TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.

Slides:



Advertisements
Similar presentations
International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
Advertisements

International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Recent Standardization Activities on Cloud Computing Kishik Park, Kangchan Lee, Seungyun Lee TTA.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
DOCUMENT #:GSC15-PLEN-08 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (4.5) CONTACT(S):Jim MacFie ISACC Activities Since GSC-14 Jim MacFie.
Capacity Development Workshop on Public Information Management System and Policy in Korea on cyber attacks Jeong Min, Lee KISA.
DOCUMENT #:GSC15-PLEN-11 FOR:Presentation SOURCE:TTA AGENDA ITEM:Plenary 4.8 TTA activities since GSC14 Keun Hyeob LEE, TTA President.
Cyber Security Issues in South Korea and CSIRTs Cooperation September 17, 2014 Eunju Pak
DOCUMENT #:GSC15-GTSC-05 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.1 NGN, Testing specification and Beyond Chaesub.
Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.
D2-02_09 Construction of Next-generation Security Infrastructure to Cope with Next Types of Cyber Attacks Takehiro Sueta Kyushu Electric Power Co., Inc.
DOCUMENT #:GSC15-PLEN-48 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.10 CONTACT(S): James McEachern
Lecturer: Ghadah Aldehim
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Internet Security facilities for secure communication.
DOCUMENT #:GSC15-CL-04 FOR:Presentation SOURCE:CCSA AGENDA ITEM:Closing Plenary, 2.3 GTSC-8 Summary Report Duo Liu GTSC-8.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Fostering worldwide interoperabilityGeneva, July 2009 Home Networking activities in TTC KENJI KORO TTC Next-Generation Home Network system WG Global.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.
1 Web Development & Design Foundations with XHTML Chapter 1 Key Concepts.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Fostering worldwide interoperabilityGeneva, July 2009 Standardization activities on Home Networking in CCSA Duo LIU, Deputy Secretary General of.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Durban, South Africa, 8 July 2013 Outcome of WTSA-12 on spam Xiaoya Yang, Head, WTSA Programmes Division ITU-TSB ITU Workshop on “Countering.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
TCP/IP (Transmission Control Protocol / Internet Protocol)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
1 Status Report on CJK NGN Working Group China Communications Standards Association 9 th CJK meeting April 2009 HeyuanXu, Chairman of NGN-WG.
New HIS on ICTs and the Environment - Proposal to Standardize Methodology for Evaluating Energy Saving Impact of ICT Services - The Telecommunication Technology.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
DOCUMENT #:GSC15-PLEN-82r2 FOR:Presentation SOURCE:ATIS AGENDA ITEM: PLEN 6.14 CONTACT(S): Andrew White ATIS’
TTA activity on Cyber Security and Protection of PI/PII/LI 14 July, 2008 Heung-youl Youm, Sun Kim TTA, Korea DOCUMENT #:GSC13-PLEN-23 FOR:Presentation.
Fostering worldwide interoperabilityGeneva, July 2009 IdM and Identification Systems Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Fostering worldwide interoperabilityGeneva, July 2009 The Home Network: Where Convergence Takes Hold Tim Jeffries, VP Technology and Business Development,
Fostering worldwide interoperabilityGeneva, July 2009 ITU-T Telecom Security Update Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
DOCUMENT #:GSC15-PLEN-52 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN 6.11 CONTACT(S):Maria Estefania ATIS and.
Standardization activities on Home Networking in CCSA CCSA DOCUMENT #:GSC13-GTSC6-08 FOR:Presentation or Information SOURCE:CCSA AGENDA ITEM:GTSC; 4.3.
K. Salah1 Security Protocols in the Internet IPSec.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
DOCUMENT #:GSC15-PLEN-79 FOR:Presentation SOURCE:TTC AGENDA ITEM: GSC Plenary 6.10 GTSC 4.1 NGN interoperability -
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Securing Interconnect Networks By: Bryan Roberts.
Jeju, 13 – 16 May 2013Standards for Shared ICT TTA activities since GSC-16 Keun Hyeob Lee, President of TTA Document No: GSC17-PLEN-39 Source: TTA Contact:
WTSA-12 Resolutions addressing security
Global Standards Collaboration (GSC) 14
WTSA-12 Resolutions addressing security
Defending Against DDoS
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
National Information Security Index in Korea
Defending Against DDoS
Global Collaboration on Future Network Standardization
Global Collaboration on Future Network Standardization
Global Collaboration on Future Network Standardization
DDoS Attack and Its Defense
Recent Standardization Activities on NID
Reinhard Scholl, GTSC-7 Chairman
Recent Standardization Activities on Cloud Computing
Presentation transcript:

TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation SOURCE:TTA, Korea AGENDA ITEM:GTSC; 4.2 CONTACT(S):Heung-youl Youm Submission Date: July 1, 2008

2 TTA’s standardization activities in the are of information security have been coordinated with global SDOs, especially ITU-T. Nowadays, TTA is now focusing on developing the standards or guidelines for the following areas: Information Security Infrastructure Personal Information Protection & Identity management Cyber Security Application Security & Evaluation Certification Telebiometrics Digital Right Management PG (Project Group) 503 on Cyber Security in TTA is now developing standards or guidelines for countering BOTNET and tracing cyber attacks in Korea. Highlight of Current Activities (1/3)

3 Highlight of Current Activities (2/3) TTA’s contributions for this area since GSC12 include the followings: –Submitting a contribution to establish new Question on the tracing cyber attacks and Digital Forensic on ITU-T September 2007 Geneva SG17 meeting; As a result of discussion of ITU-T April 2008 Geneva SG17 meeting, this subjects are recognized as important topics, SG17 agreed to include these subjects in current Question 6/17 on cyber attacks and continue to study during next Study Period, to include these subjects to the Question(Q.K/17) Text. –Establishing four work items in PG 503 in 2008; Framework for tracing cyber attacks, under development Security Requirements for tracing cyber attacks, under development Digital Image Exchange Format for digital forensics, under development Digital data analysis tool requirement for computer forensics, under development

4 Highlight of Current Activities (3/3) –Involving in activities to develop ITU-T Recommendations, such as ITU-T X.tb-ucr on Traceback use case and requirements since April –Developing domestic standard on Cyber Attack Tracing Event Exchange Format(TTAS.KO ) adopted from IETF RFC 3067: Approved December This standard is the content about tracing event exchange format for tracing attacker through collaboration among several administrative domains for securing network infrastructure, this standard describes tracing event exchange format requirements, the operational model for processing tracing event exchange format, data classes constituting tracing event exchange format. This standard contributes to design and develop communication mechanism of trace event, attacker trace system, and so on efficiently. Note that Korea has put in place the DNS sinkhole scheme for countering BOTNET since 2005 and Japan also has put in place the Clean Cyber Center for countering BOTNET. –DNS sink hole scheme is focusing on identifying the IP address of BOTNET controller and breaking the communication between the BOT-infected PCs and command controller of BOTNET, while CCC is focusing on identifying the IP address of BOT-infected PCs and curing that BOT-infected PC using the anti-BOT program which is downloaded from the web site of CCC.

5 Strategic Direction Since TTA recognized the importance and significance of these subjects, the strategic direction of TTA includes; –To support continually the domestic standardization activities; –To contribute to global standardization activities in global SDO, especially ITU-T SG17 Question 6; –To continue to adopt well-defined standards produced by Global SDOs to domestic standards.

6 Challenges(1/2) Nowadays, the most serious threats to the telecommunication operator are both attacks from BOTNET and attacks from unknown source. In the current IP-based network, there is a huge number of unwanted traffics from DDoS attacks, spams, worms and so on, and there are increasing e-crimes such as the loss of sensitive information and network fraud. And most of these attackers and criminals use spoofed IP addresses. However, as the IP network is a hop-by-hop packet forwarding network where the routers don’t keep any information of the packets forwarded normally, the network itself hasn’t the ability to identify the source (IP address) of attacker.

7 Challenges(2/2) Since cyber attacks are launched across the physical frontier of one country, that is, beyond the border, the operator in one domain should collaborate with other operator in other domain to locate the exact source of cyber attack. Digital forensics against the telecommunication refers to a process to incident investigation of cyber attacks for obtaining evidence in the telecommunication. The evidence data for identifying cyber attack should be shared among relevant organizations or telecommunication operators. The tecom-based IT forensics and the trace-back can achieve their goal with the help of the telecommunication operator.

8 Next Steps/Actions TTA continue to contribute to the ITU-T SG17 activities, especially Q.6/17 activities, in the trace-back area: –Especially “the information exchange formats and protocols for tracing the cyber attacks in multi-domain network environment”. TTA will consider combining Japanese’s CCC scheme and Korea’s DNS sink hole scheme to submit a contribution for countering BOTNET attacks to ITU-T in collaboration with Japanese experts. In addition, TTA will support to develop the domestic standards which are closely related to the Korea’s regulation in this area.

9 Proposed Resolution Tracing cyber attacks and countering BOTNET could be significant countermeasures to the cyber crimes or attacks over the IP network. They can help to solve the serious problems, such as: –Help to fight against DDoS attacks, SPAMs, worms and so on. –Provide technical solutions to counter cyber crimes and trace back to the roots of attackers. This would deter criminals and reduce the amount of traffic of network crimes. In conclusion, it is necessary to add to Resolution GSC-12/19 on cyber security the following item; –Global SDOs and PSOs are required to develop standards or guidelines to protect against BOTNET attacks and facilitate tracing the source of an attacker including IP-level traceback, application- level traceback, user-level traceback in the IP-based network.

10 Supplemental Slides

11 Definitions on a BOTNET and an IP traceback BOTNET refers to a collection of software agents, in which multiple computing devices cooperate to generally achieve unwanted results [defined by the experts of ITU-T SG17 Question 17 at the ITU-T April 2008 Geneva SG17 meeting]. Sometimes, BOTNET is frequently used to deliver spam, to launch the massive cyber attacks such as DDoS attacks, to leak private information from users. IP traceback refers to any method for reliably determining the origin of a packet on the Internet even if an attacker use a spoofed IP address. In Wikipedia

12 3. The Bot of the an infected computer logs into a particular Bot C&C server. How Bot is created and used to launch cyber attacks? Bot herder Bot infected computer Bot 5. Scans IP Network for infection Botnet C&C 1. Commands to look for another user’s computer to be infected with Bot program. 2. Send out worm or virus, infecting another user computer. 4. Commands to look for another user computer or launch a DDoS attack 6. Use Botnet to launch a DDoS attacks to victim Victim

13 Typical Example of traceback – ICMP-based Traceback An ICMP packet including a router address is generated and forwarded by the router in the connection chain to a victim host every specific number of normal IP packets received. It is compatible with the existing protocols. It allows post-attack analysis Attacker Victim R1 R9 R6 R3 R5 R4 R2 R11 R8 R10 R7 R11 - R7 - R4 - R2 - R1 Reconstructed route Incoming packet stream Sort ICMP packet with address information 1/20,000 R11 R7 R1

14 Typical Example of traceback – PPM (Probabilistic Packet Marking) Victim R1 R9 R6 R3 R5 R4 R2 R11 R8 R10 R7 Marked Packet with probability p R11 - R7 - R4 - R2 - R1 Buffer of marked Packets Reconstructed route Incoming packet stream Reconstruction Processing Attacker