Скачать презентацию Internet Computer Security Past Present Future Rich Скачать презентацию Internet Computer Security Past Present Future Rich

94f0fa46508591695924b4e7c6c71d84.ppt

  • Количество слайдов: 48

Internet & Computer Security Past, Present, Future Rich Pethia Software Engineering Institute Carnegie Mellon Internet & Computer Security Past, Present, Future Rich Pethia Software Engineering Institute Carnegie Mellon University © 2008 Carnegie Mellon University

We heard about the worm on 11/2/88 Source: Spafford, Eugene H. , 1988, “The We heard about the worm on 11/2/88 Source: Spafford, Eugene H. , 1988, “The Internet Worm Program: An Analysis, ” Purdue Technical Report CSD-TR-823, West Lafayette, IN: Purdue University “On the evening of 2 November 1988, someone infected the Internet with a worm program. … This infection eventually spread to thousands of machines, and disrupted normal activities and Internet connectivity for many days. ” © 2008 Carnegie Mellon University 2

CERT/CC was operational on 12/6/88 Established at the SEI with DARPA sponsorship as the CERT/CC was operational on 12/6/88 Established at the SEI with DARPA sponsorship as the Computer Emergency Response Team Coordination Center. CERT/CC’s mission: Respond to security emergencies on the Internet, serve as a focal point for reporting security vulnerabilities, serve as a model to help others establish incident response teams, and raise awareness of security issues. © 2008 Carnegie Mellon University 3

We envisioned a CERT system © 2008 Carnegie Mellon University 4 We envisioned a CERT system © 2008 Carnegie Mellon University 4

Now international cooperation speeds response to Internet security breaches © 2008 Carnegie Mellon University Now international cooperation speeds response to Internet security breaches © 2008 Carnegie Mellon University 5

But there were attacks in 1986 Source: Stoll, Clifford, 1989, The Cuckoo’s Egg: Tracking But there were attacks in 1986 Source: Stoll, Clifford, 1989, The Cuckoo’s Egg: Tracking a Spy Through a Maze of Computer Espionage, New York, NY: Pocket Books “The hacker’s code name was “Hunter” – a mystery invader hiding inside a twisting electronic labyrinth, breaking into U. S. computer systems and stealing sensitive military and security information” © 2008 Carnegie Mellon University 6

Hackers were once a nuisance Source: Time Magazine, December 12, 1994 Newsday technology writer Hackers were once a nuisance Source: Time Magazine, December 12, 1994 Newsday technology writer and hacker critic found • email box jammed with thousands of messages • phone reprogrammed to an out-of-state number where callers heard an obscenity-loaded recorded message © 2008 Carnegie Mellon University 7

Then it got more serious Source: PBS website report on Phonemasters (1994– 1995) An Then it got more serious Source: PBS website report on Phonemasters (1994– 1995) An international group attacked major companies: MCI World. Com, Sprint, AT&T, and Equifax credit reporters • got phone numbers of celebrities (e. g. , Madonna) • gained access to FBI's national crime database • obtained information on phones tapped by FBI & DEA • created phone numbers for their own use © 2008 Carnegie Mellon University 8

. . . and profitable Source: PBS website report on Vladimir Levin, 1994 Russian . . . and profitable Source: PBS website report on Vladimir Levin, 1994 Russian hacker accessed Citibank computers and transferred $10 M to his accounts using passwords and codes stolen from Citibank customers • Citibank and FBI tracked Levin • all but $400, 000 recovered © 2008 Carnegie Mellon University 9

Software is blamed for problems Source: Business Week cover story, December 6, 1999 “Glitches Software is blamed for problems Source: Business Week cover story, December 6, 1999 “Glitches cost billions of dollars and jeopardize human lives. How can we kill the bugs? ” © 2008 Carnegie Mellon University 10

DDOS attacks become a reality Source: Seattle Post-Intelligencer Staff and News Services, February 9, DDOS attacks become a reality Source: Seattle Post-Intelligencer Staff and News Services, February 9, 2000 Operations of major e-commerce and websites seriously disrupted Examples: © 2008 Carnegie Mellon University 11

Links are made with organized crime Source: Ecommerce Times, March 9, 2001 FBI advises Links are made with organized crime Source: Ecommerce Times, March 9, 2001 FBI advises that Eastern European hacker groups stole information from e-commerce and online banking sites • 40 firms in 20 states, lost over 1 M credit card numbers • credit card information sold to organized crime entities • the criminal groups usually try to sell security services to victim sites © 2008 Carnegie Mellon University 12

The relationships grow Source: New York Times News Service, May 13, 2002 Eastern European The relationships grow Source: New York Times News Service, May 13, 2002 Eastern European Internet sites traffic in tens of thousands of stolen credit-card numbers weekly • financial losses claimed of over $1 B/year • cards prices at $. 40 to $5. 00/card – bulk rates for lots of hundreds or thousands • organized crime groups buy from black-hat hackers © 2008 Carnegie Mellon University 13

…with links to terrorist activities Source: Testimony of Mr. Dennis Lormel, FBI; Senate Subcommittee …with links to terrorist activities Source: Testimony of Mr. Dennis Lormel, FBI; Senate Subcommittee on Technology, Terrorism and Government Information, July 9, 2002 • Terrorists use identity theft & social security number fraud to — obtain employment & access to secure locations — get driver's licenses and bank and credit card accounts to facilitate terrorism financing • Terrorist cell in Spain used stolen credit cards in fictitious sales scams and for many other purchases for the cell © 2008 Carnegie Mellon University 14

Spyware targets individuals Source: The Register, August 30, 2002 Spyware is freely available • Spyware targets individuals Source: The Register, August 30, 2002 Spyware is freely available • is distributed via email • logs keystrokes and copies all email • sends recorded information to a specified email address © 2008 Carnegie Mellon University 15

Extortion Source: U. S. Dept. of Justice Press Release, July 1, 2003 • Oleg Extortion Source: U. S. Dept. of Justice Press Release, July 1, 2003 • Oleg Zezev, aka "Alex, " a Kazakhstan citizen, sentenced to 51 months in prison after his conviction on extortion and computer hacking charges • Zezev convicted of hacking into Bloomberg L. P. 's computer system, stealing confidential information, and threatening public disclosure if $200, 000 not paid © 2008 Carnegie Mellon University 16

Botnets for hire Source: Technology Review, September 24, 2004 • Pirated computers rented for Botnets for hire Source: Technology Review, September 24, 2004 • Pirated computers rented for $100/hour, average rate in underground markets • Used for sending SPAM, launching DDOS attacks, distributing pornography, etc. © 2008 Carnegie Mellon University 17

Going “phishing” Phishing: fraudulent email and websites used to lure recipients into divulging sensitive Going “phishing” Phishing: fraudulent email and websites used to lure recipients into divulging sensitive information such as credit card numbers, social security numbers, bank account numbers & PINs A rapidly growing problem Anti Phishing Working Group (www. antiphishing. org) 400% increase over holidays 50% increase in Jan. 04 60% increase in Feb. 04 43% increase in March 04 180% increase in April 04 (Dec. 03 report) (Feb. 04 report) (March 04 report) (April 04 report) (May 04 report) 300% increase May 04 to Jan 05 — etc, etc © 2008 Carnegie Mellon University 18

Identity theft flourishes (1) • Chronicle, October 21, 2004 – reports on theft of Identity theft flourishes (1) • Chronicle, October 21, 2004 – reports on theft of social security numbers from UC Berkeley systems; 600, 000 Californians affected • Associated Press, November 4, 2004 – reports a former University of Texas student indicted on hacking into UT’s system and stealing social security numbers and other personal information from 37, 000+ students and staff • Los Angeles Times, November 4, 2004 – reports four computers stolen from Wells Fargo; lost social security numbers of customers © 2008 Carnegie Mellon University 19

Identity theft flourishes (2) • Computerworld, January 10, 2005 – reports hacker steals names, Identity theft flourishes (2) • Computerworld, January 10, 2005 – reports hacker steals names, photos and social security numbers of 32, 000+ students and staff at George Mason University • news. com, Feb 15, 2005 – reports Choice. Point confirmed that criminals accessed its database of consumer records, potentially viewing the data of about 35, 000 Californians; at least one case of identity fraud © 2008 Carnegie Mellon University 20

Electronic crime infrastructure grows Source: Baseline Magazine, March 7, 2005 Web mobs named carderplanet, Electronic crime infrastructure grows Source: Baseline Magazine, March 7, 2005 Web mobs named carderplanet, stealthdivision, darkprofits, and the shadowcrew — buy and sell millions of credit card numbers, social security numbers, and identification documents – often for less than $10 each — build sites and services to create more skilled, like-minded organizations. • U. S. Secret Service said shadowcrew had 4, 000 members — sold 1. 5 million credit card numbers, 18 million email accounts, and other ID documents – sold to highest bidders © 2008 Carnegie Mellon University 21

Mobsters gain control Source: eweek. com, April 13, 2006 “Cybercrime More Widespread, Skillful, Dangerous Mobsters gain control Source: eweek. com, April 13, 2006 “Cybercrime More Widespread, Skillful, Dangerous Than Ever” • Russian mafia and web gangs take control of billion dollar crime network powered by hackers • Underground markets trade in “private exploits” that evade anti-virus software, botnets at $25/10, 000 hijacked PCs, zero day exploits, denial-of-service attacks • Actively recruiting young hackers and “mules” to move and launder funds © 2008 Carnegie Mellon University 22

Malware increases Source: PC World, December 4, 2007 Security vendors report explosive growth in Malware increases Source: PC World, December 4, 2007 Security vendors report explosive growth in malware • F-Secure catalogs 250, 000 new pieces of malware in 2007, more than all cataloged in their past 20 years • Symantec reports >212 k new malicious code threats, a 185% increase over previous year [note: CERT/CC today cataloging over 40, 000 new malware items per week] © 2008 Carnegie Mellon University 23

Espionage is on the rise Source: Business Week Cover Story, April 10, 2008 “The Espionage is on the rise Source: Business Week Cover Story, April 10, 2008 “The New E-spionage Threat” • Unprecedented rash of attacks against US Government and defense contractors • Personalized email indicates prior intelligence work • Air Force Cyber Command reports attacks against military systems up 55% over prior year • President Bush signs Cyber Initiative order on January 8 • DNI Mc. Connell testifies to Senate that threat comes from China © 2008 Carnegie Mellon University 24

Growing fear of hardware Trojans Source: New York Times, May 9, 2008 “FBI Says Growing fear of hardware Trojans Source: New York Times, May 9, 2008 “FBI Says the Military Had Bogus Computer Gear” • 15 criminal cases involving counterfeit products (Cisco routers) bought by military agencies, contractors, and power utilities • FBI concerned that hardware was part of statesponsored intelligence activity • DARPA’s Trusted Integrated Circuits program is developing forensics techniques to detect hidden electronic trap doors © 2008 Carnegie Mellon University 25

Vulnerabilities Discovered Vulnerabilities Time © 2008 Carnegie Mellon University 26 Vulnerabilities Discovered Vulnerabilities Time © 2008 Carnegie Mellon University 26

Attacks Time © 2008 Carnegie Mellon University 27 Attacks Time © 2008 Carnegie Mellon University 27

Compromises Time © 2008 Carnegie Mellon University 28 Compromises Time © 2008 Carnegie Mellon University 28

Damage Time © 2008 Carnegie Mellon University 29 Damage Time © 2008 Carnegie Mellon University 29

What About the Future? A Continuously Changing Problem… © 2008 Carnegie Mellon University 30 What About the Future? A Continuously Changing Problem… © 2008 Carnegie Mellon University 30

…complex, ultra-large-scale systems • New design and implementation merge with updates and configuration changes …complex, ultra-large-scale systems • New design and implementation merge with updates and configuration changes • Systems must continuously deliver results while suffering attacks, accidents, and failures • Individual components are becoming more secure (e. g. operating systems • Network-connected, embedded systems are likely to be vulnerable © 2008 Carnegie Mellon University 31

…system and product vulnerability • Continued growth in vulnerability caused by increased size and …system and product vulnerability • Continued growth in vulnerability caused by increased size and complexity • Firmware vulnerabilities become a major problem • Current response & recovery practices won’t scale • New gadgets will abound, all will be Internet- connected; some will run serious operating systems with significant memory and disk size — And you think botnets are a problem now! © 2008 Carnegie Mellon University 32

… threats – more of same plus new • “Attacks for profit” – dramatic … threats – more of same plus new • “Attacks for profit” – dramatic increase • Computer/network facilitated crime – continued increases • Connections between organized crime & technical mercenaries - increase • Embedded malicious code – more instances • Shift of attack patterns from OS to applications, new devices & protocols • Stealthy, automated attacks aimed at individual companies/industries © 2008 Carnegie Mellon University 33

… security products & services (1) Key question: How will today’s security solutions evolve, … security products & services (1) Key question: How will today’s security solutions evolve, scale to meet new challenges? • Increased dissatisfaction with effectiveness of perimeter security • Growing dissatisfaction with intrusion detection systems • Growing dissatisfaction with anti-malware products • Greater emphasis on maintaining the integrity of known “goods” rather than trying to screen for known “bads” and praying for no unknown “bads” © 2008 Carnegie Mellon University 34

… security products & services (2) Approaches to solutions • Emergence of “application centric” … security products & services (2) Approaches to solutions • Emergence of “application centric” security event detection systems • More hardware to help solve problems – biometrics, encrypting disks, etc • Increase in risk consulting on insider threats & compliance © 2008 Carnegie Mellon University 35

… victims in a changing world Globalization and ubiquitous Internet-connected systems are changing the … victims in a changing world Globalization and ubiquitous Internet-connected systems are changing the fabric of government/ business/citizen interactions. The emerging socio-technical ecosystem will bring new targets. © 2008 Carnegie Mellon University 36

… victims today and tomorrow • Increases in — espionage as relationships change world- … victims today and tomorrow • Increases in — espionage as relationships change world- wide — industrial espionage as developing countries become major players in world-wide markets — attacks on citizens of countries with growing economies • As security in advanced agencies/companies improves, weaker links in contractor/supply chains will be attacked • Critical infrastructure attack? ? © 2008 Carnegie Mellon University 37

What Can We Do? © 2008 Carnegie Mellon University 38 What Can We Do? © 2008 Carnegie Mellon University 38

Better Understanding Today sharing is time consuming and expensive leading to islands of information Better Understanding Today sharing is time consuming and expensive leading to islands of information and little shared understanding Needed: R&D projects to • develop open standards for capturing, storing, and transmitting security information and analysis results • form sharing & analysis coalitions to improve understanding and disseminate knowledge • establish global indications and warning systems with predictive capabilities • define requirements for automated support for recognition, response, reconstitution, and recovery © 2008 Carnegie Mellon University 39

Better Software Low-quality software continues as the root cause of most vulnerabilities/incidents Needed: • Better Software Low-quality software continues as the root cause of most vulnerabilities/incidents Needed: • Studies that demonstrate the business case for improved software engineering process – higher quality at lower cost • R&D to increase effectiveness of static & dynamic analysis tools • New R&D for higher levels of security © 2008 Carnegie Mellon University 40

Better Systems Some problems are rooted in system architecture and design • Viruses, spam, Better Systems Some problems are rooted in system architecture and design • Viruses, spam, DDOS, spyware Needed: More interaction between researchers/ developers and security practitioners • IETF, standards groups, vendor forums © 2008 Carnegie Mellon University 41

Better Systems Management Response team experience shows that some organizations are on top of Better Systems Management Response team experience shows that some organizations are on top of security and others are clueless Need to develop and promote security management practices that are • supportive of an organization’s mission & goals • focused on risk reduction rather than mere compliance • measured, reviewed, & updated regularly © 2008 Carnegie Mellon University 42

Better People Management practice dictates the “what, ” but the skills & abilities of Better People Management practice dictates the “what, ” but the skills & abilities of the staff determine the “how well” Need to • support and promote the development of performance and training standards (such as Do. D 8530 & 8570) as well as more security topics in degree programs • encourage managers to invest in the training and skill building needed to stay on top of a constantly changing problem © 2008 Carnegie Mellon University 43

Future Vulnerabilities Goal for Future Vulnerabilities Time © 2008 Carnegie Mellon University 44 Future Vulnerabilities Goal for Future Vulnerabilities Time © 2008 Carnegie Mellon University 44

Future Compromises Goal for Future Compromises Time © 2008 Carnegie Mellon University 45 Future Compromises Goal for Future Compromises Time © 2008 Carnegie Mellon University 45

Future Attacks Goal for Future Attacks Time © 2008 Carnegie Mellon University 46 Future Attacks Goal for Future Attacks Time © 2008 Carnegie Mellon University 46

Future Damage Goal for Future Damage Time © 2008 Carnegie Mellon University 47 Future Damage Goal for Future Damage Time © 2008 Carnegie Mellon University 47

Visit Us Often! www. sei. cmu. edu www. cert. org © 2008 Carnegie Mellon Visit Us Often! www. sei. cmu. edu www. cert. org © 2008 Carnegie Mellon University 48