Académique Documents
Professionnel Documents
Culture Documents
New Challenges
Brijesh Kumar, Ph.D.
Princeton Jct, NJ 08550
Brijesh_kumar@hotmail.com
A talk delivered on 11/05/2008
Contents Overview
The problem
Historical Perspective
Software - Vulnerability
Networks IP protocols, Routing, DNS and
SMTP, VoIP
Web - IIS, Apache
Wireless - Cellular, Wi-Fi Security
Sniffers
High
Skills
Cross Site
Scripting
Mobile
Injections
Denial of Service
Wireless WEP/
Channel Scanning
Staged Attack
Packet Spoofing
Sweepers
Self Replicating Code
Disabling
Audits
Backdoors
Distributed
Attack
Tools
Web Attacks
Stealth/ Advanced
Scanning
GUI
Low
Skills
Password
Guessing
1980
Exploiting Known
Vulnerabilities
Password
Cracking
1985
1990
1995
Source: Extended from Julia H. Allen, CERT Guide to System and Network Security, Addison Wesley, 2001
2000
2005
Heterogeneous
Difficult to maintain and Manage
Difficult to Control Exit/ Entry
High Speed 10 GB to 40 GB interfaces
Network Growth
Attacker
?
?
Network Cloud
?
?
?
?
Reported Observations
1/256th of all victim
responses to spoofed
addresses
?
Attack
Reply
Source: caida.org/ucsd
Monitored
Address
Space
Victim
Before
9:30PM (PST)
After
9:45PM (PST)
Source: caida.org/ucsd
Emergence of Botnets
Significant transition in motivation for widespread,
non-specific malicious activity
New Challenges
Malicious Code
Spyware / Snoopware
Keylogger (Unauthorized)
21
6/3/2009
Security Measures
Security measures Can be defined as Three
Prevention
Detection
Response.
Software Security
Inter-process barriers
Sandboxed Tasks
Defensive programming
buffer overflows,
code/command injection.
Network Security
Wireless:
Wireless Wi-Fi Security So much has already been written and said.
Cellular Wireless So far Isolated from these threats. But Emerging.
Thank You