Title: Framework
1Computer Crime and Security Survey
2Computer Crime and Security Survey
3Computer Crime and Security Survey
4Computer Crime and Security Survey
5Other Empirical Attack Data
- SecurityFocus
- Attack Frequency
- 129 million network scanning probes (13,000 per
firm) - 29 million website attacks (3,000 per firm)
- 6 million denial-of-service attacks (600 per firm)
6Other Empirical Attack Data
- SecurityFocus
- Attack Targets
- 31 million Windows-specific attacks
- 22 million UNIX/LINUX attacks
- 7 million Cisco IOS attacks
- All operating systems are attacked!
7Attack Trends
- Growing Incident Frequency
- Incidents reported to the Computer Emergency
Response Team/Coordination Center - 1997 2,134
- 1998 3,474 (75 growth from previous year)
- 1999 9,859 (164 growth)
- 2000 21,756 (121 growth)
- 2001 52,658 (142 growth)
- Tomorrow?
8Framework for Attacks
Attacks
Social Engineering -- Opening Attachments Password
Theft Information Theft
Physical Access Attacks -- Wiretapping Server
Hacking Vandalism
Dialog Attacks -- Eavesdropping Impersonation Mess
age Alteration
Penetration Attacks
Malware -- Viruses Worms
Denial of Service
Scanning (Probing)
Break-in
9Social Engineering Attacks and Defenses
- Social Engineering
- Tricking an employee into giving out information
or taking an action that reduces security or
harms a system - Opening an e-mail attachment that may contain a
virus - Asking for a password claiming to be someone with
rights to know it - Asking for a file to be sent to you
10Social Engineering Attacks and Defenses
- Social Engineering Defenses
- Training
- Enforcement through sanctions (punishment)
11Eavesdropping on a Dialog
Dialog
Hello
Client PC Bob
Server Alice
Hello
Attacker (Eve) intercepts and reads messages
12Impersonation and Authentication
Im Bob
Prove it! (Authenticate Yourself)
Attacker (Eve)
Server Alice
13Message Alteration
Dialog
Balance 1,000,000
Balance 1
Server Alice
Balance 1
Balance 1,000,000
Attacker (Eve) intercepts and alters messages
14Scanning (Probing) Attacks
Reply from172.16.99.1
Probe Packets to 172.16.99.1, 172.16.99.2, etc.
Host 172.16.99.1
Internet
Attacker
No Host 172.16.99.2
Results 172.16.99.1 is reachable 172.16.99.2 is
not reachable
No Reply
Corporate Network
15Single-Message Break-In Attack
1. Single Break-In Packet
2. Server Taken Over By Single Message
Attacker
16Denial-of-Service (DoS) Flooding Attack
Message Flood
Server Overloaded By Message Flood
Attacker
17Network Penetration Attacks and Firewalls
Attack Packet
Internet Firewall
Hardened Client PC
Internet
Attacker
Internal Corporate Network
Log File