lightning talks - cyber security congres 2016

48
ICE: In Case of Emergency A mobile application used to warn people about an emergency Joey Mosterd, Michel Roke, Michel van der Hoorn and Pedro Lopes Silva

Upload: surfnet

Post on 25-Jan-2017

65 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Lightning talks - Cyber Security Congres 2016

ICE:%In%Case%of%EmergencyA"mobile"application"used"to"warn"people"about"an"emergency

Joey"Mosterd,"Michel"Roke,"Michel"van"der"Hoorn"and"Pedro"Lopes"Silva

Page 2: Lightning talks - Cyber Security Congres 2016

Emergency%scenario

Fire"breaks"out"in"a"garage"and"the"alarm"will"only"cover"a"certain"area.

Page 3: Lightning talks - Cyber Security Congres 2016
Page 4: Lightning talks - Cyber Security Congres 2016

People"traveling"towards"the"emergency"are"oblivious"of"the"situation

Page 5: Lightning talks - Cyber Security Congres 2016

Which"could"result"into"a"situation"like"this

Page 6: Lightning talks - Cyber Security Congres 2016
Page 7: Lightning talks - Cyber Security Congres 2016
Page 8: Lightning talks - Cyber Security Congres 2016

But%how%can%you%reduce%the%impact?How"can"you"spread"the"news?

What"can"you"utilize"too"ensure"as"many"people"as"possible"receive"the"information"needed"to"help"contain"the"emergency?

Page 9: Lightning talks - Cyber Security Congres 2016

Introducing…%

ICE%AppIn%Case%of%Emergency

Page 10: Lightning talks - Cyber Security Congres 2016

• Is"a"tool"to"inform"people"in"crisis"situations

• Is"able"to"send"push"notifications"to"users

• Helps"to"reduce"crowds"in"a"crisis"situation

• Is"divided"in"two"application,"send"and"receive

• Can"be"installed"on"Android"and"iOS

ICE%App…..

Page 11: Lightning talks - Cyber Security Congres 2016

Log"in"using"an"administrator"account

How%does%ICE%App%work?

Page 12: Lightning talks - Cyber Security Congres 2016

Select"the"type"of"emergency

Start%broadcast

Page 13: Lightning talks - Cyber Security Congres 2016

Select"or"write"a"message

Page 14: Lightning talks - Cyber Security Congres 2016

Select"the"buildings"that"are"effected

Page 15: Lightning talks - Cyber Security Congres 2016

Send"the"broadcast

Page 16: Lightning talks - Cyber Security Congres 2016
Page 17: Lightning talks - Cyber Security Congres 2016

Flexible%design

! The"application"is"designed"to"be"easily"adjusted

! It"can"be"used"as"is"with"little"effort

!Or"combined"with"existing"applications

Page 18: Lightning talks - Cyber Security Congres 2016

Michael(Mehrow(RSE,RHBAdviseur Veiligheid

Hogeschool Windesheim

[email protected]

Page 19: Lightning talks - Cyber Security Congres 2016

VAN$SECURITY$AWARENESS$TRAINING

Fysieke'gamification

Door:$Tim$de$Graaf

Page 20: Lightning talks - Cyber Security Congres 2016

De'mens als schakel

• Phishing$en spear@phishing

• Trojanized software$installers$(malware)

• Ddos door$misbruik van$IoT

• BYOD$vs$Shadow@it

• Focus$van$aanvallers op$de$thuisomgeving

Page 21: Lightning talks - Cyber Security Congres 2016

Security'testing

• Crisisoefeningen• Ethical$hacking

• Resultaten direct$toepasbaar

• Aanspreekbaarheid

• Lastig controleerbaar• Lastig gevolgen beperken

• Lastig gewenste scenario$te bereiken• Lastig aanspreekbaarheid prettig te laten ervaren

Page 22: Lightning talks - Cyber Security Congres 2016

Security'awareness'training

• Bewustzijn (dreigingen,$belang,$eigen rol)• Kennis (voorkomen,$beperken,$afhandelen)• Gedrag

• “Het$duurde te lang”• “Het$sprak niet aan”

• “Kennis blijft niet goed hangen”• “Het$doel ging langs ze heen”

Page 23: Lightning talks - Cyber Security Congres 2016

Security'awareness'games

• Leuk• Interactief• Extra$motivatie• Controlen• Beheersen

• “Het$spel was$niet echt leuk”

• “Het$was$wel leuk,$maar$ik heb er niet echt iets van$geleerd”• “Dit zal in$het$echt nooit zo$gebeuren”• “Dit zal mij nooit gebeuren”

Page 24: Lightning talks - Cyber Security Congres 2016

Escape'Rooms

• Leuk• Teambuilding• Educatieve inzet

• Extra$motivatie

• Barrieres• Realisme• Controleren• Beheersen

Page 25: Lightning talks - Cyber Security Congres 2016

Mogelijkheden

• Cyber$security$vanuit de$aanvaller bekijken• Deelnemers elkaar laten hacken• Meekijken door$(niet@)deelnemers

• Competitie

• Herspeelbaarheid• Beloningen

• Kosten• Ruimte

• Benodigdheden• Beschikbaarheid

Page 26: Lightning talks - Cyber Security Congres 2016
Page 27: Lightning talks - Cyber Security Congres 2016

DDoS Attackson the Root DNS

Presented by

Ricardo de Oliveira Schmidt

November 18th, 2016 Amsterdam, Netherlands

Presentation copyright © 2016 by Ricardo de Oliveira Schmidt

CYBER SECURITY CONGRESS

Page 28: Lightning talks - Cyber Security Congres 2016

Reference:

Anycast Vs. DDoS: Evaluating the November 2015 Root DNS Event

Giovane C. M. Moura, Ricardo de O. Schmidt, John Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei and Cristian Hesselman

ACM Internet Measurements Conference (IMC), Santa Monica-USA, 2016 (Technical Report ISI-TR-2016-709, USC/Information Sciences Institute)

Page 29: Lightning talks - Cyber Security Congres 2016

Distributed Denial of Service

Page 30: Lightning talks - Cyber Security Congres 2016

Distributed Denial of Service

?

?

? ?

Page 31: Lightning talks - Cyber Security Congres 2016

Big and getting bigger2012: 100 Gb/s 2016: 100 Gb/s is common, >1 Tb/s is possible

Easy and getting easier2012: many botnets with 1000+ nodes 2016: DDoS-as-a-service (Booters) offer few Gb/s @ US$ 5

Frequent and getting frequent-er2002: the October 30 DNS Root event 2016: 3 recent big attacks (2015-11-30, 2015-12-01, 2016-06-25)

Distributed Denial of Service

Page 32: Lightning talks - Cyber Security Congres 2016

Big and getting bigger2012: 100 Gb/s 2016: 100 Gb/s is common, >1 Tb/s is possible

Easy and getting easier2012: many botnets with 1000+ nodes 2016: DDoS-as-a-service (Booters)

Frequent and getting frequent-er2002: the October 30 DNS Root event 2016: 3 recent big attacks (2015-11-30, 2015-12-01, 2016-06-25)

Distributed Denial of Service

vDOS

Page 33: Lightning talks - Cyber Security Congres 2016

Big and getting bigger2012: 100 Gb/s 2016: 100 Gb/s is common, >1 Tb/s is possible

Easy and getting easier2012: many botnets with 1000+ nodes 2016: DDoS-as-a-service (Booters)

Frequent and getting frequent-er2002: the October 30 DNS Root event 2016: 3 recent big attacks

(2015-11-30, 2015-12-01, 2016-06-25)

Distributed Denial of Service

vDOS

Page 34: Lightning talks - Cyber Security Congres 2016

Distributed Denial of Service

Image copyrights © thehackernews.com

Page 35: Lightning talks - Cyber Security Congres 2016

Distributed Denial of Service

Image copyrights © thehackernews.com

"Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec"

Swati Khandelwal, thehackernews.com

"Root DNS servers DDoS'ed: was it a show off?" Yuri Ilyin, Kaspersky

"Someone Is Learning How to Take Down the Internet" Bruce Schneier, Schneier on Security

Page 36: Lightning talks - Cyber Security Congres 2016

DDoS attack on the Root DNS

Peak of 35+ Gb/s 5 million queries/sec Impact was moderate

Thanks to the robustness of the whole system

The Nov. 30 Event

Page 37: Lightning talks - Cyber Security Congres 2016

What was the impact?

Most letters suffered a bit (E, F, I, J, K) a lot (B, C, G, H)

Did not see attack traffic D, L, M

Problems on reachability! ... but also on performance

The Nov. 30 Event

0 2000

9000

num

ber o

f VPs

with

suc

cess

ful q

uerie

s

B C

0

5000

E F

1000

9000

G H

0

45007000

I J

0

6000

9000

0 5 10 15 20 25 30 35 40 45hours after 2015-11-30t00:00 UTC

K

0 5 10 15 20 25 30 35 40 45

A D L M

Page 38: Lightning talks - Cyber Security Congres 2016

Collateral damage!

D-Root was not targeted... ... but felt the attack

The Nov. 30 Event

0

20

40

60

80

100

120

0 5 10 15 20 25 30 35 40 45

540

580

620

660

num

ber

of V

Ps

hours after 2015-11-30t00:00 UTC

D-FRA

D-SYD

D-AKL

D-DUB

D-BUR

Page 39: Lightning talks - Cyber Security Congres 2016

The Root DNS handled the situation quite well... ... at no time the service was completely unreachable

Resilience of the Root DNS is not an accident... ... consequence of fault tolerant design and good engineering!

True diversity is key to avoid collateral damage

The Lessons Learned

Page 40: Lightning talks - Cyber Security Congres 2016

And, What Now?Learn from the Root DNS experiences

Have in mind the possible very large DDoS attacks when... ... designing Internet systems ... improving countermeasures and mitigation strategies

It does not matter if...

... someone was showing off

... someone was testing/scanning the infrastructure

... someone is learning how to take down the Internet

It was a big wake up call, this is critical infrastructure!

Things are escalating pretty fast and apparently we are not fully aware of what we are dealing with.

Page 41: Lightning talks - Cyber Security Congres 2016

Acknowledgements:

Arjen Zonneveld, Jelte Jansen, Duane Wessels, Ray Bellis, Romeo Zwart, Colin Petrie, Matt Weinberg and Piet Barber

SIDN Labs, NLnet Labs and SURFnet

Self-managing Anycast Networks for the DNS (SAND) project | http://www.sand-project.nl/ NWO DNS Anycast Security (DAS) project | http://www.das-project.nl/

[email protected] http://www.ricardoschmidt.com

Page 42: Lightning talks - Cyber Security Congres 2016

SECTOR'ONDERWIJS'EN'ONDERZOEK

CYBERDREIGINGSBEELD,2016

Bart'Bosma,'[email protected]

Page 43: Lightning talks - Cyber Security Congres 2016

CYBERDREIGINGSBEELD,2016

Onderzoek

Onderwijs

Bedrijfsvoering

3,processen

Page 44: Lightning talks - Cyber Security Congres 2016

CYBERDREIGINGSBEELD,2016

Onderwijs

Page 45: Lightning talks - Cyber Security Congres 2016

CYBERDREIGINGSBEELD,2016

Onderzoek

Page 46: Lightning talks - Cyber Security Congres 2016

CYBERDREIGINGSBEELD,2016

Bedrijfsvoering

Page 47: Lightning talks - Cyber Security Congres 2016

CYBERDREIGINGSBEELD,2016

Trends:• Phishing'• Ransomware'• DDoS• Kwetsbaarheden in'software• Responsible'Disclosure• Ketenbeveiliging

0

20

40

60

80

1 4 7 1013161922252831343740

Page 48: Lightning talks - Cyber Security Congres 2016

CYBERDREIGINGSBEELD,2016

https://www.surf.nl/cyberdreigingsbeeld