Fostering worldwide interoperabilityGeneva, 13-16 July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
The Threat Landscape Jan Threat Report 2.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Breaking Trust On The Internet
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
Internet Fraud By: Noelle Woodman.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Quiz Review.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Incident Response Updated 03/20/2015
Norman SecureSurf Protect your users when surfing the Internet.
Cyber Security Issues in South Korea and CSIRTs Cooperation September 17, 2014 Eunju Pak
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DOCUMENT #:GSC15-PLEN-48 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.10 CONTACT(S): James McEachern
Hacker Zombie Computer Reflectors Target.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
DOCUMENT #:GSC15-CL-04 FOR:Presentation SOURCE:CCSA AGENDA ITEM:Closing Plenary, 2.3 GTSC-8 Summary Report Duo Liu GTSC-8.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
IT security By Tilly Gerlack.
Fostering worldwide interoperabilityGeneva, July 2009 TTA Activities on standardization of Integrated I/O Interface for mobile phones Dr. LEE, HyeonWoo.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Classification 10/3/2015 Worry-Free Business Security 5.0.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Fostering worldwide interoperabilityGeneva, July 2009 The Home Network: Where Convergence Takes Hold Tim Jeffries, VP Technology and Business Development,
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Fostering worldwide interoperabilityGeneva, July 2009 ITU-T Telecom Security Update Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Fostering worldwide interoperabilityGeneva, July 2009 Title of presentation Name of Speaker, Title and Organization Global Standards Collaboration.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Web Browsing Prepared by: Ms. Esraa AL Mousa. What is internet? The word “internet” is derived from the word inter- networking which means connecting.
WTSA-12 Resolutions addressing security
WTSA-12 Resolutions addressing security
National Information Security Index in Korea
Global Collaboration on Future Network Standardization
Computer Security.
Global Collaboration on Future Network Standardization
Reinhard Scholl, GTSC-7 Chairman
Presentation transcript:

Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea ITU-T SG17 Committee, TTA Global Standards Collaboration (GSC) 14 DOCUMENT #:GSC14-GTSC-026 FOR:Presentation SOURCE:TTA AGENDA ITEM:GTSC 4.2

Fostering worldwide interoperability 2 Geneva, July 2009 It is very surprise if you realize that just visiting your favorite web site can either lead to malware to be silently installed on your computer without your knowledge or clicking anything, or being annoyed by misleading applications, such as fake antivirus software. What is web-based attacks? A type of attacks in which the attackers try to compromise the legitimate websites resulting in malicious code to be injected which in turn can be used to infect a user’s computer visiting those web sites. What is web-based attacks?

Fostering worldwide interoperability 3 Geneva, July 2009 Web-based attacks According to Google survey released in May 2007, one in 10 web sites contained malicious codes which were capable of launching so-called “ drive-by download ” type web-based attacks. In the web-based attacks: The administrators are not aware that they are hacked, have resulted injecting the malicious codes and used to disseminate malicious codes; Users also are not aware that their computers get infected by malicious codes from the sites they have visited; Installing anti-virus S/W can prevent some incidents, but, they are not providing ultimate solutions.

Fostering worldwide interoperability 4 Geneva, July 2009 Top Web Threats for 2008 In the Symantic threats Report-2008: Drive-by downloads from mainstream Web site are increasing; Attacks are heavily obfuscated and dynamically changing making traditional antivirus solutions ineffective ; Attacks are targeting browser plug-ins; SQL injection attacks are being used to infect mainstream Web sites; Mal advertisements are redirecting users to malicious Web sites; Explosive growth in unique and targeted malware samples;

Fostering worldwide interoperability 5 Geneva, July 2009 Typical scenarios for web-based attack in Korea 1,000 legitimate web sites … Malicious code injected web site Users 1. Compromise the legitimate web sites. 2. Visit their favorite web sites. 3. Redirect users to the malicious web site. 4.Attempts to attack the PCs using 620,000 IPs ,000 PCs with MS Vul. infected by malicious code. 6. Personal information such as ID/Password is transferred to attacker. attacker

Fostering worldwide interoperability 6 Geneva, July 2009 Korea use case: MC-finder scheme(1/2) MC-finder scheme Developed by KISA (Korea Information Security Agency) and put in place since A scheme to search for the malicious code- injected web sites, malicious web site, and the web sites which redirect users to the malicious injected code, the transit web site. More than 140,000 sites in Korea are being monitored by MC-finder scheme, as of June 30, During 2008, in Korea, 1,324 web sites founded as malicious code injected web sites, 7,654 web sites turned up as the transit web sites redirecting users to the malicious injected web sites.

Fostering worldwide interoperability 7 Geneva, July 2009 Korea use case: MC-finder scheme(2/2) Web sites to be monitored: Major web sites for enterprise/orgs, etc. sites, Top 20,000 sites according to number of visiting users; Sites which have already experienced the web pages’ defacement. Inspect web documents to check whether an malicious code is injected. List up the infected URLs. It has provided the following services; Inform the administrators by SMS, , or phone to take necessary actions; Maintain and track the history of the MC- infected sites;

Fostering worldwide interoperability 8 Geneva, July 2009 Nearly impossible to search for all global web sites therefore, it needs to develop a global collaboration framework. However, Lack of framework for sharing security information; Lack of globally interoperable framework or technologies; No standardization activity on how to counter this web-based attacks. Therefore, it needs to; Identify various web-based attack scenarios, the requirements and generic framework; Identify the relevant information exchange format; Challenges

Fostering worldwide interoperability 9 Geneva, July 2009 Korea continue to upgrade the MC-finder scheme to reflect the fast changing attack environments. Need for a globally interoperable framework and technologies which can combat the web-based attacks effectively; ITU-T and global SDOs are required to develop standards or guideline for a globally interoperable scheme against the web-based attacks on the Internet. TTA plans to contribute to launching the standardization activities on the countering scheme against the web-based attacks in the near future. Next Steps/Actions

Fostering worldwide interoperability 10 Geneva, July 2009 Generally needs to reaffirm the existing Resolution GSC11/13. However, update is required as follows; In recognizing clause, item i); that new cyber attacks such as phishing, pharming, “web-based attacks” and Botnets are emerging and spreading rapidly; In Resolves clause, item 4); work with the ITU and others to develop standards or guidelines to protect against Botnet attacks “and web-based attacks” and facilitate tracing the source of an attack; Proposed Resolution