SlideShare a Scribd company logo
1 of 10
Download to read offline
AbuseHUB: a 
Success Story 
Gert Wabeke 
Holland Strikes Back event, 
October 28, 2014 
www.abuseinformationexchange.nl
Association with major assets 
§ Community of AbuseDesk experts sharing knowledge on how to 
detect, inform and support customers more efficiently 
§ System (AbuseHUB) that collects, correlates, and distributes 
abuse notifications to abuseDesk 
Powerful and concrete mechanisms to enhance internet safety, 
increases overall Abuse handling maturity level
Scope 
Source: 
Out 
of 
scope 
h#p://pineut.wordpress.com/2013/04/13/botnet-­‐aanval-­‐op-­‐wordpress-­‐com/ 
Abuse HUB 
collect, correlate, distribute 
post infection information to 
Abuse Desks 
Members use the information to 
inform and assist their 
customers to mitigate infection
Removal 
(decentralizedl) 
AD 
AD 
AbuseHUB 
Sources 
InformaGon 
sharing 
(centralized) 
AD 
AbuseHUB 
Manager 
Abuse 
HUB 
AbuseHUB 
HosGng 
provider 
HosGng 
Center 
RN 
RN 
RN 
RN 
Legal 
enGty: 
Abuse 
Desk 
process 
Customer 
support
Statistics 
4,7 million Abuse_ Reports 
received and processed in 
September. 
100 Abuse Types identified 
Reports sorted, correlated 
and distributed to our 
members Abuse Desk 
covering in total 35 ASN
AbuseHUB’s Notifiers
Extending # Notifiers! 
§ Notifiers who are able and whishing to share information 
Our proposition: we distribute and sort the information to ASN 
owner based on IP address. The ASN owner will take action 
and remove (botnet) infection on its network. As an industry 
collaboration with over 90% market coverage together 
contributing to enhance internet safety. 
§ Requirements 
§ Well-defined detection process 
§ Machine-readable reports (IODEF, X-ARF, CSV/TSV with header) 
§ Must contain source IP and date timestamp (ntp-synced). 
§ Using its own detection resources (no ‘recycling’ of other sources).
Members 
90% 
of 
fixed 
internet 
access 
in 
the 
Netherlands 
| 
70% 
of 
the 
Dutch 
domain 
name 
market 
With 
startup 
funding 
from:
Extending # Members 
§ Open to everyone who wants to enhance internet safety 
Our unique proposition: we enhance the maturity level of 
your abuse handling processes through (1) a one-stop-shop 
with high-value information on botnet infections and (2) a 
community that will enable your staff to further develop their 
skills together with their peers. 
§ Requirements 
§ Own Autonomous System (IP address space) 
§ Demonstrable abuse policy 
§ Members also act as a Reliable Notifier 
§ Annual contribution (keep system afloat)
Q&A 
Vereniging 
Abuse 
Informa:on 
Exchange 
Overgoo 
13 
Postbus 
262 
2260 
AG 
Leidschendam 
The 
Netherlands 
www.abuseinformaGonexchange.nl 
info@abuseinformaGonexchange.nl

More Related Content

Similar to HSB - Gert Wabeke - AbuseHUB

Media-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsMedia-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-Tags
Kenan Marks
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
Ashlie Steele
 

Similar to HSB - Gert Wabeke - AbuseHUB (20)

Phishing trends and Collaborative Efforts to Fight Cybercrime
Phishing trends and Collaborative Efforts to Fight CybercrimePhishing trends and Collaborative Efforts to Fight Cybercrime
Phishing trends and Collaborative Efforts to Fight Cybercrime
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service Providers
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
Media-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsMedia-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-Tags
 
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptxDomain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Global Ransomware Attacks
Global Ransomware AttacksGlobal Ransomware Attacks
Global Ransomware Attacks
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
SafeDNS Cloud-based Web Filtering for MSP, MSSP and VAR
SafeDNS Cloud-based Web Filtering for MSP, MSSP and VARSafeDNS Cloud-based Web Filtering for MSP, MSSP and VAR
SafeDNS Cloud-based Web Filtering for MSP, MSSP and VAR
 
Edge develop com_previous_clients_html
Edge develop com_previous_clients_htmlEdge develop com_previous_clients_html
Edge develop com_previous_clients_html
 
Christopher Furton - Cybersecurity Threat Brief: Malvertising and Watering Holes
Christopher Furton - Cybersecurity Threat Brief: Malvertising and Watering HolesChristopher Furton - Cybersecurity Threat Brief: Malvertising and Watering Holes
Christopher Furton - Cybersecurity Threat Brief: Malvertising and Watering Holes
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul Hobbs
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 

More from Splend

More from Splend (20)

Fiber Vakdag 2019 - Gerben Roseboom - MapXact
Fiber Vakdag 2019 - Gerben Roseboom - MapXactFiber Vakdag 2019 - Gerben Roseboom - MapXact
Fiber Vakdag 2019 - Gerben Roseboom - MapXact
 
Fiber Vakdag 2019 - Lex Wils - FCA
Fiber Vakdag 2019 - Lex Wils - FCAFiber Vakdag 2019 - Lex Wils - FCA
Fiber Vakdag 2019 - Lex Wils - FCA
 
Martin Pels - NLNog ring
Martin Pels - NLNog ringMartin Pels - NLNog ring
Martin Pels - NLNog ring
 
Wido den Hollander - IPv6
Wido den Hollander - IPv6Wido den Hollander - IPv6
Wido den Hollander - IPv6
 
Pim van Stam - BGP
Pim van Stam - BGPPim van Stam - BGP
Pim van Stam - BGP
 
Bart Lageweg - Ansible/Cobbler
Bart Lageweg - Ansible/CobblerBart Lageweg - Ansible/Cobbler
Bart Lageweg - Ansible/Cobbler
 
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
 
HSB15 - Richard Bosboom - HackerOne
HSB15 - Richard Bosboom - HackerOneHSB15 - Richard Bosboom - HackerOne
HSB15 - Richard Bosboom - HackerOne
 
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
 
DHPA Techday 2015 - Patrick Savalle - Disruptive Technology
DHPA Techday 2015 - Patrick Savalle - Disruptive TechnologyDHPA Techday 2015 - Patrick Savalle - Disruptive Technology
DHPA Techday 2015 - Patrick Savalle - Disruptive Technology
 
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into PuppetDHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
 
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
 
DHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP MobilityDHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP Mobility
 
DHPA Techday 2015 - Arjen Zonneveld - Jelte Jansen - DNSSEC College
DHPA Techday 2015 - Arjen Zonneveld - Jelte Jansen - DNSSEC CollegeDHPA Techday 2015 - Arjen Zonneveld - Jelte Jansen - DNSSEC College
DHPA Techday 2015 - Arjen Zonneveld - Jelte Jansen - DNSSEC College
 
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks InitiativeDHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
 
HSB - DDoS Threats and Trends - Gurdeep Dhillon
HSB - DDoS Threats and Trends - Gurdeep DhillonHSB - DDoS Threats and Trends - Gurdeep Dhillon
HSB - DDoS Threats and Trends - Gurdeep Dhillon
 
HSB - NWO Onderzoeksprojecten - Jan Piet Barthel
HSB - NWO Onderzoeksprojecten - Jan Piet BarthelHSB - NWO Onderzoeksprojecten - Jan Piet Barthel
HSB - NWO Onderzoeksprojecten - Jan Piet Barthel
 
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderHSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
 
HSB - Secure hub en deep firmware inspection - michiel leenaars
HSB - Secure hub en deep firmware inspection - michiel leenaarsHSB - Secure hub en deep firmware inspection - michiel leenaars
HSB - Secure hub en deep firmware inspection - michiel leenaars
 
HSB - Netwerkbenadering in de praktijk - Wim Biemolt
HSB - Netwerkbenadering in de praktijk - Wim BiemoltHSB - Netwerkbenadering in de praktijk - Wim Biemolt
HSB - Netwerkbenadering in de praktijk - Wim Biemolt
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

HSB - Gert Wabeke - AbuseHUB

  • 1. AbuseHUB: a Success Story Gert Wabeke Holland Strikes Back event, October 28, 2014 www.abuseinformationexchange.nl
  • 2. Association with major assets § Community of AbuseDesk experts sharing knowledge on how to detect, inform and support customers more efficiently § System (AbuseHUB) that collects, correlates, and distributes abuse notifications to abuseDesk Powerful and concrete mechanisms to enhance internet safety, increases overall Abuse handling maturity level
  • 3. Scope Source: Out of scope h#p://pineut.wordpress.com/2013/04/13/botnet-­‐aanval-­‐op-­‐wordpress-­‐com/ Abuse HUB collect, correlate, distribute post infection information to Abuse Desks Members use the information to inform and assist their customers to mitigate infection
  • 4. Removal (decentralizedl) AD AD AbuseHUB Sources InformaGon sharing (centralized) AD AbuseHUB Manager Abuse HUB AbuseHUB HosGng provider HosGng Center RN RN RN RN Legal enGty: Abuse Desk process Customer support
  • 5. Statistics 4,7 million Abuse_ Reports received and processed in September. 100 Abuse Types identified Reports sorted, correlated and distributed to our members Abuse Desk covering in total 35 ASN
  • 7. Extending # Notifiers! § Notifiers who are able and whishing to share information Our proposition: we distribute and sort the information to ASN owner based on IP address. The ASN owner will take action and remove (botnet) infection on its network. As an industry collaboration with over 90% market coverage together contributing to enhance internet safety. § Requirements § Well-defined detection process § Machine-readable reports (IODEF, X-ARF, CSV/TSV with header) § Must contain source IP and date timestamp (ntp-synced). § Using its own detection resources (no ‘recycling’ of other sources).
  • 8. Members 90% of fixed internet access in the Netherlands | 70% of the Dutch domain name market With startup funding from:
  • 9. Extending # Members § Open to everyone who wants to enhance internet safety Our unique proposition: we enhance the maturity level of your abuse handling processes through (1) a one-stop-shop with high-value information on botnet infections and (2) a community that will enable your staff to further develop their skills together with their peers. § Requirements § Own Autonomous System (IP address space) § Demonstrable abuse policy § Members also act as a Reliable Notifier § Annual contribution (keep system afloat)
  • 10. Q&A Vereniging Abuse Informa:on Exchange Overgoo 13 Postbus 262 2260 AG Leidschendam The Netherlands www.abuseinformaGonexchange.nl info@abuseinformaGonexchange.nl