SlideShare a Scribd company logo
1 of 61
Download to read offline
IDSECCONF 2016
Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI
Mario Marcello, Mkom, BEng
24 Sep 2016 | UIN Maulana Malik Ibrahim | Malang, Indonesia
Sistem Pemantauan Ancaman
Serangan Siber di Indonesia
Generasi Baru
Agenda
• About Honeynet
• Indonesia Honeynet Project
• The Threat Intelligence
• The New Generation Threat Intelligence
• Research & Publications
• Statistics
• Conclusion
Introduction to Honeynet
About Honeynet
• Volunteer open source computer security
research organization since 1999 (US 501c3
non-profit)
• Mission: ¨learn the tools, tactics and motives
involved in computer and network attacks,
and share the lessons learned¨ -
http://www.honeynet.org
About Indonesia Honeynet Project
• Mycert introduces honeypot in OIC-CERT in
2009
• Explore honeypot in 2010, due to students’
interest in learning data mining on:
– Cyber terrorism
– Malware behavior
• Cecil (Singapore Chapter lead) introduced us
to Honeynet global
About Indonesia Honeynet Project
• 15 passionate security
professionals, academicians
and government officials
met signed a petition in 25
November 2011
• Indonesia Chapter officially
recognized 9 January 2012
• Current members: 178 (25
active members)
About Indonesia Honeynet Project
About Indonesia Honeynet Project
• Attended Honeynet Workshop 2012
• With support from KOMINFO, we conducted
yearly seminar and workshops
– Focus on Security Awareness and Security Research
• Honeynet communities: Jakarta, Semarang,
Surabaya, Yogya, Denpasar, Palembang,
Lampung
• Research Topics: Incident handling,
Vulnerability Analysis, Malware, Digital
Forensics, Penetration Testing, Threats
Intelligence
About Indonesia Honeynet Project
Honeynet Seminar & Workshop | 10-11 Juni 2015 | Lampung, Indonesia
About Indonesia Honeynet Project
Incident Response & Analysis Challenge | 24 Aug 2015 | Jakarta, Indonesia
Honeypots Research & Deployment
2009 2011 2013 2015
Learning
Period
Early
Period
Growing
Period
Expanding
Period
Honeypot:
Nepenthes
Honeypot:
Nepenthes, Dionaea
Honeypot:
Dionaea
Honeypot:
Dionaea, Kippo,
Glastopf, Honeytrap
Learning How to
install and configure
Deployed 1st
Honeypot in SGU
Target: Academic,
Government, ISP
Coverage: Java, Bali,
Sumatera,
# Honeypots
deployed: None
# Honeypots
deployed: 1
# Honeypots
deployed: 5
# Honeypots
deployed: 20
Hardware: Client Hardware: Simple
Client and Server
Hardware: Mini PC
and Server
Hardware:
Raspberry Pi and
Dedicated servers
List of contributors
• Amien H.R.
• Randy Anthony
• Michael
• Stewart
• Glenn
• Mario Marcello
• Joshua Tommy
• Andrew Japar
• Christiandi
• Kevin Kurniawan
The Threat Intelligence
What is Darknets?
Darknet – portion of routed, allocated IP
space in which no active servers reside.
— Team CYMRU
What is Darknets?
Livenet Darknet
Live IP Address (used) Unused IPs
Darknets and Honeypots
Goal
• To understand cyber activities in our
institutions in Indonesia (Government,
Education and Industry)
How
• Honeypot servers put in the unused IP address
across the above organizations
First Step – Distributing Sensors
Mini PC Raspberry Pi
First Step – Collecting sensors’ data
Repository Server
Raspberry Pi
Raspberry Pi
Raspberry Pi
Second Step – Analysis
Repository
Server
Analysis
Server
Raspberry Pi
Raspberry Pi
Raspberry Pi
Third Step – User Experience
Repository
Server
Analysis
Server
Web
Server
USERSRaspberry Pi
Raspberry Pi
Raspberry Pi
Honeypots Implemented
• Dionaea – capturing attack patterns and
malware involved via port 21, 42, 69, 80, 135,
445, 1433, 3306 dan 5060 & 5061
• Glastopf – capturing attack pattern on web
application attacked
• Kippo – capturing traffic pattern on SSH port
• Honeytrap – capturing other misc. ports not
captured above
Why not IDS? Why Honeypots?
IDS
HONEYPOT
A
T
T
A
C
K
S
Detection based
on
KNOWN ATTACK
rules
Record ALL attacks
directed toward
the monitored IP
add
UNKNOWN
ATTACK
Current Architecture
Repository
Server
Analysis
Server
Web Server
+ Web Service
USERS
Pots
Pots
Pots
The New Generation
Threat Intelligence
New Data Source
Repository
Server
Analysis
Server
USERS
System
Logs
DNS
Traffic Log
Pots
Web Server
+ Web Service
MALWARE ANALYSIS
ENGINE
New Analysis Engine
Static Dynamic
Risk
Scoring
Reverse Engineer
Malware code
To find “hidden”
code
Run Malware
In a sandbox; dump
malware code
Provide Risk Score
based on the static
& behavior analysis
DNS TRAFFIC
ANALYSIS
DNS Analysis Target
Domain
Botnet
Anomaly
Extract Malicious Domain
from the DNS traffic
captured
Identifying Botnet from
Domain names Botnet
visited
Identify anomaly traffic
from DNS traffic
Architecture DNS Traffic Analysis
Attack Connection Analysis
ATTACK
CONNECTION
ANALYSIS
Domain/IP
Analysis
Traffic Pattern
Analysis
Produce
Malicious Domain List
(Publicly usable)
New Knowledge on
Attack pattern
New Generation Capabilities
• Dynamic Analysis (with Static Analysis) using
Binary Instrumentation to obtain critical
malware hidden code
• Risk Scoring on malware captured
• Malware Domain List based on DNS traffic and
Attack Traffic to Honeypots
• Traffic Attack Pattern knowledge
Some Statistics
Our Contribution
Our Contribution
Attacker Statistics: Attacker IP, Malware, Targeted Ports, Provinces attacked
Our Contribution
Attacker Statistics: Attacker IP, Malware, Targeted Ports, Provinces attacked
Our Statistics
Our Statistics
Our Statistics (malware found)
Our Statistics
Our Statistics
Our Statistics
Our Statistics (other malware)
2013 2014
Virus naming by AhnLab-V3 (Virustotal)
Our Statistics (other malware)
2015 2016
Virus naming by AhnLab-V3 (Virustotal)
More Statistics
More Statistics
More Statistics
More Statistics
More Statistics
More Statistics (who are they?)
More Statistics (who are they?)
More Statistics (who are they?)
More Statistics (who are they?)
Research & Publications
Our Research & Publications
Malware | Data Mining | Behavior Analysis | Cyber Terrorism
Other Research
Second Hand USB Forensics and Publications
Mapping Research Roadmap
Deception Technology | Malware | Data Mining | Cyber Crime
Deception
Technology
Malware
Data Mining Cyber Crime
Tools
Join Us
• http://www.ihpcon.id
• Indonesia Honeynet Project
• idhoneynet
• http://www.honeynet.or.id
• http://groups.google.com/group/id-honeynet
Related Publications
• Joshua Tommy Juwono, Charles Lim, Alva Erwin, A Comparative Study
of Behavior Analysis Sandboxes in Malware Detection, The 3rd
International Conference on New Media 2015, Jakarta, Indonesia, 2015
• Charles Lim, Nicsen, Mal-EVE Static Detection Model for Evasive
Malware, 10th EAI International Conference on Communications and
Networking in China, Shanghai, China, 2015
• Charles Lim, Darryl Y. Sulistyan, Suryadi, and Kalamullah Ramli,
Experiences in Instrumented Binary Analysis for Malware, The 3rd
International Conference on Internet Services Technology and
Information Engineering 2015 (ISTIE 2015), Bali, 2015
• Charles Lim, Meily, Nicsen, and Herry Ahmadi, Forensics Analysis of USB
Flash Drives in Educational Environment, The 8th International
Conference on Information & Communication Technology and Systems,
Surabaya, 2014
• Charles Lim, and Kalamullah Ramli, Mal-ONE: A Unified Framework for
Fast and Efficient Malware Detection, 2014 2nd International
Conference on Technology, Informatics, Management, Engineering &
Environment, Bandung, 2014.
Call for Research Collaboration
• Research Champion for each university
• Research collaboration across different
universities to foster rapid research growth
in Cyber security
• Generate more research publications ==>
easier to get funding for research as well
Our Partners
THANK YOU
Ministry of Communication and Informatics of
Republic of Indonesia
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Related Content

What's hot

Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsInvincea, Inc.
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingAPNIC
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseLuca Simonelli
 
SplunkLive! Philadelphia - University of Scranton
SplunkLive! Philadelphia - University of ScrantonSplunkLive! Philadelphia - University of Scranton
SplunkLive! Philadelphia - University of ScrantonSplunk
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Andrew Morris
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)Lacoon Mobile Security
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architectureamar koppal
 
Managing Security with Splunk Enterprise
Managing Security with Splunk EnterpriseManaging Security with Splunk Enterprise
Managing Security with Splunk EnterpriseSplunk
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Sean Whalen
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
SplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – VirtustreamSplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – VirtustreamSplunk
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...RootedCON
 

What's hot (20)

Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Hacking
HackingHacking
Hacking
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
 
SplunkLive! Philadelphia - University of Scranton
SplunkLive! Philadelphia - University of ScrantonSplunkLive! Philadelphia - University of Scranton
SplunkLive! Philadelphia - University of Scranton
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architecture
 
Managing Security with Splunk Enterprise
Managing Security with Splunk EnterpriseManaging Security with Splunk Enterprise
Managing Security with Splunk Enterprise
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
SplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – VirtustreamSplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – Virtustream
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 

Viewers also liked

2014-11-04 Fraud Risk Assessment - The Human Element
2014-11-04 Fraud Risk Assessment - The Human Element2014-11-04 Fraud Risk Assessment - The Human Element
2014-11-04 Fraud Risk Assessment - The Human ElementRaffa Learning Community
 
Case Study - financial statement fraud
Case Study - financial statement fraudCase Study - financial statement fraud
Case Study - financial statement fraudVidhan Shah
 
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSIBUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSIReformasi Polri
 
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilienceID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilienceIGF Indonesia
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkIGF Indonesia
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBERIGN MANTRA
 
5.2.5 sending fraud templates
5.2.5 sending fraud templates5.2.5 sending fraud templates
5.2.5 sending fraud templatesFrankSobotka
 
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi MultilateralID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi MultilateralIGF Indonesia
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsPT Datacomm Diangraha
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 
The indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internetThe indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internetCharles Lim
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
 
Fraud risk assessment
Fraud risk assessmentFraud risk assessment
Fraud risk assessmentcstovall69
 
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalIGF Indonesia
 
Kedaulatan informasi menuju indonesia emas 2045
Kedaulatan informasi menuju indonesia emas 2045Kedaulatan informasi menuju indonesia emas 2045
Kedaulatan informasi menuju indonesia emas 2045Yudhistira Nugraha
 

Viewers also liked (20)

Borobudur 11
Borobudur 11Borobudur 11
Borobudur 11
 
Turning an idea into impact
Turning an idea into impactTurning an idea into impact
Turning an idea into impact
 
2014-11-04 Fraud Risk Assessment - The Human Element
2014-11-04 Fraud Risk Assessment - The Human Element2014-11-04 Fraud Risk Assessment - The Human Element
2014-11-04 Fraud Risk Assessment - The Human Element
 
Case Study - financial statement fraud
Case Study - financial statement fraudCase Study - financial statement fraud
Case Study - financial statement fraud
 
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSIBUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
 
Anti Fraud
Anti FraudAnti Fraud
Anti Fraud
 
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilienceID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
 
5.2.5 sending fraud templates
5.2.5 sending fraud templates5.2.5 sending fraud templates
5.2.5 sending fraud templates
 
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi MultilateralID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of Things
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
The indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internetThe indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internet
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
 
Fraud risk assessment
Fraud risk assessmentFraud risk assessment
Fraud risk assessment
 
Doc procurement anti fraud and anti-corruption
Doc procurement anti fraud and anti-corruptionDoc procurement anti fraud and anti-corruption
Doc procurement anti fraud and anti-corruption
 
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
 
Kedaulatan informasi menuju indonesia emas 2045
Kedaulatan informasi menuju indonesia emas 2045Kedaulatan informasi menuju indonesia emas 2045
Kedaulatan informasi menuju indonesia emas 2045
 

Similar to Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Agora Group
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercisesisc2-hellenic
 
INTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptxINTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptxPrasad92810
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunk
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfBecky Burwell
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.pptDetSersi
 
The Honeynet Project Introduction
The Honeynet Project IntroductionThe Honeynet Project Introduction
The Honeynet Project IntroductionJulia Yu-Chin Cheng
 
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]Interset
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]Interset
 

Similar to Sistem pemantauan ancaman serangan siber di indonesia generasi baru public (20)

Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Honey pots
Honey potsHoney pots
Honey pots
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
INTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptxINTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptx
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdf
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
The Honeynet Project Introduction
The Honeynet Project IntroductionThe Honeynet Project Introduction
The Honeynet Project Introduction
 
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
 
Honeypots.ppt
Honeypots.pptHoneypots.ppt
Honeypots.ppt
 

Recently uploaded

办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 

Recently uploaded (20)

办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 

Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

  • 1. IDSECCONF 2016 Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI Mario Marcello, Mkom, BEng 24 Sep 2016 | UIN Maulana Malik Ibrahim | Malang, Indonesia Sistem Pemantauan Ancaman Serangan Siber di Indonesia Generasi Baru
  • 2. Agenda • About Honeynet • Indonesia Honeynet Project • The Threat Intelligence • The New Generation Threat Intelligence • Research & Publications • Statistics • Conclusion
  • 4. About Honeynet • Volunteer open source computer security research organization since 1999 (US 501c3 non-profit) • Mission: ¨learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned¨ - http://www.honeynet.org
  • 5. About Indonesia Honeynet Project • Mycert introduces honeypot in OIC-CERT in 2009 • Explore honeypot in 2010, due to students’ interest in learning data mining on: – Cyber terrorism – Malware behavior • Cecil (Singapore Chapter lead) introduced us to Honeynet global
  • 6. About Indonesia Honeynet Project • 15 passionate security professionals, academicians and government officials met signed a petition in 25 November 2011 • Indonesia Chapter officially recognized 9 January 2012 • Current members: 178 (25 active members)
  • 8. About Indonesia Honeynet Project • Attended Honeynet Workshop 2012 • With support from KOMINFO, we conducted yearly seminar and workshops – Focus on Security Awareness and Security Research • Honeynet communities: Jakarta, Semarang, Surabaya, Yogya, Denpasar, Palembang, Lampung • Research Topics: Incident handling, Vulnerability Analysis, Malware, Digital Forensics, Penetration Testing, Threats Intelligence
  • 9. About Indonesia Honeynet Project Honeynet Seminar & Workshop | 10-11 Juni 2015 | Lampung, Indonesia
  • 10. About Indonesia Honeynet Project Incident Response & Analysis Challenge | 24 Aug 2015 | Jakarta, Indonesia
  • 11. Honeypots Research & Deployment 2009 2011 2013 2015 Learning Period Early Period Growing Period Expanding Period Honeypot: Nepenthes Honeypot: Nepenthes, Dionaea Honeypot: Dionaea Honeypot: Dionaea, Kippo, Glastopf, Honeytrap Learning How to install and configure Deployed 1st Honeypot in SGU Target: Academic, Government, ISP Coverage: Java, Bali, Sumatera, # Honeypots deployed: None # Honeypots deployed: 1 # Honeypots deployed: 5 # Honeypots deployed: 20 Hardware: Client Hardware: Simple Client and Server Hardware: Mini PC and Server Hardware: Raspberry Pi and Dedicated servers
  • 12. List of contributors • Amien H.R. • Randy Anthony • Michael • Stewart • Glenn • Mario Marcello • Joshua Tommy • Andrew Japar • Christiandi • Kevin Kurniawan
  • 14. What is Darknets? Darknet – portion of routed, allocated IP space in which no active servers reside. — Team CYMRU
  • 15. What is Darknets? Livenet Darknet Live IP Address (used) Unused IPs
  • 16. Darknets and Honeypots Goal • To understand cyber activities in our institutions in Indonesia (Government, Education and Industry) How • Honeypot servers put in the unused IP address across the above organizations
  • 17. First Step – Distributing Sensors Mini PC Raspberry Pi
  • 18. First Step – Collecting sensors’ data Repository Server Raspberry Pi Raspberry Pi Raspberry Pi
  • 19. Second Step – Analysis Repository Server Analysis Server Raspberry Pi Raspberry Pi Raspberry Pi
  • 20. Third Step – User Experience Repository Server Analysis Server Web Server USERSRaspberry Pi Raspberry Pi Raspberry Pi
  • 21. Honeypots Implemented • Dionaea – capturing attack patterns and malware involved via port 21, 42, 69, 80, 135, 445, 1433, 3306 dan 5060 & 5061 • Glastopf – capturing attack pattern on web application attacked • Kippo – capturing traffic pattern on SSH port • Honeytrap – capturing other misc. ports not captured above
  • 22. Why not IDS? Why Honeypots? IDS HONEYPOT A T T A C K S Detection based on KNOWN ATTACK rules Record ALL attacks directed toward the monitored IP add UNKNOWN ATTACK
  • 26. MALWARE ANALYSIS ENGINE New Analysis Engine Static Dynamic Risk Scoring Reverse Engineer Malware code To find “hidden” code Run Malware In a sandbox; dump malware code Provide Risk Score based on the static & behavior analysis
  • 27. DNS TRAFFIC ANALYSIS DNS Analysis Target Domain Botnet Anomaly Extract Malicious Domain from the DNS traffic captured Identifying Botnet from Domain names Botnet visited Identify anomaly traffic from DNS traffic
  • 29. Attack Connection Analysis ATTACK CONNECTION ANALYSIS Domain/IP Analysis Traffic Pattern Analysis Produce Malicious Domain List (Publicly usable) New Knowledge on Attack pattern
  • 30. New Generation Capabilities • Dynamic Analysis (with Static Analysis) using Binary Instrumentation to obtain critical malware hidden code • Risk Scoring on malware captured • Malware Domain List based on DNS traffic and Attack Traffic to Honeypots • Traffic Attack Pattern knowledge
  • 33. Our Contribution Attacker Statistics: Attacker IP, Malware, Targeted Ports, Provinces attacked
  • 34. Our Contribution Attacker Statistics: Attacker IP, Malware, Targeted Ports, Provinces attacked
  • 41. Our Statistics (other malware) 2013 2014 Virus naming by AhnLab-V3 (Virustotal)
  • 42. Our Statistics (other malware) 2015 2016 Virus naming by AhnLab-V3 (Virustotal)
  • 48. More Statistics (who are they?)
  • 49. More Statistics (who are they?)
  • 50. More Statistics (who are they?)
  • 51. More Statistics (who are they?)
  • 53. Our Research & Publications Malware | Data Mining | Behavior Analysis | Cyber Terrorism
  • 54. Other Research Second Hand USB Forensics and Publications
  • 55. Mapping Research Roadmap Deception Technology | Malware | Data Mining | Cyber Crime Deception Technology Malware Data Mining Cyber Crime Tools
  • 56. Join Us • http://www.ihpcon.id • Indonesia Honeynet Project • idhoneynet • http://www.honeynet.or.id • http://groups.google.com/group/id-honeynet
  • 57. Related Publications • Joshua Tommy Juwono, Charles Lim, Alva Erwin, A Comparative Study of Behavior Analysis Sandboxes in Malware Detection, The 3rd International Conference on New Media 2015, Jakarta, Indonesia, 2015 • Charles Lim, Nicsen, Mal-EVE Static Detection Model for Evasive Malware, 10th EAI International Conference on Communications and Networking in China, Shanghai, China, 2015 • Charles Lim, Darryl Y. Sulistyan, Suryadi, and Kalamullah Ramli, Experiences in Instrumented Binary Analysis for Malware, The 3rd International Conference on Internet Services Technology and Information Engineering 2015 (ISTIE 2015), Bali, 2015 • Charles Lim, Meily, Nicsen, and Herry Ahmadi, Forensics Analysis of USB Flash Drives in Educational Environment, The 8th International Conference on Information & Communication Technology and Systems, Surabaya, 2014 • Charles Lim, and Kalamullah Ramli, Mal-ONE: A Unified Framework for Fast and Efficient Malware Detection, 2014 2nd International Conference on Technology, Informatics, Management, Engineering & Environment, Bandung, 2014.
  • 58. Call for Research Collaboration • Research Champion for each university • Research collaboration across different universities to foster rapid research growth in Cyber security • Generate more research publications ==> easier to get funding for research as well
  • 60. THANK YOU Ministry of Communication and Informatics of Republic of Indonesia