27
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Embed Size (px)

Citation preview

Page 1: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Internet Drivers LicenseCSS411/BIS421 Computing Technology & Public PolicyMark KochanskiSpring 2010

Page 2: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010
Page 3: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

IssuesProtection of InfrastructureProtection of Resources

◦Governments◦Industry◦Individuals

Protection of Intellectual PropertyIdentity TheftEnabling Criminal Investigation

Page 4: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

MalwareMalicious Software

◦Viruses◦Worms◦Trojans◦Root Kits◦Spyware

Page 5: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Malware

Page 6: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

US-CERT Incident CategoriesCAT 1: Unauthorized AccessCAT 2: Denial of Service (DoS)CAT 3: Malicious CodeCAT 4: Improper Usage (based on

Policy)CAT 5: Scans, Probes, or

Attempted AccessCAT 6: Under Investigation

Page 7: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

US-CERT Reported Cyberspace Security Incidents by Category

Quarterly Trends FY09 Q1 (June 2009)

Quarterly Trends FY06 Q3 (June 2006)

Page 8: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

US-CERT Reported Cyberspace Security Incidents

Quarterly Trends FY09 Q1 (June 2009)

Quarterly Trends FY07 Q4 (December 2007)

Page 9: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

DDoS Attacks

DDoS Attacks (Last Two Years)http://www.shadowserver.org/wiki/pmwiki.php/Stats/DDoSCharts

Page 10: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Infection RatesCode Red

◦150,000 computers in 14 hoursNIMDA

◦Nationwide in 1 hour

Page 11: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Example: Spread of the Witty Worm

Figure 2: The exponential spread of the Witty worm. The number of active machines in five minutes (green line) stabilized after 45 minutes, indicating that almost all of the vulnerable machines had been compromised. After that point, dynamic addressing (e.g. DHCP) caused the cumulative IP address total (the red line) to continue to rise. We estimate the total number of hosts infected by the Witty worm to be 12,000 hosts at most.

Shannon, Colleen and David Moore. “The Spread of the Witty Worm”, CAIDA, 2008.

http://www.caida.org/research/security/witty/

Page 12: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Uses of BotnetsDistributed Denial of Service

AttacksSpammingSniffing TrafficKeyloggingSpreading New MalwareLeveraging AdvertisingManipulating Polls and GamesMass Identity Theft

Page 13: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Spam by Botnet Type

Page 14: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Example: Rustock

Page 15: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Botnet StatisticsSeptember 2006: Botnets capable of

generating10-20Gbps of junk dataDavos 2007: Up to 25% (150 million

hosts) may be participants in a botnetLast two year trends [ShadowServer]

Page 16: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Hosts on the Internet

Page 17: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Quality of Software

1996

1997

1998

1999

2000

2001

2002

2003

2004

2005

2006

2007

2008

*0

2,000

4,000

6,000

8,000

Total Vulnerabilities Catalogued (US CERT)

US CERT [http://www.cert.org/stats/] Through Q3 2008

Page 18: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Zero AV Detection

Page 19: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

IPV4 Network Routing

http://www.eventhelix.com/realtimemantra/networking/ip_routing.htm

Page 20: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

IPV4 Packet Fields

Page 21: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

IPV4 Infrastructure

RIPE NCC (January 2010)http://www.ripe.net/is/hostcount/stats/all/2010-01

Page 22: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

National PolicyNational Strategy to Secure Cyberspace,

2003◦Public-private engagement through DHS◦Federal Priorities

I. A National Cyberspace Security Response SystemII. A National Cyberspace Security Threat and

Vulnerability Reduction ProgramIII. A National Cyberspace Security Awareness and

Training ProgramIV. Securing Governments’ CyberspaceV. National Security and International

Federal Information Security Management Act, 2002 (FISMA)

Page 23: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

National Strategy to Secure Cyberspace, 2003. p. 9

Page 24: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Guiding PrinciplesA national effect

Use government to facilitate / communicate

Protect privacy and civil libertiesRegulations and market forces

Leverage market forcesAccountability and responsibilityEnsure flexibilityMultiyear planning

Page 25: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Government InvolvementII. A National Cyberspace Security Threat

and Vulnerability Reduction ProgramInclude efforts to◦ Identify and remediate existing

vulnerabilities◦Develop systems with fewer vulnerabilitiesWith goals and objectives including◦Securing mechanisms of the internet◦ Improving the security and resilience of key

internet protocols◦Promoting improved internet routing◦ Improve management (of the internet)

Page 26: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

DHS NIPP-Cyber Security(National Infrastructure Protection Plan)Industry-specific partnership: IT Sector

◦IT SCCSector Coordinating Council

◦IT GCCGovernment Coordinating Council

◦IT ISACInformation Sharing and Analysis Center

◦US-CERTU.S. Computer Emergency Readiness Team

Page 27: Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Security Industry

53.60%

18.80%

13.80%

13.80%

2005 Anti-Virus Industry

SymantecMcAfeeTrend MicroOther

2005: $4 billion with 13.6% Growth (Gartner)