources (services, etc.) These protocols enable pretty much every service on the Internet (HTTP[S], SMTP, etc.) This makes them very relevant to cyber security However, much of the development of these protocols has been to make them more scalable and resilient 5

How things have been able to scale Administrators have had the ability manage our own resources We decide how our IP allocations should be announced We decide what names to map to services We chose where eyeballs land We have servers and racks, and we decide who we get our connectivity from More autonomy lets us optimize, customize, react to problems, etc. 6

But, this is also an Internet-wide leap-of-faith We trust the configurations of these protocols We learn others configurations, and believe what we hear This trust means good network hygiene is important Mistakes can generally be overcome, when everyone is well intending But, a way to verify network configurations is missing Who holds which resources, who is authorized to speak for resources, what are their intentions Some call this Resource Certification What happens when intentions are less pure? 7

Today s threatscape varies in so many ways Defenders often focus on our core competencies Should a routing operator just tighten peering infrastructure? Should a cloud service just harden virtualization services? Sometimes attacks seem to be focused on technologies, but might just be opportunistic Does a BGP route leak concern anyone other than routing operators? Sure, BGP route leaks can cause outages, but they can also facilitate Man-in-the-Middle attacks This could motivate a cloud provider to worry about BGP Does this mean that attacks like data breaches can be affected by BGP route leaks and DDoS too? 8

An illustration cross-modal hijacking In 2009, BGP was used to leak routes to DNS root servers Protocol manipulation of BGP interfered with DNS and affected HTTP Result, HTTP Man in the Middle (MitM) attacks were possible on major websites [1] http://techreports.verisignlabs.com/tr-lookup.cgi?trid=1140010&rev=1 9

Systemic dependencies Consider this case To BGP, these cases looked like expanded anycast catchments To DNS, they looked like a detectable error To anyone not looking at their own systemic dependencies, these were undetected attacks Attackers capitalize on the fact that layering isolates protocols from each other Just because protocols don t know how they depend on each other, doesn t mean attackers don t 10

More illustrations In 2010-2013, temporally narrow BGP route leaks from regions/isps [2,3] At first, connectivity interruptions announced leaks Progressively, end-to-end connectivity was maintained during attacks (MitM) BGP route leaks can enable MitM attacks [2] http://www.renesys.com/2010/11/chinas-18-minute-mystery/ [3] http://www.renesys.com/2013/11/mitm-internet-hijacking/ 11

Systemic dependencies (2) Object-Level Security Web Cert CAs Session-Level Security TLS Network-Delivery Assurances OCSP/CRL Server(s) DNS Resolution WWW/ TCP OCSP/ CRL DNS Footprint User-facing services depend on many infrastructure protocols Many user-facing services depend on each other [3] [4] http://techreports.verisignlabs.com/tr-lookup.cgi?trid=1120004&rev=5 12

So, what should we do? Prudence: we should treat the symptoms and the cold Tactical and strategic remediation Consider DDoS reflector attacks: these attacks may use DNS, NTP, SNMP, etc. Good advice is to follow Best Current Practices (BCPs) for hardening deployed systems DNS: close open resolvers, NTP: disable monlist, etc Strategic: focus on the root too The IP layer is a component of reflector attacks too Source spoofing enables these reflector attacks that is a filtering problem Consider Resource Certification 13

Some examples of good hygiene Keep services hardened NTP [5], closing DNS resolvers [6], etc The set of recommendations is long, and groups have come together expressly for this Example: US FCC Communications Security, Reliability and Interoperability Councils (CSRICs) [7] But, source spoofing is used on a variety of protocols, remediating that is a more strategic goal Ingress filtering: BCP 38 [8] Resource Certification: RPKI [9] or maybe TASRS [10] [5] http://www.team-cymru.org/readingroom/templates/secure-ntp-template.html [6] http://www.team-cymru.org/services/resolvers/instructions.html [7] http://www.fcc.gov/encyclopedia/communications-security-reliability-and-interoperability-council-iv [8] http://tools.ietf.org/html/bcp38 [9] https://arin.net/resources/rpki/index.html [10] http://techreports.verisignlabs.com/tr-lookup.cgi?trid=1130009&rev=1 14

More strategy: cyber herd immunity! There s more to this than defending ourselves in isolation Operators need to work together In fact, these hygienic practices can be made to work together Proto hardening is good, but also kind of whack-a-mole Often, plugging one hole opens another (or another hole gets exploited) To protect each other, we need cyber security Information Sharing Share relevant information! 15

Information sharing Much of what info sharing platforms have focused on is Indicators of Compromise (IOCs) IODEF/RID+ROLIE+XMPP [11] or STIIX/TAXII [12] But, network attack telemetry can be helpful to share too Sharing networks have formed in many ways This can be what CSIRTs, trust groups, etc. are used for But, be focused on what you want and want to share Is DDoS telemetry helpful, mobile malcode infections, etc. [11] https://datatracker.ietf.org/wg/mile/charter/ [12] http://stix.mitre.org/ 16

Suppose Suppose a DDoS attack is underway What if the victim can share attacking sources with likeminded operators What if those operators can help filter traffic because a trusted peer shared incident information? 17

Information sharing challenges There can be liabilities in info sharing If I share information, that may be Personally Identifiable Information (PII) I might be liable to my customers if I disclose a data breach (or I might be liable if I don t) Reporting incidents (vs. indicators or observables) Rather than admitting a compromise (or breach), I might share indicators Is that enough without context of an incident? Making threat intelligence actionable What info can be shared and acted upon Sharing info without action is not terribly useful 18

Conclusion Take-homes: good hygiene is critical One suggestion: but when short on resources, focus efforts on core payoffs: filtering and info sharing Tactical and strategic foci Hardening + filtering + resource certification Herd immunity: proactive information sharing Love your local CSIRTs, sharing groups are good 19

Thank You 2013 VeriSign, Inc. All rights reserved. VERISIGN and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.