RESEARCH PROJECT PREVENTING MOST COMMON ATTACKS ON CRITICAL - - PowerPoint PPT Presentation

research project
SMART_READER_LITE
LIVE PREVIEW

RESEARCH PROJECT PREVENTING MOST COMMON ATTACKS ON CRITICAL - - PowerPoint PPT Presentation

RP#80 RESEARCH PROJECT PREVENTING MOST COMMON ATTACKS ON CRITICAL INFRASTRUCTURES Wouter Miltenburg & Koen Veelenturf University of Amsterdam Students Master System and Network Engineering Supervisors: Jaya Baloo & Oscar Koeroo


slide-1
SLIDE 1

RESEARCH PROJECT

PREVENTING MOST COMMON ATTACKS ON CRITICAL INFRASTRUCTURES

Wouter Miltenburg & Koen Veelenturf University of Amsterdam
 Students Master System and Network Engineering Supervisors: Jaya Baloo & Oscar Koeroo KPN

RP#80

slide-2
SLIDE 2

RESEARCH QUESTIONS

  • Which techniques are available today that could be used to

mitigate common attacks?

  • What kind of attacks are critical infrastructures suffering from?
  • What kind of techniques can be used?
  • Why are these techniques not common practices?
slide-3
SLIDE 3

INTERVIEWED COMPANIES

  • KPN
  • A2B Internet (Erik Bais)
  • NLnet (Marc Gauw)
  • A multinational company

3

slide-4
SLIDE 4

COMMON ATTACKS

  • BGP Hijacking
  • DDoS
  • Email Abuse (e.g. Phishing)

4

slide-5
SLIDE 5

EXAMPLE: BGP PREFIX HIJACKING

5

slide-6
SLIDE 6

MEASURES: BGP HIJACKING (I)

  • Peer Policies
  • Detailed route filtering per neighbour
  • Prefix
  • AS_PATH filtering
  • IRR

6

slide-7
SLIDE 7

MEASURES: BGP HIJACKING (II)

  • Securing BGP sessions
  • BGP Origin Validation/BGPsec

7

slide-8
SLIDE 8

MEASURES: DDoS ATTACKS

  • Scrubbing
  • Ingress / egress / uRPF
  • BGP FlowSpec
  • Trusted Networks Initiative

8

slide-9
SLIDE 9

TRUSTED NETWORKS INITIATIVE

  • Last-resort solution for DDoS mitigation
  • “Raising the Internet bridges”
  • AMS-IX / NL-IX
  • Foreign equivalent: The FENIX Project (Czech)

9

slide-10
SLIDE 10

MEASURES: EMAIL ABUSE (I)

  • SPF
  • DKIM
  • DMARC

10

slide-11
SLIDE 11

MEASURES: BUSINESS

  • Creating awareness
  • Creating business cases for security measures
  • Possible reputation damage
  • CERT

11

slide-12
SLIDE 12

CONCLUSION

  • Identified common attacks
  • Techniques are not the problem
  • Awareness
  • “Get Hacked!”
  • Balance between


Business & Security

  • Implement suggested security measures

12

slide-13
SLIDE 13

REMARKS

  • More mitigation techniques
  • Configuration examples

13

slide-14
SLIDE 14

THANK YOU FOR YOUR TIME QUESTIONS?

14