SlideShare a Scribd company logo
   Security is often seen as a technical problem
   There is a broader socio-economic view
                                   Actors
                                    ▪ Adversaries
                                    ▪ Victims
                                    ▪ Defenders
                                   Incentives/Costs
                                   Capabilities
   Key hypothesis:                Relationships

     These extrinsic factors will provide a more
     effective basis for designing security interventions   2
   Security is poised to become a big data field
     But defenses/policies need good models; good
      models need to be informed by good data
     Very poor ground truth data in security field today
   For validating hypotheses
     e.g., monetary payments are a structural
     bottleneck in all advertising-based e-crime
   For deriving hypotheses
     e.g., how important is trust establishment for
     online criminals?                                      3
   Today, the largest driver for threats is $$$
    Goods                               Click                     Bank
    Spam           FakeAV               Fraud                   Cred Theft
Advertising                                                           Theft
                                                           Banking
                Spamming                                   Trojans
                 botnets            h


                     PPI service                Phishing kits
                                  Crypters       Traffic
                        Exploit kits
                                                  sales
                            SEO
                            kits Markets VPNs
                                BP hosting


                               Infrastructure
   Today, the largest driver for threats is $$$
     Scale allows commodity monetization
   Complex value chain relationships




                                                   5
Click Trajectory study of
spam “value chain”
• Aug 1 -- Oct 31 2010
• 7 URL/Spam feeds + 5 botnet
  feeds
   • 968M URLs
  • 17M domains
• Crawled domains for 98%
  of URLs in
  • 1000s of Firefox instances
  • Large IP address diversity
• Multiple purchases from all
  major programs
• Identify bottlenecks in process
St. Kitts & Nevis

             AGBank

• Low diversity                   DnB NORD
   • 3 banks covered 95% of spam
   • Fewer banks willing handle “high-risk” merchants
• High switching cost
   • In-person account creation, due diligence, multi-day
     process
   • Upfront capital, holdback forfeiture
                                                            7
   Major initiative underway
     Undercover purchases
     Drive merchant takedown
   Appears highly
    successful



“Right now most affiliate programs have a mass of declines, cancels and pendings, and it doesn't depend
much on the program imho, there is a general sad picture, fucking Visa is burning us with napalm (for
problematic countries, it's totally fucked, on a couple of programs you're lucky if you get 50% through).”
                                                                                                             8
   Security interventions should be understood
    in their larger socio-economic context
     Don’t just plug holes; figure out which holes
      matter and why
   Empiricism and fieldwork are necessary parts
    of the solution here
     The lab setting is great, but its not a substitute for
      studying the real world


                                                               9

More Related Content

Similar to Stefan Savage Cyber Cafe

Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
 
Where Do We Go From Here?
Where Do We Go From Here?Where Do We Go From Here?
Where Do We Go From Here?
cVidya Networks
 
Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?
cVidya Networks
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
Symosis Security (Previously C-Level Security)
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
thinkwithniche
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium Partners
DAVID BERGH
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
Jason Clark
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
 
Information Security
Information SecurityInformation Security
Information Security
trunko
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
Starttech Ventures
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
TME0212-49
TME0212-49TME0212-49
TME0212-49
Bill Mitchell
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Xeneta
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05
BookStoreLib
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
Sarah Jarvis
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
Seqrite
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
Domenico Catalano
 

Similar to Stefan Savage Cyber Cafe (20)

Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Where Do We Go From Here?
Where Do We Go From Here?Where Do We Go From Here?
Where Do We Go From Here?
 
Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium Partners
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Information Security
Information SecurityInformation Security
Information Security
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
TME0212-49
TME0212-49TME0212-49
TME0212-49
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
 

More from Amy Lenzo

Graphics session 6
Graphics session 6Graphics session 6
Graphics session 6
Amy Lenzo
 
Visual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective IntelligenceVisual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective Intelligence
Amy Lenzo
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber Cafe
Amy Lenzo
 
Transforming Social Fields
Transforming Social FieldsTransforming Social Fields
Transforming Social Fields
Amy Lenzo
 
Wisdom emerging
Wisdom emergingWisdom emerging
Wisdom emerging
Amy Lenzo
 
Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2
Amy Lenzo
 
Participant list
Participant listParticipant list
Participant list
Amy Lenzo
 
Level One Online - SlideShow1
Level One Online - SlideShow1Level One Online - SlideShow1
Level One Online - SlideShow1
Amy Lenzo
 
Just Water
Just WaterJust Water
Just Water
Amy Lenzo
 
The World Café Conversation
The World Café ConversationThe World Café Conversation
The World Café Conversation
Amy Lenzo
 

More from Amy Lenzo (10)

Graphics session 6
Graphics session 6Graphics session 6
Graphics session 6
 
Visual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective IntelligenceVisual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective Intelligence
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber Cafe
 
Transforming Social Fields
Transforming Social FieldsTransforming Social Fields
Transforming Social Fields
 
Wisdom emerging
Wisdom emergingWisdom emerging
Wisdom emerging
 
Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2
 
Participant list
Participant listParticipant list
Participant list
 
Level One Online - SlideShow1
Level One Online - SlideShow1Level One Online - SlideShow1
Level One Online - SlideShow1
 
Just Water
Just WaterJust Water
Just Water
 
The World Café Conversation
The World Café ConversationThe World Café Conversation
The World Café Conversation
 

Stefan Savage Cyber Cafe

  • 1.
  • 2. Security is often seen as a technical problem  There is a broader socio-economic view  Actors ▪ Adversaries ▪ Victims ▪ Defenders  Incentives/Costs  Capabilities  Key hypothesis:  Relationships  These extrinsic factors will provide a more effective basis for designing security interventions 2
  • 3. Security is poised to become a big data field  But defenses/policies need good models; good models need to be informed by good data  Very poor ground truth data in security field today  For validating hypotheses  e.g., monetary payments are a structural bottleneck in all advertising-based e-crime  For deriving hypotheses  e.g., how important is trust establishment for online criminals? 3
  • 4. Today, the largest driver for threats is $$$ Goods Click Bank Spam FakeAV Fraud Cred Theft Advertising Theft Banking Spamming Trojans botnets h PPI service Phishing kits Crypters Traffic Exploit kits sales SEO kits Markets VPNs BP hosting Infrastructure
  • 5. Today, the largest driver for threats is $$$  Scale allows commodity monetization  Complex value chain relationships 5
  • 6. Click Trajectory study of spam “value chain” • Aug 1 -- Oct 31 2010 • 7 URL/Spam feeds + 5 botnet feeds • 968M URLs • 17M domains • Crawled domains for 98% of URLs in • 1000s of Firefox instances • Large IP address diversity • Multiple purchases from all major programs • Identify bottlenecks in process
  • 7. St. Kitts & Nevis AGBank • Low diversity DnB NORD • 3 banks covered 95% of spam • Fewer banks willing handle “high-risk” merchants • High switching cost • In-person account creation, due diligence, multi-day process • Upfront capital, holdback forfeiture 7
  • 8. Major initiative underway  Undercover purchases  Drive merchant takedown  Appears highly successful “Right now most affiliate programs have a mass of declines, cancels and pendings, and it doesn't depend much on the program imho, there is a general sad picture, fucking Visa is burning us with napalm (for problematic countries, it's totally fucked, on a couple of programs you're lucky if you get 50% through).” 8
  • 9. Security interventions should be understood in their larger socio-economic context  Don’t just plug holes; figure out which holes matter and why  Empiricism and fieldwork are necessary parts of the solution here  The lab setting is great, but its not a substitute for studying the real world 9

Editor's Notes

  1. Mention coauthors