SlideShare a Scribd company logo
1 of 60
The Evolution of Network Security:
How Networks Are Still Getting Hacked
Omar Santos, PSIRT - Security Research and Operations
os@cisco.com




                                                        1
DO YOU REMEMBER?




                   2
… it was so easy “back in the day”…




                                      3
SIMPLE NETWORKS

                  4
BECAME BIGGER   5
AND BIGGER   6
AND BIGGER   7
…and then we got “virtualized”




                                 8
9
10
…and then we got “many clouds”




                                 11
12
13
14
…WHAT ELSE IS CHANGING?




                          15
social media
  marketer                     big data
                              scientists




3 rd   Degree Black Belt Security Ninja
              Cyber Warrior
                                           16
…we all know about BYOD




                          17
Modern workers—
          particularly young
    “Millennials”—want the
freedom to browse the web
    not only when and how
 they want to, but also with
   the devices they choose.



                               18
…What ELSE?




              19
EVERYTHING WILL BE CONNECTED




                               20
…the ANY to ANY dilemma:
• People to Machine
• Machine to Machine
• People to People
• From Any Device
• From Any Location
• At Any Time
• Data from Any Data Center
  and from Any Cloud




                              23
…but in this new “trend” I am not only talking
about these




                                                 24
…but in this new “trend” I am not only talking
about these




                                                 25
26
Meters pre-configured              Objective Function   DAO advertises IPv6
with Utility Network (SSID)          Rank = Minimum ETX    address of meter and
  X.509 Cert, EUI-64 ID                (pre-configured)          parents

                           802.15.4 Rx Signal                                 Meters only maintain
                        Strength Indicator used to                           default route to DODAG
                               qualify ETX                                             root




            DHCPv6 Client used for
           address autoconfiguration

                                                                                      RPL in non-storing mode
                               DHCPv6 Relay function                                   Root generates source
                                passes all requests to                                  routes when needed
                                 FAR (DODAG root)
                                                                  DHCPv6 requests passed
                                                                     to DHCP server

                                                                   RPL run-time parameters
                                                                  configured at DODAG root
                                                                     using DIO message
28
29
30
…AND THERE IS SDN




                    31
Basic Definitions

       What Is Software Defined Network (SDN)?                                  What Is OpenFlow?

 “…In the SDN architecture, the control and data planes are   “…open standard that enables researchers
 decoupled, network intelligence and state are logically      to run experimental protocols in campus networks. Provides
 centralized, and the underlying network infrastructure is    standard hook for researchers to run experiments, without
 abstracted from the applications…”                           exposing internal working of vendor devices…”



                       Source: www.opennetworking.org                                Source: www.opennetworking.org



                  What is OpenStack?                                      What is Overlay Network?

 Opensource software for building public                      Overlay network is created on existing network infrastructure
 and private Clouds; includes Compute (Nova), Networking      (physical and/or virtual) using a network protocol. Examples of
 (Quantum) and Storage (Swift) services.                      overlay network protocol are: MPLS, LISP, OTV and VXLAN


                            Source: www.openstack.org
In an SDN network, the controller could
 potentially be seen as a single point of
       failure risk for the network.

 If the controller is attacked, the entire
network it controls is potentially at risk.




                                              33
34
35
Cloud
 Internet of Everything
                          Identity

                                                    Privacy
    Social Media                          APT


                          Mobility               BYOD
 Advanced Malware

                               Big Data
Next Gen Data Centers                           Social Engineering



                                                                     36
Video
                                             Cloud                                          Data Center
                                                                                            Consolidation
                                                              Service
                               Campus
Mobility/                                                    Provider                       Virtualization
  BYOD                                                                                      & Cloud

               Branch                                                                       Business Continuity
Security
                                                                                            Disaster Recovery
                                                                              Data Center




                 CAPACITY                COMPLEXITY                               COST
              “Do I have the right      “How do I simplify              “How can I be operationally
            performance to scale?”       deployments?”                         efficient?”


     The IT Management Challenge: “Is My Network Ready?
Video
                                                                                     Cloud                                          Data Center
                                                                                                                                    Consolidation
                                                                                                      Service
                                                                       Campus
                            Mobility/                                                                Provider                       Virtualization
                              BYOD                                                                                                  & Cloud

                                                           Branch                                                                   Business Continuity
                             Security
                                                                                                                                    Disaster Recovery
                                                                                                                      Data Center




                                                            CAPACITY             COMPLEXITY                               COST
                                                  “Do I have the right          “How do I simplify              “How can I be operationally
                                                performance to scale?”           deployments?”                         efficient?”


                                            The Security Staff Challenge: “Is My Network Secure?
© 2012 Cisco and/or its affiliates. All rights reserved.                                                                                         Cisco Confidential   38
Source: Cisco’s Annual Security Report




                                         39
HOW CAN I BECOME MORE EFFICIENT
                  AUTOMATION?



                                  40
Security Automation Evolution
  The perception of the security automation evolution




                                                                      Robust support for relevant
                                         Security Automation        standards to ensure multi-layer
                                     interoperability / standards          interoperability
          CLOSED SOLUTIONS             EVOLVING MATURITY                MATURE IMPLEMENTATIONS


PAST                                                                                             FUTURE



                             WE ARE ABOUT HERE
Vulnerability Machine Readable Content
 Cisco is committed to protect customers by sharing critical security-related
 information in different formats.

   OVAL: Cisco IOS Vulnerability Assessment            Common Vulnerability Reporting
   • Cisco PSIRT is including Open Vulnerability and   Framework (CVRF)
     Assessment Language (OVAL) definitions in         • In addition to OVAL definitions, PSIRT is
     Cisco IOS security advisories.                       also publishing CVRF content for all Cisco
   • OVAL provides a structured and standard              security advisories.
     machine-readable content that allows              • CVRF allows vendors to publish security
     customers to quickly consume security                advisories in an XML (machine-readable)
     vulnerability information and identify affected      format.
     devices.                                          • CVRF has been designed by the Industry
   • OVAL can also be used to verify that the             Consortium for Advancement of Security
     patches or fixes that resolve such                   on the Internet (ICASI), of which Cisco is a
     vulnerabilities were successfully installed.         member and took a major role in its
   • OVAL content can be downloaded from each             development.
     Cisco IOS security advisories
Top Android Malware Types

        Android malware encounters grew 2,577%
        over 2012
        However, mobile malware only makes up a
        small percentage of total web malware
        encounters.




Source: Cisco’s Annual Security Report
                                                  43
Monthly Major Content Types
       2012




Source: Cisco’s Annual Security Report
                                         44
Exploit “Content Types”
       2012




Source: Cisco’s Annual Security Report
                                         45
http://eromang.zataz.com/uploads/oracle-java-exploits-0days-timeline.html   46
New or Old Attacks?




                      47
RED OCTOBER (aka ROCRA)
                  Large-scale cyber espionage campaign discovered by
                  researchers from Kaspersky Lab.

                  Very clever attacks that many are now claiming have been
                  taking place for more than five years!

                  Compared with other malware that has been associated with
                  cyber espionage such as Duqu, Flame, and Gauss.



http://blogs.cisco.com/security/red-october-in-january-the-cyber-espionage-era   48
RED OCTOBER (aka ROCRA)


Some of the Vulns:
CVE-2009-3129 -- Microsoft Office Excel Featheader Record Processing Arbitrary Code Execution
CVE-2010-3333 - Microsoft Office Rich Text Format Content Processing Buffer Overflow
CVE-2012-0158 - Microsoft MSCOMCTL.OCX ActiveX Control Remote Code Execution
CVE-2011-3544 - Oracle Java Applet Rhino Script Engine arbitrary code execution vulnerability

Network Device Configuration Harvesting
Malware contained a large list of hardcoded commonly-used SNMP community strings that were
used to attack infrastructure devices.
+ credential information collected from Word and Excel Documents on affected systems
                                                                                                49
Just one example: OPERATION ABABIL
Huge DDoS attack (volumetrics) campaign which was aimed at U.S.-based
financial institutions.
                                                                        50
“Weaponization” of
Modern Evasion
Techniques




                     51
ANY GOOD NEWS?




WHY DID I COME TO THIS
TRIANGLE BDPA MEETING
                         52
Well, SPAM traffic went down
last year… Does that count?



                               53
It’s still a good tool for many
cybercriminals to expose
users to malware and
facilitate a wide range of
scams.




                                  54
EVEN OUR VULN REPORT
DATABASES GET PWNED!



                       55
56
Go Back!
We failed when we tried to fix
       cyber security!




                                 Cyber Security




                                                  57
SO HOW CAN WE IMPROVE?




                         58
Sharing Ideas & Brainstorming




                                59
THANK YOU!




             60

More Related Content

What's hot

Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environmentdeepers
 
Cloud computing
Cloud computingCloud computing
Cloud computingsaralaanuj
 
Virtualizing network services
Virtualizing network servicesVirtualizing network services
Virtualizing network servicesBootcamp SCL
 
OMG DDS Tutorial - Part I
OMG DDS Tutorial - Part IOMG DDS Tutorial - Part I
OMG DDS Tutorial - Part IAngelo Corsaro
 
Scalability and Availability - Without Compromise
Scalability and Availability - Without CompromiseScalability and Availability - Without Compromise
Scalability and Availability - Without CompromiseBjorn Andersson
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012Cisco Public Relations
 
Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms IJORCS
 
Presidio Data Center Practice Overview
Presidio Data Center Practice OverviewPresidio Data Center Practice Overview
Presidio Data Center Practice Overviewjdinneen
 
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...Prolifics
 
Lenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYODLenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYODLenovo Education
 
Cloud Computing: usos e tendências
Cloud Computing: usos e tendênciasCloud Computing: usos e tendências
Cloud Computing: usos e tendênciasCezar Taurion
 
Open Cloud System Networking Vision
Open Cloud System Networking VisionOpen Cloud System Networking Vision
Open Cloud System Networking VisionRandy Bias
 
20090921 Risacher To Ncoic Cloud Storefront
20090921 Risacher To Ncoic Cloud Storefront20090921 Risacher To Ncoic Cloud Storefront
20090921 Risacher To Ncoic Cloud StorefrontGovCloud Network
 
Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)Gerardo Pardo-Castellote
 
Introducing the OMG DDS to the Aerospace Valley
Introducing the OMG DDS to the Aerospace Valley Introducing the OMG DDS to the Aerospace Valley
Introducing the OMG DDS to the Aerospace Valley Angelo Corsaro
 

What's hot (20)

Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualizing network services
Virtualizing network servicesVirtualizing network services
Virtualizing network services
 
OMG DDS Tutorial - Part I
OMG DDS Tutorial - Part IOMG DDS Tutorial - Part I
OMG DDS Tutorial - Part I
 
Scalability and Availability - Without Compromise
Scalability and Availability - Without CompromiseScalability and Availability - Without Compromise
Scalability and Availability - Without Compromise
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
 
Lonza
Lonza Lonza
Lonza
 
Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms
 
Presidio Data Center Practice Overview
Presidio Data Center Practice OverviewPresidio Data Center Practice Overview
Presidio Data Center Practice Overview
 
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
 
Cloud Bound
Cloud Bound Cloud Bound
Cloud Bound
 
Lenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYODLenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYOD
 
Cloud Computing: usos e tendências
Cloud Computing: usos e tendênciasCloud Computing: usos e tendências
Cloud Computing: usos e tendências
 
UML Profile for DDS
UML Profile for DDSUML Profile for DDS
UML Profile for DDS
 
Open Cloud System Networking Vision
Open Cloud System Networking VisionOpen Cloud System Networking Vision
Open Cloud System Networking Vision
 
20090921 Risacher To Ncoic Cloud Storefront
20090921 Risacher To Ncoic Cloud Storefront20090921 Risacher To Ncoic Cloud Storefront
20090921 Risacher To Ncoic Cloud Storefront
 
Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)
 
Introducing the OMG DDS to the Aerospace Valley
Introducing the OMG DDS to the Aerospace Valley Introducing the OMG DDS to the Aerospace Valley
Introducing the OMG DDS to the Aerospace Valley
 
Stream 1 - Cloud Computing
Stream 1 - Cloud ComputingStream 1 - Cloud Computing
Stream 1 - Cloud Computing
 
JavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFWJavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFW
 

Viewers also liked

It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Viewers also liked (7)

It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Triangle bdpa wo vid

Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...IndicThreads
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...IndicThreads
 
Open Cloud Frameworks - Open Standards for the Cloud Community
Open Cloud Frameworks - Open Standards for the Cloud CommunityOpen Cloud Frameworks - Open Standards for the Cloud Community
Open Cloud Frameworks - Open Standards for the Cloud Communitybefreax
 
Transforming Communications Networks
Transforming Communications NetworksTransforming Communications Networks
Transforming Communications NetworksJim St. Leger
 
Nicira chef webinar-merged
Nicira chef webinar-mergedNicira chef webinar-merged
Nicira chef webinar-mergedStathy Touloumis
 
Challenges in hybrid and federated cloud computing
Challenges in hybrid and federated cloud computingChallenges in hybrid and federated cloud computing
Challenges in hybrid and federated cloud computingIgnacio M. Llorente
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828Mason Mei
 
Emerging Computing Architectures
Emerging Computing ArchitecturesEmerging Computing Architectures
Emerging Computing ArchitecturesDaniel Holmberg
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentationTelstra
 
Gef 2012 InduSoft Presentation
Gef 2012  InduSoft PresentationGef 2012  InduSoft Presentation
Gef 2012 InduSoft PresentationAVEVA
 
Pune open cloudfoundry keynote niranjan maka share
Pune open cloudfoundry keynote niranjan maka share Pune open cloudfoundry keynote niranjan maka share
Pune open cloudfoundry keynote niranjan maka share nmaka
 
Say Goodbye to DIY Data Centers
Say Goodbye to DIY Data CentersSay Goodbye to DIY Data Centers
Say Goodbye to DIY Data CentersRackspace
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the CloudSpiceworks
 
ICCT2017: A user mode implementation of filtering rule management plane using...
ICCT2017: A user mode implementation of filtering rule management plane using...ICCT2017: A user mode implementation of filtering rule management plane using...
ICCT2017: A user mode implementation of filtering rule management plane using...Ruo Ando
 

Similar to Triangle bdpa wo vid (20)

Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
Open Cloud Frameworks - Open Standards for the Cloud Community
Open Cloud Frameworks - Open Standards for the Cloud CommunityOpen Cloud Frameworks - Open Standards for the Cloud Community
Open Cloud Frameworks - Open Standards for the Cloud Community
 
Transforming Communications Networks
Transforming Communications NetworksTransforming Communications Networks
Transforming Communications Networks
 
Nicira chef webinar-merged
Nicira chef webinar-mergedNicira chef webinar-merged
Nicira chef webinar-merged
 
Challenges in hybrid and federated cloud computing
Challenges in hybrid and federated cloud computingChallenges in hybrid and federated cloud computing
Challenges in hybrid and federated cloud computing
 
Computer Port IT Solutions JNTU Lecture
Computer Port IT Solutions JNTU LectureComputer Port IT Solutions JNTU Lecture
Computer Port IT Solutions JNTU Lecture
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
 
Osac2012
Osac2012Osac2012
Osac2012
 
VOICE
VOICEVOICE
VOICE
 
Emerging Computing Architectures
Emerging Computing ArchitecturesEmerging Computing Architectures
Emerging Computing Architectures
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentation
 
Gef 2012 InduSoft Presentation
Gef 2012  InduSoft PresentationGef 2012  InduSoft Presentation
Gef 2012 InduSoft Presentation
 
Pune open cloudfoundry keynote niranjan maka share
Pune open cloudfoundry keynote niranjan maka share Pune open cloudfoundry keynote niranjan maka share
Pune open cloudfoundry keynote niranjan maka share
 
Say Goodbye to DIY Data Centers
Say Goodbye to DIY Data CentersSay Goodbye to DIY Data Centers
Say Goodbye to DIY Data Centers
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the Cloud
 
ICCT2017: A user mode implementation of filtering rule management plane using...
ICCT2017: A user mode implementation of filtering rule management plane using...ICCT2017: A user mode implementation of filtering rule management plane using...
ICCT2017: A user mode implementation of filtering rule management plane using...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Triangle bdpa wo vid

  • 1. The Evolution of Network Security: How Networks Are Still Getting Hacked Omar Santos, PSIRT - Security Research and Operations os@cisco.com 1
  • 3. … it was so easy “back in the day”… 3
  • 8. …and then we got “virtualized” 8
  • 9. 9
  • 10. 10
  • 11. …and then we got “many clouds” 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. …WHAT ELSE IS CHANGING? 15
  • 16. social media marketer big data scientists 3 rd Degree Black Belt Security Ninja Cyber Warrior 16
  • 17. …we all know about BYOD 17
  • 18. Modern workers— particularly young “Millennials”—want the freedom to browse the web not only when and how they want to, but also with the devices they choose. 18
  • 20. EVERYTHING WILL BE CONNECTED 20
  • 21.
  • 22.
  • 23. …the ANY to ANY dilemma: • People to Machine • Machine to Machine • People to People • From Any Device • From Any Location • At Any Time • Data from Any Data Center and from Any Cloud 23
  • 24. …but in this new “trend” I am not only talking about these 24
  • 25. …but in this new “trend” I am not only talking about these 25
  • 26. 26
  • 27. Meters pre-configured Objective Function DAO advertises IPv6 with Utility Network (SSID) Rank = Minimum ETX address of meter and X.509 Cert, EUI-64 ID (pre-configured) parents 802.15.4 Rx Signal Meters only maintain Strength Indicator used to default route to DODAG qualify ETX root DHCPv6 Client used for address autoconfiguration RPL in non-storing mode DHCPv6 Relay function Root generates source passes all requests to routes when needed FAR (DODAG root) DHCPv6 requests passed to DHCP server RPL run-time parameters configured at DODAG root using DIO message
  • 28. 28
  • 29. 29
  • 30. 30
  • 31. …AND THERE IS SDN 31
  • 32. Basic Definitions What Is Software Defined Network (SDN)? What Is OpenFlow? “…In the SDN architecture, the control and data planes are “…open standard that enables researchers decoupled, network intelligence and state are logically to run experimental protocols in campus networks. Provides centralized, and the underlying network infrastructure is standard hook for researchers to run experiments, without abstracted from the applications…” exposing internal working of vendor devices…” Source: www.opennetworking.org Source: www.opennetworking.org What is OpenStack? What is Overlay Network? Opensource software for building public Overlay network is created on existing network infrastructure and private Clouds; includes Compute (Nova), Networking (physical and/or virtual) using a network protocol. Examples of (Quantum) and Storage (Swift) services. overlay network protocol are: MPLS, LISP, OTV and VXLAN Source: www.openstack.org
  • 33. In an SDN network, the controller could potentially be seen as a single point of failure risk for the network. If the controller is attacked, the entire network it controls is potentially at risk. 33
  • 34. 34
  • 35. 35
  • 36. Cloud Internet of Everything Identity Privacy Social Media APT Mobility BYOD Advanced Malware Big Data Next Gen Data Centers Social Engineering 36
  • 37. Video Cloud Data Center Consolidation Service Campus Mobility/ Provider Virtualization BYOD & Cloud Branch Business Continuity Security Disaster Recovery Data Center CAPACITY COMPLEXITY COST “Do I have the right “How do I simplify “How can I be operationally performance to scale?” deployments?” efficient?” The IT Management Challenge: “Is My Network Ready?
  • 38. Video Cloud Data Center Consolidation Service Campus Mobility/ Provider Virtualization BYOD & Cloud Branch Business Continuity Security Disaster Recovery Data Center CAPACITY COMPLEXITY COST “Do I have the right “How do I simplify “How can I be operationally performance to scale?” deployments?” efficient?” The Security Staff Challenge: “Is My Network Secure? © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
  • 39. Source: Cisco’s Annual Security Report 39
  • 40. HOW CAN I BECOME MORE EFFICIENT AUTOMATION? 40
  • 41. Security Automation Evolution The perception of the security automation evolution Robust support for relevant Security Automation standards to ensure multi-layer interoperability / standards interoperability CLOSED SOLUTIONS EVOLVING MATURITY MATURE IMPLEMENTATIONS PAST FUTURE WE ARE ABOUT HERE
  • 42. Vulnerability Machine Readable Content Cisco is committed to protect customers by sharing critical security-related information in different formats. OVAL: Cisco IOS Vulnerability Assessment Common Vulnerability Reporting • Cisco PSIRT is including Open Vulnerability and Framework (CVRF) Assessment Language (OVAL) definitions in • In addition to OVAL definitions, PSIRT is Cisco IOS security advisories. also publishing CVRF content for all Cisco • OVAL provides a structured and standard security advisories. machine-readable content that allows • CVRF allows vendors to publish security customers to quickly consume security advisories in an XML (machine-readable) vulnerability information and identify affected format. devices. • CVRF has been designed by the Industry • OVAL can also be used to verify that the Consortium for Advancement of Security patches or fixes that resolve such on the Internet (ICASI), of which Cisco is a vulnerabilities were successfully installed. member and took a major role in its • OVAL content can be downloaded from each development. Cisco IOS security advisories
  • 43. Top Android Malware Types Android malware encounters grew 2,577% over 2012 However, mobile malware only makes up a small percentage of total web malware encounters. Source: Cisco’s Annual Security Report 43
  • 44. Monthly Major Content Types 2012 Source: Cisco’s Annual Security Report 44
  • 45. Exploit “Content Types” 2012 Source: Cisco’s Annual Security Report 45
  • 47. New or Old Attacks? 47
  • 48. RED OCTOBER (aka ROCRA) Large-scale cyber espionage campaign discovered by researchers from Kaspersky Lab. Very clever attacks that many are now claiming have been taking place for more than five years! Compared with other malware that has been associated with cyber espionage such as Duqu, Flame, and Gauss. http://blogs.cisco.com/security/red-october-in-january-the-cyber-espionage-era 48
  • 49. RED OCTOBER (aka ROCRA) Some of the Vulns: CVE-2009-3129 -- Microsoft Office Excel Featheader Record Processing Arbitrary Code Execution CVE-2010-3333 - Microsoft Office Rich Text Format Content Processing Buffer Overflow CVE-2012-0158 - Microsoft MSCOMCTL.OCX ActiveX Control Remote Code Execution CVE-2011-3544 - Oracle Java Applet Rhino Script Engine arbitrary code execution vulnerability Network Device Configuration Harvesting Malware contained a large list of hardcoded commonly-used SNMP community strings that were used to attack infrastructure devices. + credential information collected from Word and Excel Documents on affected systems 49
  • 50. Just one example: OPERATION ABABIL Huge DDoS attack (volumetrics) campaign which was aimed at U.S.-based financial institutions. 50
  • 52. ANY GOOD NEWS? WHY DID I COME TO THIS TRIANGLE BDPA MEETING 52
  • 53. Well, SPAM traffic went down last year… Does that count? 53
  • 54. It’s still a good tool for many cybercriminals to expose users to malware and facilitate a wide range of scams. 54
  • 55. EVEN OUR VULN REPORT DATABASES GET PWNED! 55
  • 56. 56
  • 57. Go Back! We failed when we tried to fix cyber security! Cyber Security 57
  • 58. SO HOW CAN WE IMPROVE? 58
  • 59. Sharing Ideas & Brainstorming 59

Editor's Notes

  1. Public clouds, private clouds, hybrid clouds… Infrastructure as a service, PaaS, SaaS, etcetcInformation can be in any cloud at any datacenter….
  2. This is how we have changed….
  3. In the Internet of Everything, connections are what matter most. The types of connections, not the number, are what create value between people, processes, data, and things. The Internet of Everything is quickly taking shape, so the security professional needs to think about how to shift their focus from simply securing endpoints and the network perimeter…
  4. Openstack – is an open source cloud computing project started by Rackspace and NASA in 2010. The use of it is to provision cloud.It is free open source software that follows Apache License.
  5. We continue to look for points of differentiation in our markets, the network continues to play a vital role in enabling businesses to adopt new technologies and applications to help them grow. The creation of an infrastructure that is scalable, intelligent, and ready to support the demands and applications of today and tomorrow, while protecting customer investments, is essential.  They understand that the impact of some of these mega trends is not going to be silo’d but have a ripple effect across their entire organization. They have to deal with this proactively, as it can adversely impact their business. So they are looking at CAPACITY PLANNING (on their ability to maximize capacity, performance, scale, bandwidth considerations), REDUCING COMPLEXITY (i.e. not just throwing bandwidth at the problem, but being focused on driving infrastructure efficiency, making deployments more simpler , and thirdly COST REDUCTION, i.e. not just look at CAPEX, which has some benefits, but looking at lowering their TCO strongly considering cost reduction with operational efficiency. So each IT will have to understand if their network is ready for these mega trends.
  6. We continue to look for points of differentiation in our markets, the network continues to play a vital role in enabling businesses to adopt new technologies and applications to help them grow. The creation of an infrastructure that is scalable, intelligent, and ready to support the demands and applications of today and tomorrow, while protecting customer investments, is essential.  They understand that the impact of some of these mega trends is not going to be silo’d but have a ripple effect across their entire organization. They have to deal with this proactively, as it can adversely impact their business. So they are looking at CAPACITY PLANNING (on their ability to maximize capacity, performance, scale, bandwidth considerations), REDUCING COMPLEXITY (i.e. not just throwing bandwidth at the problem, but being focused on driving infrastructure efficiency, making deployments more simpler , and thirdly COST REDUCTION, i.e. not just look at CAPEX, which has some benefits, but looking at lowering their TCO strongly considering cost reduction with operational efficiency. So each IT will have to understand if their network is ready for these mega trends.
  7. Java Timelinehttp://eromang.zataz.com/uploads/oracle-java-exploits-0days-timeline.html
  8. This is not to say that actors in the shadow economy do not remain committed to creating ever-more sophisticated tools and techniques to compromise users, infect networks, and steal sensitive data, among many other goals. In 2012, however, there was a trend toward reaching back to “oldies but goodies” to find new ways to create disruption or evade enterprise security protections.
  9. Cisco Device Configuration HarvestingAdditionally, the malware in question has been observed to harvest the configurations of Cisco networking equipment. Cisco PSIRT has been in direct communication with the research team at Kaspersky and has received confirmation from them stating that the network device configuration and other information were obtained by exploiting weak Simple Network Management Protocol (SNMP) community strings and network device passwords. These attacks were not due to a known or unknown Cisco vulnerability. The malware contained a large list of hardcoded commonly-used SNMP community strings that were used to attack infrastructure devices.
  10. Cisco Device Configuration HarvestingAdditionally, the malware in question has been observed to harvest the configurations of Cisco networking equipment. Cisco PSIRT has been in direct communication with the research team at Kaspersky and has received confirmation from them stating that the network device configuration and other information were obtained by exploiting weak Simple Network Management Protocol (SNMP) community strings and network device passwords. These attacks were not due to a known or unknown Cisco vulnerability. The malware contained a large list of hardcoded commonly-used SNMP community strings that were used to attack infrastructure devices.
  11. Operation AbabilDuring September and October 2012, Cisco and Arbor Networks monitored a targeted and very serious DDoS attack campaign known as “Operation Ababil,” which was aimed at U.S.-based financial institutions.” The DDoS attacks were premeditated, focused, advertised before the fact, and executed to the letter. Attackers were able to render several major financial sites unavailable to legitimate customers for a period of minutes—and in the most severe instances, hours. Over the course of the events, several groups claimed responsibility for the attacks; at least one group purported to be protesting copyright and intellectual property legislation in the United States. Others broadcast their involvement as a response to a YouTube video offensive to some Muslims.
  12. Spam
  13. we want to make sure that our evolution does not lead into broken things... or into the wrong direction...
  14. Out of all the different security automation standards out there; which ones are you prioritizing and why?How can we (security community) increase better collaboration?For the standards/protocols that aremore “mature” (i.e., OVAL); how can we increase adoption within vendors /community?How do you currently exchange security content?