research project
play

RESEARCH PROJECT PREVENTING MOST COMMON ATTACKS ON CRITICAL - PowerPoint PPT Presentation

RP#80 RESEARCH PROJECT PREVENTING MOST COMMON ATTACKS ON CRITICAL INFRASTRUCTURES Wouter Miltenburg & Koen Veelenturf University of Amsterdam Students Master System and Network Engineering Supervisors: Jaya Baloo & Oscar Koeroo


  1. RP#80 RESEARCH PROJECT PREVENTING MOST COMMON ATTACKS ON CRITICAL INFRASTRUCTURES Wouter Miltenburg & Koen Veelenturf University of Amsterdam 
 Students Master System and Network Engineering Supervisors: Jaya Baloo & Oscar Koeroo KPN

  2. RESEARCH QUESTIONS • Which techniques are available today that could be used to mitigate common attacks? • What kind of attacks are critical infrastructures suffering from? • What kind of techniques can be used? • Why are these techniques not common practices?

  3. INTERVIEWED COMPANIES • KPN • A2B Internet (Erik Bais) • NLnet (Marc Gauw) • A multinational company 3

  4. COMMON ATTACKS • BGP Hijacking • DDoS • Email Abuse (e.g. Phishing) 4

  5. EXAMPLE: BGP PREFIX HIJACKING 5

  6. MEASURES: BGP HIJACKING (I) • Peer Policies • Detailed route filtering per neighbour • Prefix • AS_PATH filtering • IRR 6

  7. MEASURES: BGP HIJACKING (II) • Securing BGP sessions • BGP Origin Validation/BGPsec 7

  8. MEASURES: DDoS ATTACKS • Scrubbing • Ingress / egress / uRPF • BGP FlowSpec • Trusted Networks Initiative 8

  9. TRUSTED NETWORKS INITIATIVE • Last-resort solution for DDoS mitigation • “Raising the Internet bridges” • AMS-IX / NL-IX • Foreign equivalent: The FENIX Project (Czech) 9

  10. MEASURES: EMAIL ABUSE (I) • SPF • DKIM • DMARC 10

  11. MEASURES: BUSINESS • Creating awareness • Creating business cases for security measures • Possible reputation damage • CERT 11

  12. CONCLUSION • Identified common attacks • Techniques are not the problem • Awareness • “Get Hacked!” • Balance between 
 Business & Security • Implement suggested security measures 12

  13. REMARKS • More mitigation techniques • Configuration examples 13

  14. THANK YOU FOR YOUR TIME QUESTIONS? 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend