Your SlideShare is downloading. ×
0
Mark Lambe  Product Marketing Manager Shenick Network Systems Emulation Strategies to test Cyber terrorism defense Effecti...
The real Crime is Ignorance <ul><li>IGNORANCE  –  this is the real crime, the lack of knowledge and basic computer skills!...
Network Vulnerabilities <ul><li>Sabotage – April 2009:  Saboteurs hacked through underground fiber-optic cables leaving te...
Visible vs Invisible Threats <ul><li>A method of organising threats can be ranked into two: </li></ul><ul><ul><li>Visible ...
Visible Threats <ul><li>Visible threats exploit the “Openness” of IP networks and systems </li></ul><ul><ul><li>DDoS  </li...
Invisible Threats <ul><li>Perceived threats include the use of networking resources by terrorists  </li></ul><ul><ul><li>K...
Security - The Price of Protection <ul><li>Firewalls, DDoS mitigation, IPS/IDS, AntiVirus, AntiSpam, Cache/Proxy,  all int...
Performance Issues <ul><li>Lawful interception or analysis of traffic flows will add some delay, in monitored networks exc...
Emulate the crime <ul><li>Counter measures for most cyber based crimes and activities include the deployment of hardware a...
Per flow Challenge <ul><li>DPI / DLP/ IDP security devices are sophisticated and can quickly learn traffic flows and patte...
Attack the stack <ul><li>The majority of visible threats such as DDoS utilize or exploit known vulnerabilities with the IP...
Test for the Invisible <ul><li>Steganography is real and tools are freely available from the web.  </li></ul><ul><li>Gener...
diversifEye <ul><li>diversifEye emulates stateful clients with real world functionality and features (layer 2-7). </li></u...
Thank You! Award Winning Test & Monitoring Solutions Industry Associations
Upcoming SlideShare
Loading in...5
×

Defining Cyber Crime

552

Published on

An overview on the types of crimes committed online and various test mechanisms to mitigate against attacks.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
552
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
47
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Defining Cyber Crime"

  1. 1. Mark Lambe Product Marketing Manager Shenick Network Systems Emulation Strategies to test Cyber terrorism defense Effective Internet Data and Attack
  2. 2. The real Crime is Ignorance <ul><li>IGNORANCE – this is the real crime, the lack of knowledge and basic computer skills! </li></ul><ul><li>FREE TOOLS - Using free tools what did I discover from a simple pcap capture using a free download tool – wireshark. </li></ul><ul><li>POTENTIAL OUTCOME – The destruction of Mr. X’s life as he knows it! </li></ul><ul><li>Sadly more and more people are exposing themselves and their valuable data without ever thinking whose watching! </li></ul><ul><li>To a cyber criminal this is a no brainer! </li></ul>NAME & EMAIL ADDRESS! 10.1.0.82 Extortion of money Interest in Russian Brides 10.1.0.82 Potential Crime Data Collected IP Address
  3. 3. Network Vulnerabilities <ul><li>Sabotage – April 2009: Saboteurs hacked through underground fiber-optic cables leaving tens of thousands of Silicon Valley residents with no phone, cell phone or Internet service </li></ul><ul><li>Attack - May 2009: No internet access for several million users in China due to a DDoS attack on the DNS system from one of the countries registrars. </li></ul><ul><li>Virus – May 2009: The FBI and the U.S. Marshals Service were forced to shut down parts of their computer networks after a mystery virus struck the law-enforcement agencies. </li></ul><ul><li>Pranksters – May 2009: YouTube was busy deleting porn videos after users of forums at a rival site and an imageboard site declared a &quot;Porn Day&quot; campaign against the popular video service. </li></ul>
  4. 4. Visible vs Invisible Threats <ul><li>A method of organising threats can be ranked into two: </li></ul><ul><ul><li>Visible </li></ul></ul><ul><ul><li>Invisible </li></ul></ul><ul><li>Visible Threats– </li></ul><ul><ul><li>Crimes committed on networks, where the result or outcome of the action is network related. In essence, the virtualization of the common day crimes such as sabotage, vandalism, extortion, fraud, etc. </li></ul></ul><ul><li>Invisible Threats– </li></ul><ul><ul><li>The use of networks for crimes outside of the network but in the real world. The main purpose is to exploit network resources for research and communication. </li></ul></ul>
  5. 5. Visible Threats <ul><li>Visible threats exploit the “Openness” of IP networks and systems </li></ul><ul><ul><li>DDoS </li></ul></ul><ul><ul><li>Virus </li></ul></ul><ul><ul><li>Worms </li></ul></ul><ul><ul><li>Spam Mails </li></ul></ul><ul><li>Counter Measures – deploy security devices </li></ul><ul><ul><li>Deploy Packet Inspection devices </li></ul></ul><ul><ul><li>Firewalls </li></ul></ul><ul><ul><li>Intrusion Detection / Protection </li></ul></ul><ul><ul><li>Data loss Prevention </li></ul></ul><ul><ul><li>Load Balancers </li></ul></ul>A visible network threat is one in which a network or device on the network is targeted for some unlawful gain or reason of exploitation.
  6. 6. Invisible Threats <ul><li>Perceived threats include the use of networking resources by terrorists </li></ul><ul><ul><li>Knowledge gain or education </li></ul></ul><ul><ul><li>Communication </li></ul></ul><ul><li>“ Steganography” has been suggested as the preferred means of communication or message transmission </li></ul><ul><ul><li>Only the end points know something is embedded or exists in the video, audio or picture files </li></ul></ul><ul><ul><li>The message may be encrypted. </li></ul></ul><ul><li>Counter Measure – Steganalysis tools </li></ul>A map image may easily be embedded under an ordinary, everyday image and added to image sharing websites such as flickr, Youtube, etc.
  7. 7. Security - The Price of Protection <ul><li>Firewalls, DDoS mitigation, IPS/IDS, AntiVirus, AntiSpam, Cache/Proxy, all introduce performance overheads </li></ul><ul><ul><li>Key Questions : </li></ul></ul><ul><ul><ul><li>Under both regular and regular plus attack conditions - how is the application end-end performance effected? </li></ul></ul></ul><ul><ul><ul><li>TCP throughput </li></ul></ul></ul><ul><ul><ul><li>Connection rates </li></ul></ul></ul><ul><ul><ul><li>Concurrent connection rates </li></ul></ul></ul><ul><ul><li>How is aggregate QoS performance compared to a sample of individual users QoE (e.g. effect on connection rate and web page download time?) </li></ul></ul>The three-way relationship between application performance, QoS settings and network load is highly complex, non-linear and very fluid, as a small increase in application traffic can have a disastrous affect on application performance.
  8. 8. Performance Issues <ul><li>Lawful interception or analysis of traffic flows will add some delay, in monitored networks excessive delay will be perceived as message infiltration. </li></ul><ul><ul><li>In much a similar manner to public services, Service Providers test & measure performance of deployed network devices to determine the impact on individual flows especially when varying individual device and network settings. </li></ul></ul><ul><li>Its necessary to test and measure performance with a mix of both legal and illegal traffic flows, especially when security monitoring technology is deployed on a network with delay sensitive services such as voice or video. </li></ul>
  9. 9. Emulate the crime <ul><li>Counter measures for most cyber based crimes and activities include the deployment of hardware and/or software solutions. </li></ul><ul><li>How do you evaluate the usefulness of next generation cyber crime mitigation technology and solutions? </li></ul>Stateful traffic Emulation – the representation of real traffic flows and user activities!
  10. 10. Per flow Challenge <ul><li>DPI / DLP/ IDP security devices are sophisticated and can quickly learn traffic flows and patterns therefore the traffic used in testing must have unique properties on each of the layers in the OSI model. </li></ul><ul><li>Essential to test with large volumes of unique flows and attachments. A key response is the ability to correctly identify the illegal attachment or content. In the example of email and/or content sharing websites - </li></ul><ul><ul><li>Emails usually contain unique address identifiers and the majority of attachments are legal. </li></ul></ul><ul><ul><li>Majority of uploads to web sharing sites are unique and legal. </li></ul></ul><ul><li>Test false positive/negatives by identifying when the system has incorrectly identified a flow. Out of the thousands of emails, upload, download requests can the one illegal file be spotted? </li></ul>Out of the 1,000,000s of daily emails / uploads, can the security system identify the one possible illegal flow with an illegal attachment correctly?
  11. 11. Attack the stack <ul><li>The majority of visible threats such as DDoS utilize or exploit known vulnerabilities with the IP packet, TCP stack or applications. </li></ul><ul><ul><li>When examining for vulnerabilities, its essential to include attack options: </li></ul></ul><ul><ul><ul><li>SYN Flood - floods a specific IP Address with SYN packets. </li></ul></ul></ul><ul><ul><ul><li>RESET Flood -floods a specific IP Address with RESET packets. </li></ul></ul></ul><ul><ul><ul><li>UDP Flood - floods a specific IP Address with UDP datagrams. </li></ul></ul></ul><ul><ul><ul><li>Ping Flood - floods a specific IP Address with ICMP echo request (ping) packets. </li></ul></ul></ul><ul><ul><ul><li>ARP Flood - floods the subnet with requests for a specific IP Address. </li></ul></ul></ul><ul><ul><ul><li>Ping of Death - sends ICMP echo requests to the specified IP Address. </li></ul></ul></ul><ul><ul><ul><li>Teardrop Attack - sends a UDP datagram in 2 IP fragments to the specified IP Address. </li></ul></ul></ul><ul><ul><ul><li>Reflective SYN Flood - sends a flood of SYN packets (i.e. TCP connection requests). </li></ul></ul></ul><ul><ul><ul><li>UDP Fragmentation Attack - sends a single IP fragment that contains part of a UDP datagram to the specified IP Address. </li></ul></ul></ul><ul><li>When considering a solution for testing security mitigation devices, it’s essential to consider if the solution offers a fully compliant TCP stack. </li></ul><ul><ul><li>It’s essential to quickly develop new test strategies in the face of new threats. </li></ul></ul>
  12. 12. Test for the Invisible <ul><li>Steganography is real and tools are freely available from the web. </li></ul><ul><li>Generate stega-files with hidden data. In testing performance emulate thousands of flows of email and web requests with attachments include a single stega-file, determine if attachment is identified correctly by steganalysis tools. </li></ul><ul><li>Use of capture tools (e.g. wireshark) to capture suspicious flows / sessions. </li></ul><ul><li>Replay capture files and conversations for more detailed analysis. </li></ul><ul><ul><li>This includes testing for correct identification of illegal conversations. </li></ul></ul>
  13. 13. diversifEye <ul><li>diversifEye emulates stateful clients with real world functionality and features (layer 2-7). </li></ul><ul><li>diversifEye may support a mix of client and/or server applications using IPv4 and/or IPv6 on a single test interface port. </li></ul><ul><li>diversifEye is used in ‘Per flow’ application emulation and performance analysis of multiple environments including : xDSL, xPON, IMS, CABLE, WiMAX & LTE </li></ul><ul><li>Capture and replay TCP, UDP (files >1Gb) </li></ul><ul><li>Fully compliant TCP stack </li></ul><ul><li>- Multicast IPTV (IGMPv1,2,3 & MLDv1,2) </li></ul><ul><li>- Video On Demand (RTSP, trick play, SIP or HTTP enabled RTSP) </li></ul><ul><li>- Voice over IP (SIP/RTP, Multimedia, Dual hosted, Nat Traversal) </li></ul><ul><li>- Voice and Video Media Analysis </li></ul><ul><li>(both no reference TVQM/R factor and full reference PEVQ/PESQ) </li></ul><ul><li>- HTTP (Client and/or Server, POST supports file attachments) </li></ul><ul><li>- SMTP & POP3 (Client and/or Server, per client unique messaging) </li></ul><ul><li>- P2P ( with or without signatures) </li></ul><ul><li>- DHCPv4,6 (client and/or server, configurable Options) </li></ul><ul><li>Service Layer PPPoE and VLAN (incl. double tagged) </li></ul><ul><li>TWAMP (Client/Sender and/or Server/Responder) </li></ul><ul><li>- Secure Media (TLS/SSL, X509 cert., CA) </li></ul><ul><li>- PPPoE (client and/or server, PAP/CHAP) </li></ul><ul><li>- Security Attacks with DDoS(SYN/RST/UDP/ARP floods) and Virus/Worm Attacks </li></ul><ul><li>- FTP (passive and active, full command set) </li></ul><ul><li>- RTP (media only) </li></ul><ul><li>- SIP with multiple RTP streams </li></ul><ul><li>- Per Application QoS (DSCP/ToS) </li></ul>Sample features Overview
  14. 14. Thank You! Award Winning Test & Monitoring Solutions Industry Associations
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×