Return to Video

Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape

  • 0:02 - 0:05
    >> Brian: Welcome to the AMA
    Conference Center in New York City
  • 0:05 - 0:09
    and for those following us on
    line, my name is Brian Cute.
  • 0:09 - 0:12
    I am the CEO of Public Interest Registry.
  • 0:12 - 0:17
    Public Interest Registry or PIR
    is the operator of the dot org,
  • 0:17 - 0:19
    top level domain on the internet.
  • 0:19 - 0:25
    We, along with New York Tech, a New York
    City based Technology Industry Association
  • 0:25 - 0:28
    and the Internet Society, New
    York Chapter want to welcome you
  • 0:28 - 0:35
    to today's event Mitigating DDoS Attacks, Best
    Practices for an Evolving Threat Landscape.
  • 0:35 - 0:42
    For those of you online, today's event is
    being webcast at the iSock Live Stream Channel
  • 0:42 - 0:44
    and on that channel you can also post questions.
  • 0:44 - 0:50
    We welcome questions from our online
    audience to bring into the Q&A session today.
  • 0:50 - 0:58
    You can also follow the event at
    the hashtag DDoS and with that,
  • 0:58 - 1:01
    let me introduce today's
    session, Mitigating DDoS Attacks,
  • 1:01 - 1:05
    Best Practices for an Evolving Threat Landscape.
  • 1:05 - 1:09
    Distributed denial of service
    attacks are deliberate attempts
  • 1:09 - 1:15
    to make internet connected machines or network
    resources unavailable to their intended users
  • 1:15 - 1:20
    by temporarily or indefinitely
    interrupting or suspending DNS service.
  • 1:20 - 1:27
    Unfortunately DDoS attacks are an all to-common
    reality across today's internet landscape.
  • 1:27 - 1:31
    Examples abound, most recently
    large-scale attacks have been directed
  • 1:31 - 1:36
    at major U.S. banks since September of 2012.
  • 1:36 - 1:41
    Online service providers and corporations
    around the world are often targeted.
  • 1:41 - 1:46
    DDoS attacks have been directed against
    Government websites and it's quite possible
  • 1:46 - 1:50
    that some attacks were at
    least condoned by governments.
  • 1:50 - 1:55
    Why a DDoS attack is motivated by criminal
    intent, like Cyber Extortion or is executed
  • 1:55 - 1:58
    as an extreme form of free expression,
  • 1:58 - 2:03
    the resulting service interruptions
    can have wide ranging effects.
  • 2:03 - 2:08
    Today's program will explore the motives
    behind and targets of DDoS attacks.
  • 2:08 - 2:13
    We will address ways attacks are carried
    out, as well as mitigation techniques
  • 2:13 - 2:16
    and the importance of collaboration.
  • 2:16 - 2:23
    We will also explore the risks of unintended
    consequences related to DDoS attacks.
  • 2:23 - 2:26
    Now before I introduce our esteem panelists,
  • 2:26 - 2:31
    I wanted to note that PIR recently
    conducted a survey in the United States
  • 2:31 - 2:36
    to test the public's awareness of
    DDoS attacks, this very important
  • 2:36 - 2:39
    and growing problem on the internet.
  • 2:39 - 2:42
    Among the results, we found that 85%
  • 2:42 - 2:47
    of the respondents did not
    know what AD DDoS Attack was.
  • 2:47 - 2:48
  • 2:48 - 2:53
    When asked, what would you do if you were made
    aware that DDoS attacks were taking place?
  • 2:53 - 2:59
    Among the very revealing responses
    were, "Call the geek squad,"
  • 2:59 - 3:04
    which is a technical service organization
    that comes to fix your home computer.
  • 3:04 - 3:10
    "Call my spouse, or go to Google."
  • 3:10 - 3:13
    And while we're very happy to have a Google
    Representative here on the panel today,
  • 3:13 - 3:19
    I think these answers reveal the depth
    and breadth of misunderstanding and lack
  • 3:19 - 3:23
    of awareness about this very
    important problem in the public.
  • 3:23 - 3:28
    So today we're going to try to begin
    to chip away and provide some awareness
  • 3:28 - 3:30
    about the important problem of DDoS attacks
  • 3:30 - 3:34
    and how we collectively can
    address them effectively.
  • 3:34 - 3:38
    So with that, let me get on to the
    introduction of today's panelists.
  • 3:38 - 3:42
    Today's panelists represent a
    variety of organizations that operate
  • 3:42 - 3:45
    at various points in the internet ecosystem.
  • 3:45 - 3:49
    Their wealth of experiences and
    insights from industry, government,
  • 3:49 - 3:55
    and civil society perspectives should help us
    better understand the challenges of DDoS attacks
  • 3:55 - 3:58
    and identify mitigation practices.
  • 3:58 - 4:03
    First, at the far-end, we have Mr. Jeff Greene.
  • 4:03 - 4:07
    Jeff serves as a senior policy
    council at Symantec.
  • 4:07 - 4:12
    Jeff focuses on cyber security,
    identity management, and privacy issues
  • 4:12 - 4:16
    and works extensively with industry
    and government organizations.
  • 4:16 - 4:21
    Prior to joining Symantec, Jeff was a
    senior staffer on both the U.S. Senate,
  • 4:21 - 4:25
    and House Homeland Security Committees
    and before that was an Attorney
  • 4:25 - 4:28
    with the Washington D.C. law firm.
  • 4:28 - 4:30
    Next we have Ram Mohan.
  • 4:30 - 4:36
    Ram is the Executive Vice President and
    Chief Technology Officer at Afilias Limited.
  • 4:36 - 4:41
    Ram oversees key strategic management
    and technology choices for the Dublin,
  • 4:41 - 4:44
    Ireland based provider of
    internet infrastructure services.
  • 4:44 - 4:49
    Ram also serves as a Director and Key Advisor
    to the Internet Corporation for Assigned Names
  • 4:49 - 4:56
    and Numbers or ICANN, The Internet Society,
    and the Anti-Phishing Working Group.
  • 4:56 - 5:01
    Next, we have Dr. Damian Menscher.
  • 5:01 - 5:06
    Damian is a Security Engineer at Google
    where he leads the DDoS Defense Team.
  • 5:06 - 5:11
    Damian uses his front-line experience defending
    today's largest attacks to design defenses
  • 5:11 - 5:15
    that will automatically mitigate future attacks.
  • 5:15 - 5:20
    He also reduces botnet sizes by directly
    informing users of infections on their machines
  • 5:20 - 5:23
    that are targeted messaging on Google.
  • 5:23 - 5:25
    Previously, Damian gained experience
  • 5:25 - 5:31
    in large-scale data analysis while completing
    his PhD in Computational Particle Physics.
  • 5:31 - 5:33
    I could barely say that.
  • 5:33 - 5:35
    Next is Miguel Ramos.
  • 5:35 - 5:41
    Miguel is Senior Product Manager at NewStar
    Inc, responsible for NewStar site project,
  • 5:41 - 5:45
    a leading cloud-based DDoS Mitigation Service.
  • 5:45 - 5:51
    Mr. Ramos has extensive experience in
    product management, marketing and technology.
  • 5:51 - 5:55
    Previously Miguel was a Product Manager in
    charge of hosting and email product lines
  • 5:55 - 6:00
    at Network Solutions, a leading domain
    registrar and online services provider.
  • 6:00 - 6:05
    We were also to have Wout
    DeNatris from the Netherlands.
  • 6:05 - 6:11
    Unfortunately Wout is here in New York but came
    down with a sudden illness of food poisoning.
  • 6:11 - 6:13
    We regret deeply that he's
    not here with us today.
  • 6:13 - 6:18
    He was very eager to be here with
    you and we wish him a swift recovery.
  • 6:18 - 6:22
    Next on the panel is Danny McPherson.
  • 6:22 - 6:26
    Danny is the Chief Security Officer
    for Verisign, the trusted provider
  • 6:26 - 6:31
    of key internet infrastructure services
    including two of the root servers,
  • 6:31 - 6:34
    and the dot com and dot net name spaces.
  • 6:34 - 6:38
    Danny is responsible for strategic
    direction, research and innovation
  • 6:38 - 6:40
    in infrastructure and information security.
  • 6:40 - 6:45
    He currently serves on the internet
    architecture board, ICANN security
  • 6:45 - 6:51
    and stability advisory council, the
    FCCs communication security reliability
  • 6:51 - 6:55
    and interoperability council and
    several other industry forum.
  • 6:55 - 6:59
    And finally, on the near-end,
    we have Miss Jillian York.
  • 6:59 - 7:06
    Jillian is a Director for International Freedom
    of Expression at Electronic Frontier Foundation
  • 7:06 - 7:11
    where she specializes in free speech issues
    and the effects of corporate intermediaries
  • 7:11 - 7:13
    on freedom of expression and anonymity,
  • 7:13 - 7:17
    as well as the disruptive power
    of global, online activism.
  • 7:17 - 7:23
    Prior to joining EFF, Jillian spent 3 years at
    Harvard University's Berkman Center for Internet
  • 7:23 - 7:29
    and Society, where she worked on several
    projects including the open net initiative.
  • 7:29 - 7:32
    Thank you all for coming,
    we appreciate your time.
  • 7:32 - 7:36
    Now the way we're going to structure
    today's event and discussion is
  • 7:36 - 7:42
    that I will do a first round of introductory
    remarks from each of the panelists.
  • 7:42 - 7:45
    We'll keep it brief and we're
    basically going to try
  • 7:45 - 7:49
    to set the stage, the background
    on DDoS attacks.
  • 7:49 - 7:56
    Now before I get there, I just want to
    offer a little reaction from the common man.
  • 7:56 - 7:58
    "I've been in the industry myself for 10 years.
  • 7:58 - 8:02
    I have a familiarity with DDoS
    attacks and internet infrastructure,
  • 8:02 - 8:07
    but in approaching this event and preparing
    for it, I went on line and pretended
  • 8:07 - 8:10
    to be an average guy from Columbus, Ohio.
  • 8:10 - 8:16
    What would I find if I'm trying to educate
    myself online about this serious problem?
  • 8:16 - 8:23
    And in doing that, what jumped out to me is an
    issue of nomenclature, an issue of language,
  • 8:23 - 8:27
    an issue of understanding, potentially
    barriers to understanding and awareness."
  • 8:27 - 8:33
    So I'm going to ask Jeff Greene to start
    painting the picture of what DDoS attacks are
  • 8:33 - 8:36
    and while we have a number of
    brilliant engineers on this panel,
  • 8:36 - 8:40
    let me suggest that when one goes online
    as the average guy from Columbus, Ohio,
  • 8:40 - 8:51
    he runs into things such as, dos, DDoS, DRDoS,
    Smurf attacks, SYN floods, ping of death,
  • 8:51 - 8:56
    attacks that are perpetrated by Trojans
    and Zombies, attacks that are combated
  • 8:56 - 9:01
    through techniques like Black-holing,
    sink-holing, and intrusion protection.
  • 9:01 - 9:06
    Our job today is to utilize the expertise
    of these brilliant folks on our panel
  • 9:06 - 9:11
    to help translate all of these very intimidating
    words around attacks on the internet
  • 9:11 - 9:13
    so that we can raise the
    awareness for the public.
  • 9:13 - 9:17
    So, Jeff if you wouldn't
    mind kicking this off for us.
  • 9:17 - 9:19
    >> Jeff: Sure, thanks again for
    having me and thanks for including me
  • 9:19 - 9:22
    with such a great group of folks up here.
  • 9:22 - 9:28
    I thought I'd give a little background on
    what are some trends we're seeing at Symantec
  • 9:28 - 9:35
    in DDoS attacks, motivations also, and
    hopefully set the table for the conversation.
  • 9:35 - 9:40
    The first thing I would start by saying is,
    when you're thinking about a DDoS attack,
  • 9:40 - 9:44
    don't conceptualize it as a
    single event or a siloed activity.
  • 9:44 - 9:49
    You really need to think about it as potentially
    part of a larger effort directed at you
  • 9:49 - 9:52
    or directed at an entity organization.
  • 9:52 - 9:55
    It can still be a one-off but
    more often now days, it is not.
  • 9:55 - 10:01
    In terms of motives, they can run the gamut, it
    can be harassment, political, it could mischief,
  • 10:01 - 10:06
    you know there's probably still some
    15-year-old hackers in the basement somewhere.
  • 10:06 - 10:09
    It could be someone you know, annoyed,
  • 10:09 - 10:14
    frustrated with a particular company
    or entity and going after them.
  • 10:14 - 10:16
    It really runs anything.
  • 10:16 - 10:22
    It could extortion, simple "pay me"
    type activity, or more common now
  • 10:22 - 10:28
    or what we're seeing more of what we're calling
    multi-frank attacks and transitioning to talk
  • 10:28 - 10:31
    about some of trends, we'll start there.
  • 10:31 - 10:36
    If you folks saw, I think it was in October,
    Defense Secretary Panetta was talking
  • 10:36 - 10:40
    about cyber security and one of the things
    he mentioned were these frank attacks
  • 10:40 - 10:46
    and DDoS is certainly a part of them and has
    become less of a blunt-force attack to more
  • 10:46 - 10:50
    of a sophisticated diversionary
    attack; I should say it can be.
  • 10:50 - 10:59
    The goal, basically being drawing attention and
    resources away from standard security to focus
  • 10:59 - 11:03
    on this response and leaving perhaps
    yourself open to other activity.
  • 11:03 - 11:10
    One example that we talked about at a conference
    earlier this year, DDoS was a big part of it
  • 11:10 - 11:16
    but the DDoS attack happened
    actually at the end of the activity.
  • 11:16 - 11:18
    This particular effort was
    directed to mid-sized banks.
  • 11:18 - 11:22
    It began with spear-phishing and other efforts
  • 11:22 - 11:25
    to compromise some IT administrators
    at the bank.
  • 11:25 - 11:31
    Once that is successful, the bad guys will then
    spend their time figuring out what they need
  • 11:31 - 11:36
    and they want and it was at this point
    that the DDoS attack was launched in one
  • 11:36 - 11:38
    of the cases that our folks talked about.
  • 11:38 - 11:43
    It was done on a Friday afternoon when staffing
    was light, nationally resources were directed
  • 11:43 - 11:49
    at responding to the denial service attack which
    then left other activities perhaps unmonitored,
  • 11:49 - 11:52
    and that's when the criminal enterprise
  • 11:52 - 11:57
    or individual actually began the more
    sophisticated attack and actually traded a lot
  • 11:57 - 12:02
    of information that allowed them to
    clone ATM Debit and Credit Cards.
  • 12:02 - 12:08
    There press reports about one bank having
    lost 9 million dollars over the next 48 hours.
  • 12:08 - 12:11
    So again, the DDoS was a big part of it
  • 12:11 - 12:16
    because it had really facilitated the
    ability to conduct a larger crime.
  • 12:16 - 12:21
    Another trend we're seeing is
    crowd sourcing of DDoS attack.
  • 12:21 - 12:28
    You may be familiar with operation payback,
    which is something that Anonymous was behind.
  • 12:28 - 12:34
    Initially started as a response to some
    antipiracy efforts and worked into a response
  • 12:34 - 12:39
    when the wikileaks became
    very press-worthy in terms
  • 12:39 - 12:45
    of some companies responding to the wikileaks.
  • 12:45 - 12:53
    So social networking facilitates the crowd
    sourcing essentially why do you need to go build
  • 12:53 - 12:58
    up or acquire your own botnet to
    engage in attack when you could get 100
  • 12:58 - 13:01
    or 1,000 like-minded friends who
    will happily do that thinking
  • 13:01 - 13:03
    that they're doing something
    for the greater good.
  • 13:03 - 13:09
    And I would also suggest that the criminal
    enterprises are fully aware of this
  • 13:09 - 13:15
    and why should they expose themselves or spend
    their resources if they can gin up some real
  • 13:15 - 13:20
    or imagined front by a company they're
    trying to penetrate and get people
  • 13:20 - 13:23
    to unwittingly support their efforts.
  • 13:23 - 13:27
    Another trend is application layer attacks.
  • 13:27 - 13:31
    More sophisticated, generally
    you get more bang-for-your-buck,
  • 13:31 - 13:34
    you can have more impact with less resources.
  • 13:34 - 13:37
    It takes a little more work, but it is something
  • 13:37 - 13:40
    that you will see more of,
    we suspect going forward.
  • 13:40 - 13:45
    Two more things, one insider
    threat, not strictly DDoS
  • 13:45 - 13:46
    but it is certainly can be a part of it.
  • 13:46 - 13:52
    What we're seeing generally with intrusions is
    an increasing number of compromised insiders.
  • 13:52 - 13:55
    Again, often through use of social
    media, social media is wonderful.
  • 13:55 - 13:59
    So it allows folks to figure
    out just how to get at someone
  • 13:59 - 14:02
    and a compromising insider
    facilitates the effort and again,
  • 14:02 - 14:05
    often the DDoS is part of
    the culmination of it there.
  • 14:05 - 14:08
    Finally I would say it's
    getting easier than ever.
  • 14:08 - 14:15
    There are attack kits, there's malware out there
    that you can buy, optimized for DDoS attacks.
  • 14:15 - 14:17
    As all the attack kits out there,
  • 14:17 - 14:20
    they're becoming much easier
    for less sophisticated users.
  • 14:20 - 14:24
    You don't have to have a lot coding
    expertise to get some of these up and running
  • 14:24 - 14:29
    and have yourself an ongoing
    criminal enterprise.
  • 14:29 - 14:32
    So, circling back to where I began, I
    would say that, you know we're here talking
  • 14:32 - 14:37
    about DDoS attacks but I think it's important
    in this conversation not to put it in a box
  • 14:37 - 14:41
    and isolate it from other malicious activities
    that going on and other vulnerabilities
  • 14:41 - 14:46
    and intrusions because the bad guys don't
    think about it that way so we really,
  • 14:46 - 14:51
    as we're talking about responding to
    it, make sure that we don't do the same.
  • 14:51 - 14:54
    >> Brian: Thank you Jeff, so in listening
    I'm hearing that I have more things
  • 14:54 - 14:56
    to be concerned about, more
    things to be afraid of,
  • 14:56 - 14:59
    something called spear-phishing,
    I'm not sure what that is.
  • 14:59 - 15:06
    That this is a broader attack profile against
    the internet that there's numerous points
  • 15:06 - 15:13
    of attack and it's part a simple attack
    that is designed to provide misdirection
  • 15:13 - 15:15
    so a secondary attack can happen.
  • 15:15 - 15:21
    So clearly, this is a troubling
    landscape that I'm trying to sort through.
  • 15:21 - 15:27
    Ram, as Afilias Registry Operator on the
    internet, you provide technical services
  • 15:27 - 15:30
    for dot org, on the internet
    and other top-level domains.
  • 15:30 - 15:36
    From the Registry Operators perspective,
    what is the scope of this problem?
  • 15:36 - 15:41
    >> Ram: Thank you Brian and
    thanks for having me here.
  • 15:41 - 15:44
    I guess the very first thing is,
    if you're a Registry Operator,
  • 15:44 - 15:49
    really what you're doing is
    you're providing a targeted answer
  • 15:49 - 15:53
    for where the main names are on the internet.
  • 15:53 - 15:58
    You're in a target of directory, to a large
    extent and that's the biggest job that you do
  • 15:58 - 16:04
    as Registry and you get information
    from people who want to buy domain names
  • 16:04 - 16:06
    or who want to get a website going.
  • 16:06 - 16:09
    You get information from them,
    store it into a large database,
  • 16:09 - 16:15
    and the biggest thing you do is propagate it
    instantaneously everywhere around the world.
  • 16:15 - 16:21
    And what that means, is that your browser,
    typing in redcross.org when it's sitting here
  • 16:21 - 16:28
    or on your mobile phone, typing in redcross.org
    when your perhaps in another part of the world,
  • 16:28 - 16:34
    they all translate to get to the actual Red
    Cross site, and that translation is done
  • 16:34 - 16:36
    by the registry, by the directory.
  • 16:36 - 16:45
    So that makes it a really interesting place to
    attack because after all if you can compromise
  • 16:45 - 16:50
    or if you can take down the
    authoritative directory for every dot or,
  • 16:50 - 16:53
    the main-name in the world, there are
    more than 10 million dot org domain names.
  • 16:53 - 16:56
    There are more than 10 million
    dot org websites in the world.
  • 16:56 - 17:03
    If you can take down the provider who is giving
    the information that says to every computer
  • 17:03 - 17:08
    in the world, hey for a given dot
    org, which computer should I go to?
  • 17:08 - 17:09
    Where should I go to?
  • 17:09 - 17:15
    If you can take them down, that's not only
    a coo, but that also is a global event.
  • 17:15 - 17:19
    It gets you noticed, there are many motivations
    but that's certainly one of them, right?
  • 17:19 - 17:26
    And that makes the order of registry, a
    [inaudible] of what we run a regular target.
  • 17:26 - 17:32
    Up on the screen you see, this is
    some data from earlier in the year,
  • 17:32 - 17:36
    gives you an idea of the scaling, the
    kinds of attacks that come through.
  • 17:36 - 17:46
    So that's 2012, February and from 2012 February,
    to 2012 June, this is the number of queries,
  • 17:46 - 17:53
    the number of a requests coming into the servers
    that we run worldwide asking for information
  • 17:53 - 17:56
    about a daughter of domain name right.
  • 17:56 - 18:03
    And much of this comes from DDoS so, the
    foundation for DDoS is very simple, right?
  • 18:03 - 18:09
    It's a denial of service so all these computers
    around the world do it, they send a request
  • 18:09 - 18:16
    in to our server saying hey, tell me where
    a particular daughter of domain name is.
  • 18:16 - 18:21
    And before you even respond they're gone and
    they come back again and they say tell me where.
  • 18:21 - 18:28
    And they do this hundreds of millions of times
    in, it used to be a very short timeframe,
  • 18:28 - 18:31
    but as you can see here,
    it's an extended timeframe.
  • 18:31 - 18:35
    Now what we saw earlier in the year
    was in the space of just a few months,
  • 18:35 - 18:40
    February through to June, we had
    a 3X increase, a 3 times increase
  • 18:40 - 18:44
    in the total volume coming
    in in just 4 months-time.
  • 18:44 - 18:50
    But, if you look further, if you look in
    the next screen, that's not the real story.
  • 18:50 - 18:56
    That 3X increase that I showed you
    earlier, so that was up to 2012,
  • 18:56 - 19:00
    June but look at what happened
    from there through to September.
  • 19:00 - 19:06
    That was a 9X increase in total volume
    coming through to the daughter systems.
  • 19:06 - 19:14
    In total, from February through to September,
    that was an 18 times increase in volume.
  • 19:14 - 19:18
    Not the data is interesting.
  • 19:18 - 19:25
    The real life importance of this is if as a
    registry provider, if you're not provisioned
  • 19:25 - 19:31
    and if you don't have the measures to boot the
    [inaudible] attacks are coming and then be able
  • 19:31 - 19:35
    to take appropriate counter measures
    when such attacks are coming.
  • 19:35 - 19:42
    You could just go down and going drinking
    water means that every single dot org website
  • 19:42 - 19:47
    in the world, dot org email address, okay
    every single thing that depends on dot org,
  • 19:47 - 19:55
    sooner or later is not accessible on the
    internet and it's not happened so far,
  • 19:55 - 20:00
    but the gap between what do you
    provision, and what the scale
  • 20:00 - 20:02
    of attacks, and who was attacking you.
  • 20:02 - 20:06
    It's a continuous cat and mouse game.
  • 20:06 - 20:16
    The other thing that I've wanted for you to
    know about is the DDoS words coming from,
  • 20:16 - 20:26
    it's often coming from your PC that is just on
    at home, connected to your broadband connection.
  • 20:26 - 20:29
    Just sitting there, and you
    probably don't even know it.
  • 20:29 - 20:34
    If you have a good ISB, if you have a good
    internet provider, they probably have ways
  • 20:34 - 20:38
    to track it and many of the internet
    providers these days are putting in measures
  • 20:38 - 20:45
    to understand whether they're a DDoS
    attack, so whether you're part of a botnet.
  • 20:45 - 20:48
    But when we say a zombie,
    that's really what it is.
  • 20:48 - 20:56
    Your computer, your computing device somewhere
    connected online, has been taken over,
  • 20:56 - 21:06
    and you don't know it but it's now part of a
    global group of computers that can be harnessed
  • 21:06 - 21:10
    to attack any given target at a moment's notice.
  • 21:10 - 21:16
    And that is pretty scary, it's a
    pretty impressive feat of engineering,
  • 21:16 - 21:23
    but it's scary because pulling together
    5 million of these is no big deal.
  • 21:23 - 21:28
    Pulling together 40 million of these,
    takes some effort but it's doable.
  • 21:28 - 21:35
    And if you have 40 million computers
    that are just sending a little ping every
  • 21:35 - 21:40
    so many milliseconds, asking for
    information and then just going away,
  • 21:40 - 21:47
    that becomes a massive problem and
    something that you really have to work hard
  • 21:47 - 21:50
    to mitigate before it overwhelms you
  • 21:50 - 21:54
    because if it becomes a tsunami,
    it's very hard to overcome.
  • 21:54 - 21:58
    >> Brian: Thank you Ram and thank you for
    giving pictures are worth a million words
  • 21:58 - 22:02
    and giving us a sense of the scope of
    the problem and also in your comments,
  • 22:02 - 22:07
    connecting this to the "why should
    I care" question as an individual
  • 22:07 - 22:12
    if all the dot org sites in the world go down,
    the organization who have that website up,
  • 22:12 - 22:16
    whether they're an NGO or not-for-profit
    trying to do good in their mission
  • 22:16 - 22:20
    or whether it's an individual
    or a company in a dot com,
  • 22:20 - 22:23
    having their commercial activities
    interrupted, that's a very serious impact.
  • 22:23 - 22:28
    So as we move through the discussion,
    connecting the dots to "why should I care",
  • 22:28 - 22:31
    the individual at home, and
    also the interesting thing is
  • 22:31 - 22:37
    that I might be an unwitting participant in
    an attack, my machine on my desk at home,
  • 22:37 - 22:39
    and be completely unaware of this.
  • 22:39 - 22:42
    I think we're starting to get to
    those issues of "why I should care".
  • 22:42 - 22:48
    So next, let's get to I think,
    it's Dr. Damian Menscher.
  • 22:48 - 22:53
    So we've heard from a Registry Operator
    now from an online service provider,
  • 22:53 - 22:57
    in this case Google, the leading search engine.
  • 22:57 - 23:03
    Damian with Google's breadth and depth of
    technology and reach, this certainly can't be
  • 23:03 - 23:06
    that big of a concern for a
    company the size of Google, right?
  • 23:06 - 23:09
    Tell me why I'm wrong.
  • 23:09 - 23:15
    >> Damian: Right because we have a team
    of people that worries about this stuff.
  • 23:15 - 23:19
    So, most people don't realize that
    Google is actually regularly attacked.
  • 23:19 - 23:24
    The reasons you'd sort of wonder why
    would anyone have anything against Google?
  • 23:24 - 23:27
    Well it turns out we actually
    host a lot of user content,
  • 23:27 - 23:31
    so blogspy includes random user
    content from people all over the world.
  • 23:31 - 23:34
    Sometimes that's controversial.
  • 23:34 - 23:38
    Similarly u-Tube might have
    a controversial video on it
  • 23:38 - 23:43
    and so frequently these sorts
    of sites do get attacked.
  • 23:43 - 23:49
    And it's not just DNSs as previously mentioned,
    it's you know, we see application layer attacks
  • 23:49 - 23:54
    where they'll dispatch the same homepage
    over and over again at very high rates,
  • 23:54 - 23:59
    you know upwards of maybe
    a million times a second.
  • 23:59 - 24:03
    So, you've also probably noticed that we're
    never actually down so, if you want to talk
  • 24:03 - 24:06
    about how we do that, if
    you go to the first slide.
  • 24:06 - 24:13
    So we benefit a lot from economy of scale
    when you look at most small websites,
  • 24:13 - 24:16
    there might be a thousand
    websites hosted on a single machine
  • 24:16 - 24:19
    because they don't get very much traffic.
  • 24:19 - 24:22
    We sort of turned that around and we might
    have a thousand machines hosting one website.
  • 24:22 - 24:28
    You know Google.com is a big website,
    it doesn't fit on a single machine.
  • 24:28 - 24:32
    So we do benefit a lot from the economy of scale
  • 24:32 - 24:36
    and pooling our defense resources
    across our various properties.
  • 24:36 - 24:41
    But, go to the next slide, you have
    to be a little bit careful about this
  • 24:41 - 24:44
    if you put everything together,
    you also have some risk.
  • 24:44 - 24:52
    So, I wanted to talk briefly about how
    we deal with this and this also is,
  • 24:52 - 24:56
    as Jeff had mentioned, we have to be careful
  • 24:56 - 24:59
    that we don't distract our security
    team when there is a dos attack.
  • 24:59 - 25:03
    If we have one team that
    focuses on all of security,
  • 25:03 - 25:06
    then when there's a dos attack we might
    be looking at that and miss other things.
  • 25:06 - 25:14
    So, what we do actually is, go
    on, we have layered defenses.
  • 25:14 - 25:18
    So we have a separate team that
    focuses on dos attacks so that
  • 25:18 - 25:21
    when there's an attack we don't
    lose sight of the other attacks
  • 25:21 - 25:24
    that are happening against us every day.
  • 25:24 - 25:32
    And, basically we focus on having layered
    defenses so; this is a very rough sketch
  • 25:32 - 25:33
    of what our network might look like.
  • 25:33 - 25:37
    We don't see the internet
    necessarily as a single cloud.
  • 25:37 - 25:43
    We see it as multiple clouds because we
    peer directly with several major ISPs.
  • 25:43 - 25:48
    We go through a layer of
    load balancing at our network
  • 25:48 - 25:54
    so if any particular network device gets
    overloaded, we can work around that.
  • 25:54 - 26:01
    Then we go through a layer of load balancing
    within our own network to eventually get
  • 26:01 - 26:05
    to the backend that are the
    webservers, serving the actual content.
  • 26:05 - 26:08
    And so by doing this, we're
    able to shift traffic
  • 26:08 - 26:13
    around to avoid any damage
    from the attack traffic.
  • 26:13 - 26:17
    We also have many layers of which we
    can filter out the bad traffic so,
  • 26:17 - 26:22
    at the very edge of our network we might be able
    to filter out some of the more obvious attacks,
  • 26:22 - 26:30
    but as you get deeper in or more sophisticated
    attacks, we filter them at other places.
  • 26:30 - 26:37
    Another thing I want to mention though is, this
    style works really well for a very large company
  • 26:37 - 26:42
    like Google, but most of you are probably more
    interested in how to defend the small site
  • 26:42 - 26:51
    and the best advice I have there is that
    the user comment of going to Google,
  • 26:51 - 26:54
    might actually make sense if
    they host their site on Google,
  • 26:54 - 26:56
    they automatically benefit from our defenses.
  • 26:56 - 26:58
    They won't even know they're being attacked.
  • 26:58 - 27:04
    And we frequently do see cases of
    organizations that are under a heavy, dos attack
  • 27:04 - 27:09
    and they just quickly setup a site on
    blogger saying, "Hey, we're being attacked.
  • 27:09 - 27:12
    We're going to use this for
    our communication for now."
  • 27:12 - 27:17
    That's actually, at one point, the
    country of Georgia had their ministry
  • 27:17 - 27:23
    of foreign affairs host their site on blogger
    which was entertaining for me to say, like oh,
  • 27:23 - 27:28
    what are we going to see as a result of this?
  • 27:28 - 27:33
    But the other thing is just making sure that
    you are pooling your resources with others
  • 27:33 - 27:40
    in your organization, there are other cloud
    based dos mitigation providers that sort
  • 27:40 - 27:47
    of aggregate resources from several different
    clients and can provide good defenses for you.
  • 27:47 - 27:50
    >> Brian: Thank you Damian, and love ice.
  • 27:50 - 27:52
    It's terrific.
  • 27:52 - 27:55
    >> Damian: Also our PR people would
    want me to say it's not as weak
  • 27:55 - 27:59
    as eggs, you know like fortified eggs.
  • 27:59 - 28:00
    >> Brian: Boiled eggs.
  • 28:00 - 28:02
    [Laughter] No terrific, thank you.
  • 28:02 - 28:04
    >> Damian: Each layer is very strong.
  • 28:04 - 28:08
    >> Brian: Thank you and you know,
    fully appreciating your remarks too,
  • 28:08 - 28:15
    one thing that jumped out to me is that I
    think one of the challenges we all share
  • 28:15 - 28:19
    in this space is that from the user perspective,
    and I'm going to try to keep bringing us back
  • 28:19 - 28:25
    to the user and the average person at home,
    is that this problem, there's a low level
  • 28:25 - 28:30
    of awareness and one of the reasons is
    because as very responsible service providers
  • 28:30 - 28:35
    like Google and the other's on this panel,
    you've taken on the challenge and objective
  • 28:35 - 28:38
    of staying up and not being
    taken down by DDoS attack.
  • 28:38 - 28:44
    You've been successful to date and as
    such, users who have their sites on Google,
  • 28:44 - 28:49
    the DNS is sometimes thought of like
    electricity, you know it's just there.
  • 28:49 - 28:52
    It's my website is up, the internet is up.
  • 28:52 - 28:55
    I only notice it when it goes down.
  • 28:55 - 28:59
    I only become aware there's a
    problem when there's a problem.
  • 28:59 - 29:03
    So interesting thought, let's
    keep coming back to that
  • 29:03 - 29:05
    "why should the individual,
    why should the user care?"
  • 29:05 - 29:08
    How do we get this on their
    radar screen in a meaningful way
  • 29:08 - 29:10
    so they can become part of the solution?
  • 29:10 - 29:14
    So with that thought let's go to Miguel.
  • 29:14 - 29:20
    And Miguel we're going to ask you to
    focus on specifically corporate responses
  • 29:20 - 29:25
    from the perspective of a third-party
    mitigation service provider.
  • 29:25 - 29:26
    >> Miguel: Sure and thank you Brian.
  • 29:26 - 29:33
    I'm going to dovetail on some of
    the things that Damian was saying.
  • 29:33 - 29:38
    A lot of organizations and a lot of
    people don't understand or know about DDoS
  • 29:38 - 29:42
    and don't see an issue until
    it actually happens to them.
  • 29:42 - 29:46
    And at that point, a lot of
    organizations are kind of scrambling,
  • 29:46 - 29:51
    trying to figure out what it is that they
    can potentially do to deal with this issue.
  • 29:51 - 29:57
    And they most likely go to Google to try
    to determine and try to find an answer.
  • 29:57 - 30:03
    So, a lot of people don't think about
    this because they assume that their ISP
  • 30:03 - 30:07
    or their hoster is actually going to
    take care of the problem for them.
  • 30:07 - 30:13
    Actually, what tends to happen is that when
    an organization is under heavy DDoS attack,
  • 30:13 - 30:17
    the ISP and the hoster is looking
    at protecting their own assets
  • 30:17 - 30:21
    and will most likely just shut you down.
  • 30:21 - 30:24
    And so they might contact you and
    tell you you're under a DDoS attack
  • 30:24 - 30:27
    but they may not help you through it.
  • 30:27 - 30:33
    So, there are some things that organizations
    can do to help mitigate this risk.
  • 30:33 - 30:37
    Some organizations look at dealing
    with the DDoS problem themselves.
  • 30:37 - 30:39
    They'll look at buying their own hardware;
  • 30:39 - 30:42
    they'll look at provisioning
    bandwidth, etcetera.
  • 30:42 - 30:47
    Unfortunately a lot of organizations don't
    have the resources to be able to do that.
  • 30:47 - 30:51
    And it doesn't necessarily make sense for
    a lot of organizations because it's sort
  • 30:51 - 30:56
    of an arms-race and it's hard to spend
    your way out of dealing with this problem
  • 30:56 - 31:01
    as attacks larger and larger and
    more complicated and etcetera.
  • 31:01 - 31:09
    So, there some third-party options that
    organizations can look at that I would kind
  • 31:09 - 31:15
    of consider to be the infrastructure as a
    service that can be used on an on-demand basis
  • 31:15 - 31:19
    to help organizations deal with
    DDoS attack when they happen.
  • 31:19 - 31:26
    So the idea is simply, you don't necessarily
    have to over-provision all hardware,
  • 31:26 - 31:29
    bandwidth, etcetera to deal with the risk.
  • 31:29 - 31:36
    You can potentially use the third-party that has
    that capacity and capability when you need it.
  • 31:36 - 31:42
    And you know at that point you're looking at
    options like content distribution networks,
  • 31:42 - 31:47
    they can potentially help deal with
    absorbing some of this traffic and keeping
  • 31:47 - 31:49
    that traffic away from your network.
  • 31:49 - 31:55
    There's also cloud-based providers that
    specifically focus on the DDoS problem
  • 31:55 - 31:59
    and the idea there is if you're under an attack,
  • 31:59 - 32:03
    your organization can potentially redirect
    the traffic over to a cloud-based provider
  • 32:03 - 32:08
    that can absorb the traffic that
    knows how to mitigate and deal
  • 32:08 - 32:12
    with [inaudible] service attacks and then
    sends you basically the clean traffic.
  • 32:12 - 32:19
    It's sort of kind of putting a shield in front
    of your infrastructure on a non-demand basis
  • 32:19 - 32:21
    when you're dealing with these attacks.
  • 32:21 - 32:28
    So, infrastructure as a service is something
    that is more affordable for organizations
  • 32:28 - 32:32
    and something that organizations are
    starting to look at more and more
  • 32:32 - 32:35
    as a way to deal with this DDoS issue.
  • 32:35 - 32:38
    And certainly, there's a lot
    of information about that
  • 32:38 - 32:42
    on Google and it's key to become informed.
  • 32:42 - 32:46
    >> Brian: Thanks Miguel, so we're beginning to
    get a clear picture of the scope of the problem
  • 32:46 - 32:52
    from a number of different perspectives and in
    addition to service providers such as Google
  • 32:52 - 32:58
    and Afilias, Verisign and NewStar maintaining
    their services in a way that keeps them
  • 32:58 - 33:01
    up 24/7 and addresses these attacks.
  • 33:01 - 33:06
    There are 4 certain organizations
    specific resources available if needed
  • 33:06 - 33:11
    and that's interesting as we're
    beginning to, after setting the scene,
  • 33:11 - 33:16
    now let's transition towards those solutions
    as mitigation efforts, the services that are
  • 33:16 - 33:20
    out there to design specifically
    to provide additional protection.
  • 33:20 - 33:28
    As we transition, Danny I want you to help the
    audience understand some domestic initiatives
  • 33:28 - 33:32
    such as the anti-botnet work
    undertaken by CSIRC and help us to begin
  • 33:32 - 33:38
    to understand how we can begin to collectively
    come together to address this problem.
  • 33:38 - 33:39
    >> Danny: Yes sir thanks Brian.
  • 33:39 - 33:43
    So there have been a large number
    of clamber of efforts between public
  • 33:43 - 33:50
    and private sector related to botnet infections,
    compromised machines, male code proliferation,
  • 33:50 - 33:55
    virulence of threats on the internet, just
    this broad swath of malicious activity.
  • 33:55 - 34:01
    It's a nontrivial problem to solve because the
    ISPs for example, a lot of folks point fingers
  • 34:01 - 34:05
    at the ISPs, but the ISPs don't [inaudible]
    systems, their [inaudible] system in particular,
  • 34:05 - 34:10
    the broadband ISP user residential
    consumers that acquire service from the ISP,
  • 34:10 - 34:14
    and the ISP shouldn't be looking
    at their traffic and you know
  • 34:14 - 34:17
    and they have privacy concerns or other things.
  • 34:17 - 34:21
    So, what sort of controls the capabilities
    of the ISPs actually add to help them.
  • 34:21 - 34:24
    So a number of efforts have
    been underway actually.
  • 34:24 - 34:27
    One such example is the FCC sizerk3,
  • 34:27 - 34:31
    working group 7 recently published
    something called the ABC for ISPs
  • 34:31 - 34:36
    and it's basically the anti-botnet code and
    they develop with a number of other folks
  • 34:36 - 34:42
    in the industry monolog messaging and ANIB's
    working group as well as some publication
  • 34:42 - 34:48
    in the IETF and broader participation,
    actually internationally from folks from Japan,
  • 34:48 - 34:53
    Cyber Clean to Australia, Finland,
    Germany, other folks and it basically talks
  • 34:53 - 34:58
    about some fundamental things that ISPs
    can do to help educate, protect, notify,
  • 34:58 - 35:02
    detect malicious threats associated with their
    consumers and then activity they might take
  • 35:02 - 35:04
    to help to clean that problem or sanitize
  • 35:04 - 35:07
    or provide a little better
    hygiene on their infrastructure.
  • 35:07 - 35:12
    So, one pointer there is one of the
    reports, the ABCs again, for ISPs,
  • 35:12 - 35:20
    you can find it on the [inaudible] website
    or the FCC sizerk3, working group 7 webpage
  • 35:20 - 35:25
    that you can find easily via Google
    and so that's certainly one effort.
  • 35:25 - 35:27
    One of the fundamental things,
    going back to the user,
  • 35:27 - 35:30
    is there anyone on the receiving
    end of a DDoS attack?
  • 35:30 - 35:33
    What you should definitely be looking at
    is sort of what enables your business?
  • 35:33 - 35:37
    Most of the folks on this panel, you
    know network is our business all right,
  • 35:37 - 35:39
    we're going to focus on providing
    network services and availability.
  • 35:39 - 35:44
    We're absolutely committed to the security and
    stability of our infrastructure and services,
  • 35:44 - 35:47
    but a lot of folks, network
    enables their business.
  • 35:47 - 35:52
    It enables your email or your web
    presents or your small business
  • 35:52 - 35:54
    or your e-commerce or retail site.
  • 35:54 - 35:59
    And so irrespective of what
    it is, you absolutely need
  • 35:59 - 36:03
    to consider what the critical network assets
    are or the critical assets across the board
  • 36:03 - 36:11
    to your organization and you identify those, you
    say what's the impact of an availability issue
  • 36:11 - 36:16
    or security issue or a compromise of
    information impacting those assets?
  • 36:16 - 36:21
    And how might I put controls in place to
    help mitigate that or to at least have a plan
  • 36:21 - 36:26
    to respond if there's a DDoS attack or a breach
    inside my infrastructure, those sorts of things.
  • 36:26 - 36:31
    You know one of the things that I've seen in
    the past, we did this survey for several years,
  • 36:31 - 36:35
    a previous employer of mine, and
    most of the folks that responded
  • 36:35 - 36:39
    to this infrastructure security survey didn't
    actually even have an incident response team
  • 36:39 - 36:42
    in place in their organization
    even if it's an over-lay team,
  • 36:42 - 36:44
    much less an incident response plan.
  • 36:44 - 36:47
    And if you don't have an incident response plan,
    you're certainly not going to exercise that
  • 36:47 - 36:51
    and so you really don't want to be on the
    receiving end of something like a DDoS attack
  • 36:51 - 36:56
    and not have a book in someone's hand that
    says this is the phone number I call for my ISP
  • 36:56 - 37:01
    or for my national curator for my vendor that
    provides a certain service or capability to me,
  • 37:01 - 37:05
    so I think it sort of starts with those
    fundamentals, identifying critical assets,
  • 37:05 - 37:09
    understanding what the options are to
    protect the things that are critical to you.
  • 37:09 - 37:13
    If it's moving services to cloud infrastructure,
    acquiring protection services for those,
  • 37:13 - 37:16
    putting your own controls in
    place, but you definitely need
  • 37:16 - 37:18
    to consider that in your environment.
  • 37:18 - 37:19
    Consider what the impact would be.
  • 37:19 - 37:23
    These are a real risk to your
    business and your operations and so,
  • 37:23 - 37:27
    I think fundamentally that's sort of
    where I would recommend you start, Brian.
  • 37:27 - 37:32
    >> Brian: Thanks Danny, so interesting
    in your comments, you mentioned ISPs,
  • 37:32 - 37:37
    we've got registry operators, you've got online
    service providers, we've got search engines,
  • 37:37 - 37:43
    so we really have a number of different
    service providers in this community
  • 37:43 - 37:45
    that helps keep the internet
    up in a collaborative way.
  • 37:45 - 37:52
    The siezerk effort for ISPs in particular
    sounds interesting and what we want to get
  • 37:52 - 37:56
    at a little bit later in the conversation is
    a cross this community of service providers
  • 37:56 - 38:00
    who I assume have different roles and maybe
    different responsibilities in some ways,
  • 38:00 - 38:05
    how do we build on the collaboration that you've
    begun to speak about and also interestingly,
  • 38:05 - 38:09
    you spoke to the organization and
    what they should have in place.
  • 38:09 - 38:14
    Understanding what enables your business, having
    a plan in place, and the question that raises
  • 38:14 - 38:18
    for me is, well how do organizations
    know they should have these things
  • 38:18 - 38:20
    and how do we educate on that front as well?
  • 38:20 - 38:27
    So we'll get to that in a little bit, but
    to round out the panel, thank you all so far
  • 38:27 - 38:31
    for shedding some light on the scope and
    dimensions of the problem and how we can begin
  • 38:31 - 38:36
    to address it, but let me now go to Jillian.
  • 38:36 - 38:42
    Jillian, what I'd like you to talk about
    from your perspective is what are some
  • 38:42 - 38:47
    of the unintended consequences related
    to DDoS attacks and in particular,
  • 38:47 - 38:51
    help us start thinking about potential
    over-reactions to DDoS attacks.
  • 38:51 - 38:57
    We know that these attacks are of furious
    in nature, we know that we have a panelist
  • 38:57 - 39:02
    of good guys who are doing what they can
    and doing everything we think they should,
  • 39:02 - 39:06
    but tell us about the unintended consequences
    both from the malicious attack side
  • 39:06 - 39:12
    and when a well-intended operator tries to
    take mitigation techniques against an attack.
  • 39:12 - 39:20
    >> Jillian: Sure, so at the beginning of this
    I think Jeff referred to, actually I'm sorry,
  • 39:20 - 39:23
    Brian referred to sometimes
    these attacks being used as sort
  • 39:23 - 39:25
    of an extreme form of free expression.
  • 39:25 - 39:27
    I'm not sure I would classify
    it as free expression,
  • 39:27 - 39:32
    but we could say civil disobedience that's
    been argued by many and an example of this
  • 39:32 - 39:36
    that might resonate a little bit better than
    say the anonymous attacks against Master Card
  • 39:36 - 39:41
    and Visa, would be sympathetic
    people to the Syrian opposition going
  • 39:41 - 39:43
    after Syrian Government websites.
  • 39:43 - 39:45
    That's something that a lot of
    people have sympathized with,
  • 39:45 - 39:50
    have considered civil disobedience in a
    scenario where the government has shut
  • 39:50 - 39:52
    down the internet sensor,
    the internet, etcetera.
  • 39:52 - 40:00
    And so nevertheless the vast majority of
    these attacks are malicious, are directed at,
  • 40:00 - 40:03
    not just these big companies and the
    big networks, but also at the little guy
  • 40:03 - 40:06
    and that's kind of where my
    perspective is coming from.
  • 40:06 - 40:11
    A few years ago when I was still at the Berkman
    Center, we did a study that looked attacks
  • 40:11 - 40:17
    on human rights websites and independent
    media website, and 62% of the respondents
  • 40:17 - 40:23
    to that study said that they had experienced a
    DDoS attack at some point and as Damian said,
  • 40:23 - 40:26
    Google is sort of at what would
    you say, the core of the network.
  • 40:26 - 40:30
    Google has resources, they
    have staff, they own fiber,
  • 40:30 - 40:36
    but then you've got these
    other small organizations
  • 40:36 - 40:38
    that are what we would say is
    at the edge of the network.
  • 40:38 - 40:42
    These are organizations that not only are
    they literally at the edge of the network
  • 40:42 - 40:46
    but they also lack the funding and
    the staff to ward-off an attack.
  • 40:46 - 40:52
    They often have fairly insecure hosting,
    their host might jack-up the cost in an effort
  • 40:52 - 40:58
    to help them and so if you are using say,
    I don't want to throw any specific examples
  • 40:58 - 41:02
    out there although I have a couple, but if
    you're using say a shared hosting provider
  • 41:02 - 41:08
    such as Rackspace or Bluehost, I'm not
    speaking of those companies specifically but,
  • 41:08 - 41:12
    if you're using one of those, and
    you are the victim of an attack,
  • 41:12 - 41:17
    your provider could kick you off, they
    could also raise your costs which for many
  • 41:17 - 41:19
    of us would be completely unaffordable.
  • 41:19 - 41:23
    And so, when we're looking at the
    unintended consequences of these,
  • 41:23 - 41:26
    I mean I think that there's a
    couple of different aspects here.
  • 41:26 - 41:31
    One is the legal consequences and so
    I'm not a lawyer and so I should say
  • 41:31 - 41:37
    that I should just preface by saying that,
    but you know these attacks are largely
  • 41:37 - 41:41
    by most governments at this point considered
    hacking and are dealt with as such.
  • 41:41 - 41:45
    And so in the U.S. that's governed
    by the Computer Fraud and Abuse Act
  • 41:45 - 41:51
    and in Europe there are other similar
    conventions, but I think that we need
  • 41:51 - 41:55
    to start looking at them as a
    little bit different, than that.
  • 41:55 - 41:58
    I think that you need to look at the sort
    of the [inaudible] behind the attack,
  • 41:58 - 42:04
    we need to look at the consequences of
    the attack, and I think a great example
  • 42:04 - 42:09
    of this is an attack that was conducted against
    Lufthansa, the German airline back in gosh,
  • 42:09 - 42:16
    I'm not going to remember the year, early 2000
    I believe where a court actually did determine
  • 42:16 - 42:22
    that the intent of that attack
    was not coercion and was there--
  • 42:22 - 42:28
    I'm not a lawyer so I feel like
    I'm using the wrong language here,
  • 42:28 - 42:32
    but it was dealt with as
    civil disobedience and so.
  • 42:32 - 42:34
    But that's actually not my biggest concern.
  • 42:34 - 42:39
    My biggest concern is the unintended
    consequences on these smaller websites
  • 42:39 - 42:43
    and so when we look at the
    consequences on independent human rights
  • 42:43 - 42:49
    and independent media websites, generally
    these sites go off line and are not able
  • 42:49 - 42:53
    to quickly get back up and so we've
    seen attacks that last a week, 6 weeks,
  • 42:53 - 42:55
    or where the site goes down entirely.
  • 42:55 - 42:58
    And so some of the suggestions that
    have already been given are excellent
  • 42:58 - 43:02
    and I think actually what Damian said in
    terms of people moving their sites to Google,
  • 43:02 - 43:06
    that's actually one of the suggestions that
    we give is, if you are a small website,
  • 43:06 - 43:10
    sometimes you're just better off hosting
    your site on a provider like Google
  • 43:10 - 43:14
    where you have those resources to back you up.
  • 43:14 - 43:17
    We've also, my organization along
  • 43:17 - 43:21
    with the tactical technology collective has
    also developed this guide which is really,
  • 43:21 - 43:23
    really basic mitigation techniques.
  • 43:23 - 43:26
    We're not even talking about the kinds
    of things that a corporate website
  • 43:26 - 43:32
    or even a large-scale organization would
    use, but the things that your blogger,
  • 43:32 - 43:35
    your independent media site might utilize.
  • 43:35 - 43:39
    And this is available, I'll share it after,
    but it's also available in 9 languages.
  • 43:39 - 43:46
    And so just to sum up, I would say that
    we need to think about these attacks,
  • 43:46 - 43:52
    not just how they affect major websites, but
    also how they affect much smaller organizations.
  • 43:52 - 43:53
    >> Brian: Thank you.
  • 43:53 - 43:54
    So thank you all.
  • 43:54 - 43:58
    We've now set the scene, I hope, and provide
    some baseline understanding of the nature
  • 43:58 - 44:00
    of the attacks, the scope of the attacks.
  • 44:00 - 44:01
    We have 2 hours.
  • 44:01 - 44:08
    What we're going to do is as follows, we're
    going to leave 30 minutes at the end for Q&A
  • 44:08 - 44:11
    from the folks in the room and from online and
    we're looking forward to all of your questions.
  • 44:11 - 44:14
    We're going to have basically 2 sessions now.
  • 44:14 - 44:20
    What I'm going to do now is engage in some Q&A
    with the panelists and we'll have 45 minutes
  • 44:20 - 44:26
    for that and then we have in the second session
    a scenario that we've built that we want
  • 44:26 - 44:29
    to rollout in front of our
    panelist and ask how they,
  • 44:29 - 44:33
    in their respective rolls would
    react to that particular scenario.
  • 44:33 - 44:38
    Now I've got about 7 questions or so, we've
    got 45 minutes so this isn't rapid-fire
  • 44:38 - 44:43
    but let's leave about 5 or 6 minutes for
    a response to each of these questions.
  • 44:43 - 44:48
    This is open to anyone on the panel so let's
    be dynamic, raise your hand, don't be shy
  • 44:48 - 44:53
    and we'll kick it off with the first question
    which is; let's get specific and both
  • 44:53 - 44:56
    from your perspective and
    from a user's perspective.
  • 44:56 - 45:00
    What mitigation techniques
    are available to us today?
  • 45:00 - 45:05
    Both you, as a service provider and the user,
    how do we stop these things at a basic level?
  • 45:05 - 45:07
    Who would like to take that on first?
  • 45:07 - 45:09
    Ram.
  • 45:09 - 45:16
    >> Ram: Brian this is Ram, let me start; if
    I was a user, one of the things that I'd want
  • 45:16 - 45:29
    to do is if I have a good ISP, then they
    probably have a botnet mitigation kit
  • 45:29 - 45:35
    or something like that, that gets installed
    in my computing devices and if not,
  • 45:35 - 45:43
    I would go to my ISP and ask them
    for a mitigation kit like that.
  • 45:43 - 45:45
    There pretty commonly available.
  • 45:45 - 45:50
    They're pretty sophisticated and they
    give you the first order of protection.
  • 45:50 - 45:57
    I just also want to point out; having antivirus
    software in your computer doesn't protect you
  • 45:57 - 46:03
    from your computer getting
    compromised in a DDoS attack.
  • 46:03 - 46:03
    >> Brian: That's interesting.
  • 46:03 - 46:06
    Most average users would assume
    that that addresses that problem.
  • 46:06 - 46:09
    Tell us why.
  • 46:09 - 46:12
    >> Ram: So earlier, let me give you
    an example, earlier we were hearing
  • 46:12 - 46:16
    about spear-phishing right, so
    I give you a specific example,
  • 46:16 - 46:20
    something that actually happened in
    one the organizations I work with.
  • 46:20 - 46:29
    A high-level executive in this company,
    it's a pretty small company, got an email
  • 46:29 - 46:35
    and the email had a very good subject line,
    you know it's a photograph of their daughter.
  • 46:35 - 46:41
    And it said, took this photograph,
    she looks great
  • 46:41 - 46:44
    and even had the daughter's name on it, right?
  • 46:44 - 46:49
    And so the executive got the mail, it
    looked like a legitimate thing and the,
  • 46:49 - 46:55
    from address in the email was kind
    of somebody he ran into in random,
  • 46:55 - 46:59
    but there was enough things in the mail
    that looked like it was real, you know.
  • 46:59 - 47:04
    It was the daughter's name was right, there was
    actually a photograph and so they double-clicked
  • 47:04 - 47:10
    and they opened up the photograph and
    that compromised their machine and ended
  • 47:10 - 47:13
    up compromising the network
    from there on, right?
  • 47:13 - 47:18
    Now that was not a virus in the
    traditional sense of a virus.
  • 47:18 - 47:23
    That was something that was custom
    crafted just for that one individual
  • 47:23 - 47:30
    because the person trying to brake-in
    had a clear idea who this person was,
  • 47:30 - 47:35
    they were trying to penetrate, they
    understood that that person likely had access
  • 47:35 - 47:41
    to other important resources inside of the
    company's corporate network, got through.
  • 47:41 - 47:48
    So, they had antivirus on their computer,
    but this was not the traditional virus,
  • 47:48 - 47:54
    this was an attack just aimed
    at you, individually.
  • 47:54 - 47:58
    >> Brian: Thank you and getting back to the
    botnet protection package from your ISP,
  • 47:58 - 48:01
    at a basic level what does that provide?
  • 48:01 - 48:06
    We heard the story of how your own computer
    can become an unwitting zombie participating
  • 48:06 - 48:11
    in a botnet attack, is it designed to
    present that from happening, or other things?
  • 48:11 - 48:16
    That was a follow-up for Ram.
  • 48:16 - 48:19
    >> Ram: Oh, for me specifically.
  • 48:19 - 48:26
    Okay, yeah there are many things that this piece
    of software or these pieces of software do,
  • 48:26 - 48:32
    but often they look at patterns, they look
    at where the attacks may be coming from.
  • 48:32 - 48:38
    They also look at what's happening on your
    own device and where it's trying to connect to
  • 48:38 - 48:41
    and typically you've got certain patterns.
  • 48:41 - 48:47
    You go to a certain set of sites or you send
    emails, you know you connect to a known set
  • 48:47 - 48:55
    of places for the most part and if your device
    has been compromised, often your device is going
  • 48:55 - 48:59
    to places that you normally don't go to
  • 48:59 - 49:04
    and your ISP typically has an
    idea of that stored up over time.
  • 49:04 - 49:05
    >> Brian: Thank you.
  • 49:05 - 49:08
    So let's dig a little bit deeper on that.
  • 49:08 - 49:14
    What was in your answer was, how do we
    identify where this problem is coming from?
  • 49:14 - 49:19
    I think it's an important piece of the puzzle
    here and you and your service provider capacity,
  • 49:19 - 49:23
    let's turn deeper on preventative measures.
  • 49:23 - 49:27
    How can we identify where these
    malicious attacks are coming from?
  • 49:27 - 49:30
    Is that an easy thing to solve
    for, or a harder thing to solve
  • 49:30 - 49:33
    for from the service provider
    perspective and also from the user?
  • 49:33 - 49:35
    I think Ram just started to touch on that.
  • 49:35 - 49:37
    Anybody want to take that on?
  • 49:37 - 49:40
    So, Danny?
  • 49:40 - 49:44
    >> Danny: Yeah this is Danny, I'll say
    something about that and then move on to others,
  • 49:44 - 49:49
    but one of the things I think I would touch on
    initially is that if you're on the receiving end
  • 49:49 - 49:52
    of even a moderate sized DDoS attack,
  • 49:52 - 49:56
    a lot of some of the bigger networks
    have the capacity to absorb the attack.
  • 49:56 - 50:00
    What many ISPs or services in the
    infrastructure offer is the capability
  • 50:00 - 50:05
    to absorb the large-scale bits of
    malicious traffic and surgically mitigate
  • 50:05 - 50:07
    and preserve the availability of the services
  • 50:07 - 50:10
    that someone may be concerned
    with, so that's sort of one aspect.
  • 50:10 - 50:16
    From an ISP side, one of the
    interesting things is that IP is a sort
  • 50:16 - 50:23
    of hop-by-hap packet forwarding paradigm
    for communications networks and anyone,
  • 50:23 - 50:29
    largely anyone on the internet can emit a packet
    in the infrastructure that has a source address
  • 50:29 - 50:34
    of anyone else on that infrastructure and so
    this is known as IP source address booping.
  • 50:34 - 50:38
    And it's a common attack factor, it's
    not the only attack factor and a lot
  • 50:38 - 50:41
    of times spotted hosts don't
    spoof packets at all,
  • 50:41 - 50:45
    but trace back in large networks
    is fairly complex.
  • 50:45 - 50:49
    There are a lot of techniques people use
    from some things like commercial tools
  • 50:49 - 50:53
    that do net-flow and flow-based analysis to
    trace back to the ingress of their network.
  • 50:53 - 50:57
    The problem is you then have to have
    the capability to say, the upstream
  • 50:57 - 51:00
    or the adjacent network that
    attack flows I'm seeing from you.
  • 51:00 - 51:01
    Can you trace these back on your network?
  • 51:01 - 51:04
    Hope that they have the same
    capability and so forth.
  • 51:04 - 51:08
    And so it's non-trivial when the
    fact that any sort of advisory
  • 51:08 - 51:13
    on the internet has global projection capability
    and you could be on the receiving end of a lot
  • 51:13 - 51:16
    of packet lull as a result of
    that, right, you know what I mean,
  • 51:16 - 51:19
    and these could be broadly
    distributed or single-source attacks.
  • 51:19 - 51:23
    So, tracing these attacks back is one aspect.
  • 51:23 - 51:28
    So you would certainly want to trace back
    flow-based tools other things and then ideally
  • 51:28 - 51:31
    if you could find sources that were
    participating in an attack, then you could try
  • 51:31 - 51:35
    and identify command and control
    infrastructure that's used a command
  • 51:35 - 51:41
    or took control those attack sources or those
    botnet hosts and then you would step back
  • 51:41 - 51:46
    from there, but that's an extremely complex
    thing and unfortunately what most people do,
  • 51:46 - 51:50
    and to Jillian's point actually, is that a
    lot of the controls some people put in place
  • 51:50 - 51:54
    through data mitigate DDoS attacks is actually
    to effectively complete those attacks.
  • 51:54 - 51:59
    It's like hey, there's a large-scale attack
    of 10 gigabytes per second going toward one
  • 51:59 - 52:07
    of the smaller hosts on my network so, what
    an ISP may do is actually say I'm going
  • 52:07 - 52:10
    to drop all the traffic towards that
    destination at the ingress of my network.
  • 52:10 - 52:13
    So they do is effectively complete the attack.
  • 52:13 - 52:16
    That's why it's so important to have
    controls in place to be able to identify
  • 52:16 - 52:20
    and surgically mitigate those attacks,
    before the attacks occur, so anyway.
  • 52:20 - 52:21
    >> Brian: Thank you, very interesting.
  • 52:21 - 52:23
    Anybody else want to pick-up on this point?
  • 52:23 - 52:24
    Miguel.
  • 52:24 - 52:30
    >> Miguel: Just adding to what Danny is
    saying, collaboration to try to figure
  • 52:30 - 52:34
    out what the attacks those sources
    are is key and it's not something
  • 52:34 - 52:37
    that happens very well currently.
  • 52:37 - 52:42
    It's something that the internet community is
    trying to improve on but we're nowhere near
  • 52:42 - 52:48
    where we need to be and to be able to do some
    of the things that Danny is referring to,
  • 52:48 - 52:52
    you kind of have to have backchannel
    communications between providers.
  • 52:52 - 52:56
    You have to be able to have
    somebody on the inside,
  • 52:56 - 53:01
    somewhere that you can share intelligence
    with and that's something that's difficult.
  • 53:01 - 53:07
    The last thing I'll say about
    it is that sometimes,
  • 53:07 - 53:16
    where are who it is that's doing it is not
    necessarily that important potentially.
  • 53:16 - 53:20
    When these things are happening,
    a lot of people might be focused
  • 53:20 - 53:25
    on getting their infrastructure back online,
    but you do have to temper that with the fact
  • 53:25 - 53:30
    that as Jeff was alluding to
    earlier, this might be something
  • 53:30 - 53:34
    that an organization is doing
    while they're doing something else.
  • 53:34 - 53:36
    It could very well be a diversionary tactic.
  • 53:36 - 53:41
    >> Brian: Let me pick-up on one point there
    Miguel, you know you mentioned the collaboration
  • 53:41 - 53:45
    between and across network
    operators being a challenge.
  • 53:45 - 53:49
    Is that a resource challenge, it
    is a communications challenge,
  • 53:49 - 53:54
    is it a technical sophistication challenge,
    because it is understood from Danny's comment
  • 53:54 - 53:57
    that this is complex investigation
    that has to cross a number
  • 53:57 - 54:00
    of different network operators
    to get to the answer.
  • 54:00 - 54:02
    What's the issue there?
  • 54:02 - 54:10
    >> Miguel: I would say that there's a
    corporate privacy challenge that a lot
  • 54:10 - 54:18
    of organizations don't really want their
    technical staff or the staff that are dealing
  • 54:18 - 54:23
    with this problem to be collaborating with other
    operators and that's a significant roadblock.
  • 54:23 - 54:24
    >> Brian: Thank you.
  • 54:24 - 54:26
    Jillian-- oh go ahead Damian?
  • 54:26 - 54:29
    >> Damian: I also wanted to say that I
    think that the 3 things that you mentioned,
  • 54:29 - 54:32
    Brian it being resources and technical issues
  • 54:32 - 54:38
    and communication are also significant
    challenges even if you do get
  • 54:38 - 54:42
    through the communication barrier
    to talking to somebody at the ISP,
  • 54:42 - 54:46
    they might not have the technical
    capability to track it further back
  • 54:46 - 54:50
    or they might not have the resources to spend
    time on spending an hour to track it back.
  • 54:50 - 54:56
    Just knowing that it will just go to yet
    another ISP that won't have time to communicate
  • 54:56 - 54:59
    with you or track it back or anything.
  • 54:59 - 55:00
    >> Brian: Right, thank you.
  • 55:00 - 55:00
    Jillian.
  • 55:00 - 55:03
    >> Jillian: Sure, I'm just
    going to make my point again
  • 55:03 - 55:05
    to the sort of smaller organizations.
  • 55:05 - 55:09
    I think that it's important for them to sort of
    assess beforehand, before this is even an issue,
  • 55:09 - 55:12
    both what their risk is, if they can do that,
  • 55:12 - 55:16
    as well as what their priorities
    are in the event of a DDoS attack.
  • 55:16 - 55:20
    And so, for a lot of these organizations
    that I'm thinking of, I'm thinking of sort
  • 55:20 - 55:23
    of the human right sites in embattled countries.
  • 55:23 - 55:28
    A lot of times there priority is just to stay
    up and to keep their content on the internet
  • 55:28 - 55:32
    in the event of an attack and sometimes these
    attacks are coming during say, election periods,
  • 55:32 - 55:38
    or periods of protest and so a lot of times
    what that means is choosing their host wisely,
  • 55:38 - 55:43
    so we talked about that a little bit but knowing
    what their host can do to mitigate an attack,
  • 55:43 - 55:47
    but also if they're high-risk,
    considering a DDoS Resistant Hosting
  • 55:47 - 55:49
    or some programs that are starting to come up.
  • 55:49 - 55:53
    Some of these are pretty cost prohibitive for
    smaller organizations but, there are a couple
  • 55:53 - 55:56
    that are a little bit more affordable.
  • 55:56 - 55:57
    One of them is called Virtual Road.
  • 55:57 - 56:02
    It's hosted by the international--
    I forget the acronym-- IMS--
  • 56:02 - 56:04
    forget that but based in Denmark.
  • 56:04 - 56:08
    Another thing is to, you know really
    easy stuff, keep backups of your site.
  • 56:08 - 56:11
    I know that seems so simple,
    but that's something that a lot
  • 56:11 - 56:15
    of these sites are not thinking of and so when
    there site goes down, it goes down forever.
  • 56:15 - 56:17
    And then another thing is
    just mirroring their site.
  • 56:17 - 56:21
    If we're talking about a site that's
    say in Iran that's going to come
  • 56:21 - 56:26
    under attack during elections or something like
    that, you know making sure that that content is
  • 56:26 - 56:28
    up somewhere else can be really important.
  • 56:28 - 56:32
    You know URLs don't matter as much as
    they used to, thanks to social media.
  • 56:32 - 56:36
    And so just making sure that that content
    is still up and available is a lot
  • 56:36 - 56:41
    of times more important than actually
    immediately mitigating the attack.
  • 56:41 - 56:42
    >> Brian: Jeff?
  • 56:42 - 56:46
    >> Jeff: Real briefly, I would say in
    particular, if you have limited resources,
  • 56:46 - 56:49
    figure out what your purpose
    in tracking back is.
  • 56:49 - 56:53
    If there's a technical side of it and as smarter
    folks up here may appear to have explained it.
  • 56:53 - 56:58
    It's very difficult to get to the end but
    let's say you get through all those hurdles
  • 56:58 - 57:03
    and you find out where it's actually coming
    from, then you walk into a human problem.
  • 57:03 - 57:04
    Do you really care what the motivation is?
  • 57:04 - 57:10
    I mean, if your goal is to stay up, you may
    only want to track back far enough to be able
  • 57:10 - 57:15
    to protect yourself and even if you get to the
    end, you know it's a bunch of computers sitting
  • 57:15 - 57:21
    in country x, you'd have to get to those
    people to figure out is it a nation state act,
  • 57:21 - 57:24
    is it a bunch of individuals,
    is it somehow loosely connected?
  • 57:24 - 57:29
    So the track back, you know I would say
    just from my perspective thinking about this
  • 57:29 - 57:32
    when I was up on the hill, there is a techno
    side, but there's very much the political
  • 57:32 - 57:36
    and security side and you get into human
    litigations there which are even harder
  • 57:36 - 57:41
    to track back than some of the techno stuff.
  • 57:41 - 57:42
    >> Brian: Thank you Jeff.
  • 57:42 - 57:45
    Let me ask a slightly different question.
  • 57:45 - 57:51
    When an attack is happening, does it matter what
    the targeted platform is from your perspective
  • 57:51 - 57:53
    and how you react to it, how do you manage it?
  • 57:53 - 57:58
    For example if it's an attack against the banks
    as we've been seeing recently, versus an attack,
  • 57:58 - 58:02
    versus a social media site or a small-user site.
  • 58:02 - 58:07
    Does the nature of the target affect
    the way you address the problem,
  • 58:07 - 58:08
    try to mitigate the problem?
  • 58:08 - 58:12
    Can you give us some dimension on that front?
  • 58:12 - 58:13
  • 58:13 - 58:16
    Miguel, do you want to go first?
  • 58:16 - 58:17
    >> Danny: Yeah, sure.
  • 58:17 - 58:20
    Yeah so what I would say is that if
    you're trying to mitigate an attack,
  • 58:20 - 58:23
    what you're really trying to
    do is preserve the availability
  • 58:23 - 58:24
    of the services that you care about.
  • 58:24 - 58:29
    And so you've really got to flip and say you
    know, I really want to scrub out the bad stuff
  • 58:29 - 58:30
    and try and be able to absorb this attack.
  • 58:30 - 58:34
    One of the interesting things, when you see
    numbers thrown around on scale, frequency,
  • 58:34 - 58:39
    duration, attack factors, all those things,
    you might see 10 gigabyte per second attack.
  • 58:39 - 58:45
    Well what 10 gigabytes per second attack is on a
    webserver or on a DNS server is very different.
  • 58:45 - 58:49
    That means 10 gigabytes per second
    of transaction servicing capacity.
  • 58:49 - 58:54
    Right, that's basically I've got to be able to
    process 10 gigabytes per second of DNS packets
  • 58:54 - 58:59
    or of web-service packets or SSL packets or
    whatever the service is you're concerned with
  • 58:59 - 59:02
    and that's the only way you can
    preserve the availability of that.
  • 59:02 - 59:05
    So when it gets more and more complex,
    is when you have more stay-based
  • 59:05 - 59:08
    and more complex applications
  • 59:08 - 59:13
    that more sophisticated attacks
    become problematic in that manner.
  • 59:13 - 59:18
    So I think it absolutely
    depends on the attack factor.
  • 59:18 - 59:22
    One of the challenges is that sort of
    commodity, off the shelf routers and firewalls
  • 59:22 - 59:25
    and those things don't do
    application [inaudible] mitigation.
  • 59:25 - 59:27
    They don't provide certain capabilities.
  • 59:27 - 59:30
    On the other hand, if it's
    some services it may be simpler
  • 59:30 - 59:34
    to simply absorb a high-rate per second attack
  • 59:34 - 59:38
    or to just drop bad traffic that's
    not target a production service.
  • 59:38 - 59:42
    So, yeah in short the answer is
    yes to your question, I think.
  • 59:42 - 59:44
    >> Brian: Thank you, Miguel.
  • 59:44 - 59:47
    >> Miguel: Danny mentioned
    that the type of infrastructure
  • 59:47 - 59:50
    that is being attacked matters,
    I absolutely agree.
  • 59:50 - 59:55
    The type of organization that is being
    attacked also plays a factor potentially
  • 59:55 - 60:00
    and how you're dealing with the
    problem of mitigating the attack.
  • 60:00 - 60:04
    I think Jeff alluded to the fact
    earlier that there are attacks
  • 60:04 - 60:06
    that are potentially, for example extortion.
  • 60:06 - 60:11
    There's activist-type attacks;
    I'll use the activists' example.
  • 60:11 - 60:15
    These people that are protesting
    and attacking your site,
  • 60:15 - 60:21
    they're most likely discussing it online, so
    they're congregating on twitter, on Facebook,
  • 60:21 - 60:25
    Payspin, whatever site it is that
    they're using to IRC relay chip,
  • 60:25 - 60:31
    you know internet relay chat rooms,
    they're discussing attack strategies there.
  • 60:31 - 60:36
    So, what kind of an attack it is, and
    which organization is being attacked,
  • 60:36 - 60:42
    it does matter because you do want to factor
    in how your monitoring social media based
  • 60:42 - 60:48
    on the particular attack because it can
    help you determine what it is that you need
  • 60:48 - 60:51
    to do and what you need to focus on.
  • 60:51 - 60:52
  • 60:52 - 60:54
    >> Brian: Anyone else?
  • 60:54 - 60:55
  • 60:55 - 60:58
    Let me shift gears here.
  • 60:58 - 61:03
    I think by now, hopefully we've got a
    fairly good picture of the dimensions
  • 61:03 - 61:06
    of DDoS attacks both from website operator,
  • 61:06 - 61:10
    individual user, service
    provider, civil society.
  • 61:10 - 61:13
    It's an important problem.
  • 61:13 - 61:16
    It's a growing problem, there's
    no doubt about that.
  • 61:16 - 61:19
    It gets bigger each year,
    it's a big cat and mouse came,
  • 61:19 - 61:23
    we have a hard time identifying
    the bad guys, tracking them down,
  • 61:23 - 61:25
    stopping them from doing what they're doing.
  • 61:25 - 61:27
    Who should fix this problem?
  • 61:27 - 61:29
  • 61:29 - 61:35
    Private sector, government,
    how do we fix this problem?
  • 61:35 - 61:39
    Collaboration is important, we've heard
    that but it seems like it's a game
  • 61:39 - 61:41
    that we're not necessarily winning.
  • 61:41 - 61:43
    Anyone want to take that on?
  • 61:43 - 61:45
    Pros and cons, Damian?
  • 61:45 - 61:46
  • 61:46 - 61:48
    >> Damian: I'll start off the discussion.
  • 61:48 - 61:55
    So I think a lot of the difficulty we have
    is that nobody feels actually responsible
  • 61:55 - 62:01
    so the attacks are often being
    sourced from compromised machines
  • 62:01 - 62:04
    and people are saying well it's not
    my fault, my machine is compromised.
  • 62:04 - 62:09
    You know they don't know it, it's an
    end user, they don't actually know how
  • 62:09 - 62:12
    to secure their machine, they're not even aware
  • 62:12 - 62:16
    that there machine is participating
    in the attack.
  • 62:16 - 62:19
    Then it goes from that machine
    through an ISP and the ISP says well,
  • 62:19 - 62:24
    we're just providing network
    transit to our customers.
  • 62:24 - 62:26
    We don't actually look at what that content is.
  • 62:26 - 62:32
    And then it might go through multiple
    ISPs and eventually get to the victim
  • 62:32 - 62:37
    who really doesn't have any choice
    but to just receive this traffic.
  • 62:37 - 62:43
    So I think the root issue here is to figure
    out who you would actually hold responsible
  • 62:43 - 62:48
    for these attacks and then maybe figure out
    in what way they would be held responsible.
  • 62:48 - 62:52
    You know clearly, we don't want
    to hold the home user responsible
  • 62:52 - 62:58
    for an attack they weren't aware that they were
    committing, however, if we could inform them
  • 62:58 - 63:02
    and they refuse to fix their machine,
    maybe after they've had that opportunity
  • 63:02 - 63:06
    to fix their machine and they refuse to,
    or after we inform a hosting provider
  • 63:06 - 63:10
    that has compromised webservers
    that are attacking you.
  • 63:10 - 63:13
    If they don't fix those machines after
    a month and they're still attacking,
  • 63:13 - 63:16
    maybe there should be some responsibility there.
  • 63:16 - 63:20
    >> Brian: So that's an interesting thought
    Damian because you all do have terms of service
  • 63:20 - 63:24
    and abuse policies that users agree
    to when they use your service,
  • 63:24 - 63:25
    so that's an interesting thought.
  • 63:25 - 63:30
    Jeff, I want to throw this to you and I
    know this is part of your past experience,
  • 63:30 - 63:34
    but having been in the Senate and House
    Committee, can you bring a little bit
  • 63:34 - 63:37
    of the government perspective
    to the question I asked
  • 63:37 - 63:40
    of who should be fixing this problem and how?
  • 63:40 - 63:41
    >> Jeff: So I guess I would step back
  • 63:41 - 63:47
    and say that we can't define
    this problem as just dos attacks.
  • 63:47 - 63:50
    You know you phrase it as, it's
    not a game of winning, well,
  • 63:50 - 63:53
    in my mind it's not a game that will ever end.
  • 63:53 - 63:58
    To the extent it's more of a constant
    race, how far ahead or behind are we
  • 63:58 - 64:02
    of the people developing new ways to attack?
  • 64:02 - 64:08
    And to my first point about, it's a
    broader problem, if someone has a computer
  • 64:08 - 64:12
    that is being used as part of a botnet
    for a DDoS attack or something else,
  • 64:12 - 64:17
    it's very likely that the folks who are on
    that computer could do a lot of other things
  • 64:17 - 64:21
    with that computer or to that person's
    identity or steel their banking credentials,
  • 64:21 - 64:26
    so it is a much broader problem and I think
    Damian made a good point is everyone kind
  • 64:26 - 64:29
    of pushes it back but at
    some level it needs to start
  • 64:29 - 64:34
    with users taking more control
    over their computers.
  • 64:34 - 64:37
    Not just looking at antivirus
    but broader protections.
  • 64:37 - 64:42
    The government's role from my perspective
    and that's something that we worked
  • 64:42 - 64:47
    on the projects I worked on the hill are
    much more critical infrastructure focused,
  • 64:47 - 64:51
    but if it's true there, I think it's even
    more true with a much more commercial side.
  • 64:51 - 64:56
    It's got to be private sector laden and
    the government can play a role facilitating
  • 64:56 - 65:02
    and educating and punishing and perhaps in some
    areas where there is significant possibility
  • 65:02 - 65:06
    of major national impact requiring
    some standards, you're not going to do
  • 65:06 - 65:11
    that for John Smith who has his
    computer at home, you're not going to say
  • 65:11 - 65:15
    that there is a minimum security
    [inaudible] that you have to have
  • 65:15 - 65:17
    in order to log into the internet.
  • 65:17 - 65:19
    Were you even to try that, it would never pass.
  • 65:19 - 65:24
    But the government can play a
    significant role educating folks;
  • 65:24 - 65:29
    simple things as patching whatever software
    applications you have, making it the easiest way
  • 65:29 - 65:30
    for someone to get into your computer.
  • 65:30 - 65:33
    The patch comes out, someone is out there
    trying to figure out what was patched
  • 65:33 - 65:36
    and how can we take advantage
    of the people who don't patch.
  • 65:36 - 65:41
    So the government, I think the role, sort
    of hopefully I'm answering the question.
  • 65:41 - 65:43
    The role the government is going to play is
    going to depend on what you're talking about.
  • 65:43 - 65:46
    If it's an attack on water, electrical,
    other systems the government is going
  • 65:46 - 65:49
    to have a very active role,
    hopefully ahead of time, protecting
  • 65:49 - 65:51
    and assisting in developing protections.
  • 65:51 - 65:55
    The government will also have a role in
    the backend where possible prosecuting,
  • 65:55 - 65:57
    investigating and that's
    where your earlier question
  • 65:57 - 66:00
    about does it matter who is being attacked?
  • 66:00 - 66:04
    Maybe it shouldn't, but the government is going
    to be much more focused when you have a series
  • 66:04 - 66:08
    of major banks attacked, looking whether
    there's another type of attack going on
  • 66:08 - 66:11
    or there are more laws that
    apply [inaudible] after that.
  • 66:11 - 66:18
    Then if it is, you're attacking someone's speech
    on block spy, so the government's role is going
  • 66:18 - 66:23
    to vary, I think depending upon where you are
    but ultimately it can't be government lead
  • 66:23 - 66:28
    because it will end up being less
    effective and more [inaudible], in my view.
  • 66:28 - 66:29
    >> Brian: Thank you.
  • 66:29 - 66:37
    Let me ask for the service providers, you all
    run services that are globally accessible.
  • 66:37 - 66:43
    You all have network footprints
    that are global to some extent.
  • 66:43 - 66:48
    Specifically, engaging with law
    enforcement which I'm sure you do,
  • 66:48 - 66:53
    you all work for law abiding companies who
    under the proper circumstances collaborate
  • 66:53 - 66:57
    with law enforcement to address
    legitimate concerns.
  • 66:57 - 67:02
    What are you seeing in your
    interactions with law enforcement
  • 67:02 - 67:05
    that provides the good seeds for collaboration?
  • 67:05 - 67:09
    What do you think might be missing in
    your interactions with law enforcement?
  • 67:09 - 67:13
    I'd like the service providers
    to address that point.
  • 67:13 - 67:18
    Who wants to go first, Ram?
  • 67:18 - 67:19
    >> Ram: Let me start.
  • 67:19 - 67:24
    One of the things that is striking
    in interactions with law enforcement,
  • 67:24 - 67:30
    one of the fundamentals here is that
    this is essential a borderless problem
  • 67:30 - 67:34
    and law enforcement has a broader problem.
  • 67:34 - 67:34
    >> Brian: Okay.
  • 67:34 - 67:38
    >> Ram: Not a problem, they have to work
  • 67:38 - 67:41
    within the jurisdictions of
    the borders that they're in.
  • 67:41 - 67:46
    So often when you're collaborating
    and working on uncovering,
  • 67:46 - 67:52
    you know somebody is running a botnet that's
    got some significant problems behind it
  • 67:52 - 67:56
    and if you start to do trace-backs,
    you'll find that the folks
  • 67:56 - 68:02
    in law enforcement would rather work
    with you informally than formally
  • 68:02 - 68:10
    because if they go formal, then you go
    through a method where you then have
  • 68:10 - 68:17
    to involve every law enforcement agency at
    every boarder that is crossed on the internet.
  • 68:17 - 68:20
    It's pretty damn easy to cross those boarders.
  • 68:20 - 68:27
    So, that's a, I think that's an
    essential thing and the real-world hasn't
  • 68:27 - 68:31
    yet caught-up to that reality online.
  • 68:31 - 68:39
    That attacks come from multiple boarders,
    from across multiple boarders and the morph
  • 68:39 - 68:50
    in real-time, depending what the response looks
    like, and so that's a very significant factor
  • 68:50 - 68:58
    when we work for instance on, a year and a
    half ago, we worked on pulling together part
  • 68:58 - 69:06
    of an industry or in a taskforce on child abuse
    set of sites that were focused on child abuse
  • 69:06 - 69:17
    and they were using that to infect the
    computers of those who had the bad stuff on it
  • 69:17 - 69:19
    to make them part of a zombie network.
  • 69:19 - 69:28
    And it got very snarled up in various
    jurisdictions legal restrictions,
  • 69:28 - 69:34
    the necessity to preserve evidence,
    versus the imperative to solve the problem
  • 69:34 - 69:37
    and make sure it doesn't become very large.
  • 69:37 - 69:38
    >> Brian: Interesting.
  • 69:38 - 69:42
    Anyone else, Danny?
  • 69:42 - 69:44
    >> Danny: Yeah so I'll point out
    again, some of the work that you know
  • 69:44 - 69:48
    with public/private sector
    partnerships, I think that's so important.
  • 69:48 - 69:51
    Certainly I don't think you're going to
    regulate your way out of this, right?
  • 69:51 - 69:58
    From a controls perspective there are 869
    things that I have to do in my day job just
  • 69:58 - 70:01
    to check boxes and those give me
    marginally more secure, right,
  • 70:01 - 70:06
    82% of IT security span goes towards
    compliance and regulatory controls
  • 70:06 - 70:08
    and then people try and get
    secure on top of that.
  • 70:08 - 70:13
    Those sorts of things are like antivirus
    software and there's 10 new pieces
  • 70:13 - 70:17
    of male-code a second on the
    internet, yet AV is a frontline defense
  • 70:17 - 70:23
    to protect the residential user or maybe even
    a corporate machine, and so I think education
  • 70:23 - 70:28
    of the threat vector, some of the very
    fundamental stuff like patching systems
  • 70:28 - 70:33
    and software and collaboration and information
    sharing and putting these things in place.
  • 70:33 - 70:36
    From a law enforcement perspective,
    I think that some
  • 70:36 - 70:40
    of the most successful stuff we've seen
    involves multilateral teaming agreements
  • 70:40 - 70:44
    and collaboration, those sorts of
    things where there is some coordination
  • 70:44 - 70:47
    and some effort in trying to work together.
  • 70:47 - 70:51
    In general though, in particular with
    DDoS attack we've always seen this sort
  • 70:51 - 70:56
    of fragmented response where one ISP on
    the receiving end, or along the projectory
  • 70:56 - 71:00
    of an attack will drop all the traffic
    towards the destination and cause,
  • 71:00 - 71:02
    you know effectively completing
    the attack for that network,
  • 71:02 - 71:08
    and another one will security research will
    infiltrate the command [inaudible] structure
  • 71:08 - 71:12
    and law enforcement may be there and then
    someone will break one of their connections
  • 71:12 - 71:16
    to the C&C infrastructure and all of a
    sudden, you can't even disable the attack
  • 71:16 - 71:20
    because you've got all these headless machines
    out there that are attacking something
  • 71:20 - 71:23
    and depending on where those systems
    reside and where they're coming from.
  • 71:23 - 71:28
    I mean we've seen attacks with
    attack sources in 100s of countries
  • 71:28 - 71:30
    and you're breaking lots of laws.
  • 71:30 - 71:36
    I mean just if you were to try and disable
    an attack if you had the keys to the command
  • 71:36 - 71:39
    and control infrastructure, that sort of thing.
  • 71:39 - 71:43
    So it's really problematic and there needs
    to be a lot of collaboration and cooperation
  • 71:43 - 71:47
    and I don't think regulations a way,
    but I do think harmonizing and working
  • 71:47 - 71:52
    on the international aspects and the information
    sharing and collaboration, you know those sort
  • 71:52 - 71:56
    of things are the only way we're going
    to be in a better spot collectively.
  • 71:56 - 72:00
    We're playing a lot of wackemall
    today and I'm not sure it's effective.
  • 72:00 - 72:05
    >> Brian: Jillian, let me ask you, from your
    perspective, from a civil society perspective,
  • 72:05 - 72:11
    what more should industry and government
    in their roles, be doing to address this?
  • 72:11 - 72:16
    And what in their collaboration
    would you hope that they avoid?
  • 72:16 - 72:20
    >> Jillian: So in terms of what more,
    I mean I think it's hard for me to say.
  • 72:20 - 72:24
    I mean I think one of the problems
    here is that as others have mentioned,
  • 72:24 - 72:30
    law enforcement is going after the folks
    who are going after the big targets.
  • 72:30 - 72:34
    And I understand that, but it's not really
    ever going to help these smaller targets.
  • 72:34 - 72:38
    I mean you don't see law enforcement going after
    the perpetrators of small attacks and a lot
  • 72:38 - 72:41
    of the attacks that I'm looking at
    are happening in other countries
  • 72:41 - 72:44
    where sometimes the perpetrators
    are in other countries
  • 72:44 - 72:49
    and so from my perspective I'm not
    thinking so much about U.S. law enforcement,
  • 72:49 - 72:53
    but in terms of what people can be doing
    more about and what they should avoid.
  • 72:53 - 73:01
    I think that a lot of it is about raising
    awareness as folks at the other end
  • 73:01 - 73:05
    of the table said in the beginning,
    I think that making people aware,
  • 73:05 - 73:09
    not only of what might be going on in their
    own systems that they can avoid becoming part
  • 73:09 - 73:17
    of a botnet, but also what they can be
    doing as individuals and as organizations
  • 73:17 - 73:21
    to mitigate the potential of DDoS attacks.
  • 73:21 - 73:24
    And then as far as industry,
    I think adding that layer
  • 73:24 - 73:26
    of civil society is really important as well.
  • 73:26 - 73:32
    Making sure that industry is collaborating
    with civil society to make more
  • 73:32 - 73:37
    of these systems available to
    the smaller user would be great.
  • 73:37 - 73:42
    And as far as what law enforcement
    should avoid, I think a lot of it
  • 73:42 - 73:47
    for me is addressing whether DDoS attack
    are a useful form of civil disobedience.
  • 73:47 - 73:51
    I think it kind of comes down to that and my
    personal opinion, this is really not the view
  • 73:51 - 73:53
    of my organization which does
    not have a stated view on this,
  • 73:53 - 73:59
    but it's just that I don't think it's a
    particularly useful form of civil disobedience.
  • 73:59 - 74:04
    I think that in the United States we have
    many other paths of recourse to protest
  • 74:04 - 74:07
    and then I think that when you look
    at the example like I gave before,
  • 74:07 - 74:11
    attacks against Syrian government
    websites, it's a bit of a different thing.
  • 74:11 - 74:19
    But nonetheless, I think that the effect of
    these attacks on smaller websites is so great
  • 74:19 - 74:22
    that we should really sort of
    try to look at the whole picture
  • 74:22 - 74:25
    and realize how much damage this is doing.
  • 74:25 - 74:29
    And so I guess in thinking about that, I
    think that that should also sort of inform
  • 74:29 - 74:31
    where we think about law enforcement.
  • 74:31 - 74:32
    >> Brian: Thank you.
  • 74:32 - 74:32
    Danny [inaudible]?
  • 74:32 - 74:35
    >> Danny: Yeah I just wanted to make
    one other comment, something she touched
  • 74:35 - 74:39
    on which I think is really actually
    is, one of the things we see a lot
  • 74:39 - 74:42
    of is the internet itself
    is inherently multi-tenant.
  • 74:42 - 74:47
    And then you see a lot of, in particular
    a lot of the smaller folks can aggregate
  • 74:47 - 74:50
    and there's these really high tenant
    densities on certain pieces of infrastructure
  • 74:50 - 74:55
    and what ends up happening is that someone
    on the infrastructure gets attacked
  • 74:55 - 74:58
    and there's a lot of collateral
    damage that everybody is impacted.
  • 74:58 - 75:01
    Or a really large attack along
    a trajectory fills some links
  • 75:01 - 75:06
    and not only is the intended target impacted
    but there's collateral damage to other people
  • 75:06 - 75:07
    that utilize that infrastructure.
  • 75:07 - 75:15
    And most of the attacks that the folks have been
    on the receiving end of seeing is that it's hard
  • 75:15 - 75:20
    for an attacker to gage how much firepower they
    actually have and to surgically attack a target
  • 75:20 - 75:26
    with a DDoS attack on the internet, usually they
    sort brute-force flood a whole bunch of traffic
  • 75:26 - 75:29
    of a particular type and there
    is collateral damage in that.
  • 75:29 - 75:32
    And that's an important artifact
    that you're highlighting there
  • 75:32 - 75:36
    and if you have high-tenant
    densities on cloud infrastructure
  • 75:36 - 75:43
    or lots of people behind small links then
    it does have a really devastating impact
  • 75:43 - 75:46
    and not just on the target, but maybe on
    other people that utilize that infrastructure.
  • 75:46 - 75:49
    And so I think that's important highlight.
  • 75:49 - 75:50
    >> Brian: Thank you.
  • 75:50 - 75:51
    Damian?
  • 75:51 - 75:55
    >> Damian: Yeah just to follow-up
    on that, Jillian had mentioned
  • 75:55 - 75:59
    that law enforcement doesn't go
    after the very small attacks.
  • 75:59 - 76:00
    They tend to focus on the large attacks.
  • 76:00 - 76:04
    But I do see the large attacks
    as the most damaging,
  • 76:04 - 76:09
    largely because of what Danny said
    of, it causes collateral damage.
  • 76:09 - 76:12
    If there's collateral damage on other sites
    that they have no other way to mitigate,
  • 76:12 - 76:15
    they will kill the small
    victim, they'll completely attack
  • 76:15 - 76:17
    by just turning off everything to that site.
  • 76:17 - 76:23
    So by basically preventing any very large
    attacks by having law enforcement focus
  • 76:23 - 76:28
    on those we at least give the smaller sites a
    change of getting some dos mitigation service
  • 76:28 - 76:35
    to help them and basically that
    boundary is probably around 10 gigabyte.
  • 76:35 - 76:41
    You know once you get up over 100 gig, there's
    very few organizations that are going to be able
  • 76:41 - 76:45
    to help and most are just
    going to turn off the site.
  • 76:45 - 76:49
    >> Brian: So right now on this issue,
    it's the rule of the submarine captain
  • 76:49 - 76:54
    that is the compartment flooding, and their
    sailors in there shut it off to save the rest.
  • 76:54 - 76:55
    And that's where we are.
  • 76:55 - 76:59
    So, this is interesting and I think
    we've all been very polite so far,
  • 76:59 - 77:03
    so allow me to play devil's advocate and put
    your feet to the fire a little bit folks.
  • 77:03 - 77:09
    So what I'm hearing at a high level to pull some
    threads together, is there is some coordination
  • 77:09 - 77:14
    across law enforcement which is key
    to this solution in collaboration,
  • 77:14 - 77:17
    but it's not nearly what it needs to be.
  • 77:17 - 77:21
    It itself is a barrier to our
    ability, at least in the industry,
  • 77:21 - 77:24
    to work on these problems with law enforcement.
  • 77:24 - 77:28
    We're hearing that there is some collaboration
    across network operators but not as good
  • 77:28 - 77:32
    as it needs to be all the
    way up and down the stream.
  • 77:32 - 77:40
    And some lack of sense of responsibility
    coloring that part of the puzzle.
  • 77:40 - 77:46
    We all in this industry trumpet the fact that
    the internet is critical global infrastructure.
  • 77:46 - 77:51
    We all in this industry trumpet the
    fact that the infrastructure of nations
  • 77:51 - 77:58
    of countries have come to rely on the
    internet, banking systems, electric grids soon,
  • 77:58 - 78:04
    governments have a clear interest in this
    critical infrastructure and if I listen to all
  • 78:04 - 78:07
    of this and piece together,
    I could come at this from,
  • 78:07 - 78:11
    this is a fiddling while Rome burns
    dynamic going on between industry
  • 78:11 - 78:14
    and governments and civil society.
  • 78:14 - 78:20
    So, putting your feet back to the fire, what
    needs to happen in terms of collaboration,
  • 78:20 - 78:27
    in concrete terms to break through at the
    industry level, at the government level
  • 78:27 - 78:31
    and across those levels and with
    the civil society perspective.
  • 78:31 - 78:32
    Let's get to it.
  • 78:32 - 78:37
    Who wants to take it on?
  • 78:37 - 78:38
    Pause.
  • 78:38 - 78:39
    >> Ram: Sure I'll jump on the grenade.
  • 78:39 - 78:47
    Look I think everyone who is here and everyone
    who is up here is not part of the problem.
  • 78:47 - 78:51
    When you take it to the global
    level of the impact on society
  • 78:51 - 78:56
    and the fiddling while Rome burns and the
    implication that there's an existential or close
  • 78:56 - 79:03
    to a threat to us, everyone up here and I
    assume because you're here, you all get it.
  • 79:03 - 79:08
    The problem we have are the sectors
    that you mentioned that use technology
  • 79:08 - 79:15
    but are not technology sectors and going back
    to my government experiences, often, not always
  • 79:15 - 79:23
    but often, the difficulty in those sectors to
    get nontechnical executives to spend the money
  • 79:23 - 79:26
    or the time to put in place the protections.
  • 79:26 - 79:33
    You know Danny, I thought talked earlier
    about the need of a mitigation plan in place.
  • 79:33 - 79:36
    If you're under a major denial service
    attack and you're then figuring oh,
  • 79:36 - 79:38
    how do I deal with a denial service attack?
  • 79:38 - 79:45
    You're toast, you need to have things in place
    ahead of time and that's where going back
  • 79:45 - 79:49
    to the question about where the government
    can play a role, my personal view
  • 79:49 - 79:52
    and what we were trying to do on
    the hill was create an environment
  • 79:52 - 79:58
    where the truly critical
    infrastructure systems are required
  • 79:58 - 80:00
    to meet some base-level of security.
  • 80:00 - 80:04
    Not a technology specific but more
    if you're talking about computers
  • 80:04 - 80:07
    that control big machines,
    water pumps, electric grids,
  • 80:07 - 80:09
    those shouldn't be connected to the internet.
  • 80:09 - 80:11
    A lot of them are.
  • 80:11 - 80:17
    Some of them are connected with open connections
    using default passwords available through,
  • 80:17 - 80:19
    no offense, Google searches.
  • 80:19 - 80:26
    So, what needs to happen, I think is some
    impetus, some general understanding of the type
  • 80:26 - 80:33
    of threat that the country faces both in
    the digital realm and in the physical realm.
  • 80:33 - 80:40
    But again, I think going back to what I said
    earlier a lot of it starts with the individual
  • 80:40 - 80:45
    and I used to be very skeptical as to
    whether we could actually get most people
  • 80:45 - 80:50
    to do basic hygiene things on their computer
    and then one of the things that we also covered,
  • 80:50 - 80:54
    the committee worked on was swine flu and
    as soon as big bird told everyone to cough
  • 80:54 - 80:58
    into their elbows, you have a fast majority
    of American's, you see people coughing
  • 80:58 - 81:00
    or sneezing into their elbows now.
  • 81:00 - 81:04
    We change behavior very quickly and I
    think there can be an education campaign
  • 81:04 - 81:11
    that could change enough behavior to help stop
    the problem, but without some type of push,
  • 81:11 - 81:14
    I think that we're all going to
    keep trying to do what we can,
  • 81:14 - 81:18
    but the people who need to
    make the changes may not.
  • 81:18 - 81:20
    >> Brian: Ram, thank you.
  • 81:20 - 81:25
    >> Miguel: Thank you, so I'm a bit
    of a skeptic on these push-measures.
  • 81:25 - 81:31
    Folks do push-measures, governments do
    push-measures all the time and decades go by
  • 81:31 - 81:35
    and the basic problems don't get resolved.
  • 81:35 - 81:38
    One thing that does seem to work is events.
  • 81:38 - 81:40
    Events result in consequences.
  • 81:40 - 81:47
    Michael Angelo, the virus got people to install
    antivirus software, Y2K got people to focus
  • 81:47 - 81:53
    on mitigation measures, 9/11
    caused a series of responses
  • 81:53 - 81:58
    and the Georgian Cyber War
    caused another set of responses.
  • 81:58 - 82:04
    We don't really have a global cyber event,
    I'm not asking for one, but I'm just saying
  • 82:04 - 82:09
    that if you just look at human behavior and
    you want to affect human behavior and you want
  • 82:09 - 82:15
    to get individuals, governments, civil
    society, public sector, everybody together
  • 82:15 - 82:22
    and the private sector together, you
    need to have something to unify around.
  • 82:22 - 82:30
    The threat today doesn't feel real to me until
    I get attacked and if my friend got attacked,
  • 82:30 - 82:33
    I kind of have some sympathy about
    it but I kind of shrug my shoulders
  • 82:33 - 82:36
    and say, "Ain't going to happen to me."
  • 82:36 - 82:43
    And there is not the unifying
    sense of impending doom.
  • 82:43 - 82:48
    >> Danny: Can I just, I agree with everything
    Ram said from the skepticism to the kind
  • 82:48 - 82:53
    of work I was also trying to also do the
    need for an event and we would tell a lot
  • 82:53 - 82:58
    of the skeptics who came in is, look you
    have Congress trying to act proactively.
  • 82:58 - 83:01
    It may not fix everything now but when
    something happens there will be better systems
  • 83:01 - 83:03
    in place to respond to it.
  • 83:03 - 83:06
    But more importantly, you want
    government to act proactively
  • 83:06 - 83:11
    because when government acts reactively, it acts
    stupidly and that's why there is a strong effort
  • 83:11 - 83:17
    to get some type of performance-based,
    nontechnology specific standards
  • 83:17 - 83:21
    that are limited to really critical stuff in
    place, so hopefully some things will improve
  • 83:21 - 83:25
    and if something happens, we have the framework
    that is not so regimented that the attempt
  • 83:25 - 83:28
    to fix the problem actually enhances it.
  • 83:28 - 83:32
    But I'm ultimately, because I'm a cynic
    I don't think we're going to do anything
  • 83:32 - 83:39
    until we have something blowup and
    that's unfortunate to say the least.
  • 83:39 - 83:41
    >> Brian: Danny, oh Damian thank you.
  • 83:41 - 83:47
    >> Damian: Sure, yes I also sort of
    agree with the cyber event being needed.
  • 83:47 - 83:56
    Not needed but, [Laughter] if you look
    at history, we've seen that there's
  • 83:56 - 84:00
    like an email worm or virus that comes
    out approximately once every 6 months
  • 84:00 - 84:04
    because that's how long it takes people
    to forget and start being stupid again.
  • 84:04 - 84:07
    And you know click on everything they see but,
  • 84:07 - 84:09
    you know once every 6 months
    everyone gets infected,
  • 84:09 - 84:11
    everyone is like oh yeah, I shouldn't do that.
  • 84:11 - 84:13
    Fortunately no major damage has been caused.
  • 84:13 - 84:17
    Nobody has ever actually-- there
    haven't been any large-scale cases
  • 84:17 - 84:19
    where people have lost data.
  • 84:19 - 84:24
    I see this as very similar
    to how diseases spread.
  • 84:24 - 84:28
    If you killed the person instantly,
    like if someone gets infected
  • 84:28 - 84:32
    and you format their hard drive right
    away, they don't have time to spread.
  • 84:32 - 84:36
    They don't have time to pass it on to others
    and so most of the malware that we've seen
  • 84:36 - 84:39
    so far has been fairly benign
    and that allows it to spread,
  • 84:39 - 84:41
    but it also means it doesn't cause much damage.
  • 84:41 - 84:47
    I also wanted to say, I think right
    now laws largely favor the attacker.
  • 84:47 - 84:54
    There's a lot of constraints on information
    sharing, all of the jurisdiction issues,
  • 84:54 - 84:59
    and that also means that
    there's a very slow response.
  • 84:59 - 85:04
    If somebody goes to law enforcement, law
    enforcement might have to sit on it for weeks
  • 85:04 - 85:07
    or months before they can actually
    take action against the attacker,
  • 85:07 - 85:09
    if they can even get to the attacker.
  • 85:09 - 85:15
    So, some things might need to change
    in laws to allow the defenders
  • 85:15 - 85:19
    to keep up with the pace of the attacks.
  • 85:19 - 85:23
    And it's also important to note, you know
    sometimes the attacker would actually know how
  • 85:23 - 85:28
    to shut down the attack, it's just they're
    not legally able to and so there are a lot
  • 85:28 - 85:32
    of inherent delays in the system.
  • 85:32 - 85:32
    >> Brian: Thank you, Miguel.
  • 85:32 - 85:35
    >> Miguel: Just adding to that,
    it's worth noting that there's
  • 85:35 - 85:39
    such a stigma associated
    with security incidence.
  • 85:39 - 85:43
    Organizations are very unwilling to
    admit that something has happened.
  • 85:43 - 85:45
    They don't want to admit so publically.
  • 85:45 - 85:52
    They really, they don't want to collaborate
    and to be effective, a lot of operators have
  • 85:52 - 85:55
    to work, as I mentioned earlier, they
    have to work through back-channels,
  • 85:55 - 85:59
    people they know where the person
    that you're potentially collaborating
  • 85:59 - 86:08
    with would probably get slapped if other people
    were aware of this collaboration taking place.
  • 86:08 - 86:15
    So, that needs to get formalized,
    potentially more formal protocols
  • 86:15 - 86:17
    for collaboration need to be developed.
  • 86:17 - 86:24
    And from an international perspective,
    governments need to do a better job at.
  • 86:24 - 86:28
    They haven't caught up to the
    fact that this is a big issue.
  • 86:28 - 86:35
    So, some examples where we, as an
    operator, we're seeing attacks happening
  • 86:35 - 86:41
    on small government websites, Syria's
    as an example, and you actually want
  • 86:41 - 86:45
    to lend your resources and
    expertise to help these people,
  • 86:45 - 86:50
    but because of their own
    roadblocks, legislation,
  • 86:50 - 86:55
    etcetera they actually can't receive the help
  • 86:55 - 86:57
    that you are potentially
    looking at offering them.
  • 86:57 - 87:04
    So we've been in situations where we've
    seen protest attacks during elections,
  • 87:04 - 87:09
    for example in smaller countries, and
    we are willing to help them but then,
  • 87:09 - 87:13
    these governments have restrictions
    on where their data is etcetera while
  • 87:13 - 87:16
    at the same time they don't
    have the infrastructure to deal
  • 87:16 - 87:21
    with this problem themselves, but they're
    handcuffing themselves, so all of that has
  • 87:21 - 87:24
    to change for us to be able
    to be more effective.
  • 87:24 - 87:25
    >> Brian: Danny?
  • 87:25 - 87:30
    >> Danny: Yeah I think some of this sort
    of the tragedy of the common sort of thing,
  • 87:30 - 87:32
    the sheep on the commons I guess if you will.
  • 87:32 - 87:36
    And what's the impact on
    me or the investment on me?
  • 87:36 - 87:41
    Actually the Internet Security Alliance did
    something not long ago called a CFO's Guide
  • 87:41 - 87:45
    to Cyber Risk and in that document they
    introduced the notion of a digital immigrant
  • 87:45 - 87:52
    and they're talking about someone that didn't
    grow up digital native or wasn't prolific
  • 87:52 - 87:56
    with electronic devices and the
    internet and the capabilities of those
  • 87:56 - 87:59
    and they were discussing how in many places,
  • 87:59 - 88:02
    they're the ones that control the purse
    strings or control the investments.
  • 88:02 - 88:06
    Like people don't have problems investing in
    fire suppression systems but if you ask about a,
  • 88:06 - 88:09
    DDoS mitigation capability, well
    nobody is going to invest in that
  • 88:09 - 88:14
    until they've been attacked right, or
    unless you're a very savvy organization
  • 88:14 - 88:16
    or have a lot of the right folks that do that.
  • 88:16 - 88:21
    And then people even question those investments
    after a long time of not being attacked.
  • 88:21 - 88:27
    So I think definitely looking at what enables
    your business again or whatever size business,
  • 88:27 - 88:30
    because it's all relative
    right, I mean we've seen things
  • 88:30 - 88:34
    from animal rights activists attacking zoos,
  • 88:34 - 88:42
    to Jersy Joe's a local sports memorabilia
    being attacked by a guy across the street
  • 88:42 - 88:44
    for a gold watch and a pair of tennis shoes.
  • 88:44 - 88:46
    And that's a decade old, right?
  • 88:46 - 88:49
    And so, I think understanding what
    the impact of these things are
  • 88:49 - 88:51
    in your business is extremely important.
  • 88:51 - 88:56
    I think understanding the constraints
    today as well, this is a global problem.
  • 88:56 - 89:02
    The internet is loosely interconnected network
    of networks and largely provides any kind
  • 89:02 - 89:04
    of activity and that's a fantastic thing.
  • 89:04 - 89:08
    You know the fact that you can launch
    DDoS attack might be considered a success
  • 89:08 - 89:12
    of that substraight or that
    infrastructure, right I don't know.
  • 89:12 - 89:17
    And so you certainly don't want
    over-pivot either and compromise privacy,
  • 89:17 - 89:22
    you're a regulator, put controls in place
    that might impact that global platform.
  • 89:22 - 89:28
    That's something important as well, so
    I think that's why industry partnership,
  • 89:28 - 89:32
    private sector with halook and things
    like information sharing and saying look,
  • 89:32 - 89:36
    these things are impacting
    real people, real organizations
  • 89:36 - 89:40
    and law enforcement government needs to go
    after that and accommodate those as appropriate.
  • 89:40 - 89:44
    But at the same time, I think we do have
    to be careful about over-pivoting as well.
  • 89:44 - 89:47
    >> Brian: Thanks, Jillian.
  • 89:47 - 89:49
  • 89:49 - 89:53
    >> Jillian: Sure, you know I think I'll just
    give the civil society perspective what we can
  • 89:53 - 89:54
    be doing better.
  • 89:54 - 89:59
    For example, my organization has come under
    several DDoS attacks at different points
  • 89:59 - 90:04
    and we do have a big enough team in place
    to try mitigate those pretty quickly
  • 90:04 - 90:06
    and we've mostly been able
    to do that successfully.
  • 90:06 - 90:11
    But I think there's actually a pretty
    strong lack of information sharing
  • 90:11 - 90:15
    across my type of NGO or NGOs in general.
  • 90:15 - 90:18
    I'll give you an example of this, and
    I don't mean to pick on this group,
  • 90:18 - 90:21
    but I think it's perfect
    and quite public example.
  • 90:21 - 90:25
    Avaz, which I'm sure you're familiar with, a
    few months back they came under DDoS attack
  • 90:25 - 90:29
    and their first reaction was to send a message
    out to their members asking for donations.
  • 90:29 - 90:33
    But what they didn't do is they didn't
    share any of the details of the attack,
  • 90:33 - 90:35
    not that they necessarily needed to publically
  • 90:35 - 90:38
    but they actually straight-up
    refused to share the details.
  • 90:38 - 90:42
    We have a group of technologists who had
    been asking for that information and I think
  • 90:42 - 90:46
    that sometimes that information is actually
    quite helpful for organizations to share
  • 90:46 - 90:50
    with each other so that we can
    understand what type of attacks our allies
  • 90:50 - 90:55
    and friends are coming under and therefore what
    types of attacks we might be at greater risk of.
  • 90:55 - 90:59
    And so I think that that's a really
    good example of how not to respond.
  • 90:59 - 91:07
    In the end they still didn't want to share, and
    we said okay, fine but I think that just sort
  • 91:07 - 91:10
    of going and asking for donations
    and not kind of collaborating
  • 91:10 - 91:14
    with other civil site organization is not
    a particularly helpful way of responding
  • 91:14 - 91:18
    and we'd be much better off if
    we were clearer with each other.
  • 91:18 - 91:19
    >> Brian: Thank you.
  • 91:19 - 91:21
    So thank you for that.
  • 91:21 - 91:23
    I'm going to draw this part to a close.
  • 91:23 - 91:27
    Some takeaways for me in the
    last round of questions is
  • 91:27 - 91:32
    that clearly there are some structural
    barriers to the level of collaboration
  • 91:32 - 91:35
    that everyone seems to believe is
    important to addressing the problem,
  • 91:35 - 91:39
    both at the government level,
    and at the operator level.
  • 91:39 - 91:46
    I guess the understanding at senior management
    level that investments in the security aspect
  • 91:46 - 91:49
    of their business are as critical
    as any other to their business
  • 91:49 - 91:51
    and have to be central to their planning.
  • 91:51 - 91:56
    And at the government level, clearly
    existing legislative structures
  • 91:56 - 92:01
    and collaborative barriers between governments
    need to be broken down if we can get
  • 92:01 - 92:04
    to the place where we can be more aggressively
  • 92:04 - 92:06
    and effectively collaborating
    to address the problem.
  • 92:06 - 92:11
    So, we all knew that we weren't going to solve
    this problem with today's panel and I want
  • 92:11 - 92:15
    to thank you all for giving us a lot
    to think about and those are some
  • 92:15 - 92:18
    of the takeaways that I've gotten for myself.
  • 92:18 - 92:26
    So now, let's take a breath and for the next 35
    minutes or so, try to have a little bit of fun,
  • 92:26 - 92:30
    make it a little bit more dynamic for the
    panelists by running through a scenario
  • 92:30 - 92:34
    and then we'll have 30 minutes at the end
    where we want to hear Q&A again from folks
  • 92:34 - 92:36
    in the room and from the folks online.
  • 92:36 - 92:41
    So, shift your mindset now on
    the panel, we're going to walk
  • 92:41 - 92:44
    through a scenario of a DDoS attack.
  • 92:44 - 92:49
    What I'd like you to think about
    is what your specific role would be
  • 92:49 - 92:55
    within the scenario and how would you react?
  • 92:55 - 93:02
    What would be the things that would be important
    to you in addressing your part of the problem?
  • 93:02 - 93:04
    There's a clear understanding
    and appreciation for the fact
  • 93:04 - 93:10
    that good security also means not divulging
    all of your good effective practices.
  • 93:10 - 93:14
    So I'm not asking you to say anything
    that you wouldn't want to say publically.
  • 93:14 - 93:15
    Let's get that clear.
  • 93:15 - 93:20
    But I want you to take this on as a
    real-time event and then in your proper role,
  • 93:20 - 93:24
    tell the audience what's important to
    you, what do you need, and in a direction
  • 93:24 - 93:31
    of how would you see or design a best
    practices reaction to this scenario.
  • 93:31 - 93:34
    So let's start this part of the program.
  • 93:34 - 93:39
    So the scenario we've developed is as follows.
  • 93:39 - 93:45
    The citizens of small country A,
    let's call it the Kingdom of Genovia,
  • 93:45 - 93:48
    my 14-year-old daughter insisted that I do that.
  • 93:48 - 93:54
    Kingdom of Genovia has been criticizing
    an economic embargo put in place
  • 93:54 - 94:04
    by a regional Hodgeman, let's call it Mordor,
    against its neighbor, a small country Gilder.
  • 94:04 - 94:10
    The citizens of Genovia who have a long
    standing alliance with Gilder are very upset
  • 94:10 - 94:12
    about Mordor's embargo against Gilder.
  • 94:12 - 94:17
    Condemnations include mass rallies as well
  • 94:17 - 94:22
    as increasingly critical posts
    on blogs and social media sites.
  • 94:22 - 94:27
    While the government of Genovia itself
    shows no public support for the protestors,
  • 94:27 - 94:31
    neither does it criticize them for
    exercising their freedom of expression rights,
  • 94:31 - 94:35
    fueling speculation that it
    actually condones the protests
  • 94:35 - 94:38
    and may even be behind some of them.
  • 94:38 - 94:43
    Large-scale DDoS attacks begin against Genovia.
  • 94:43 - 94:46
    They are aimed primarily at the social
    media sites posting the criticisms
  • 94:46 - 94:50
    but also at Genovia's financial sector.
  • 94:50 - 94:57
    Researchers indicate that the attacks are coming
    from botnets of comprised end-user machines.
  • 94:57 - 95:03
    The financial attacks are perceived to
    be an attempt to weaken Genovia's economy
  • 95:03 - 95:08
    because the core issue, after all is an embargo
    and that the financial sector has showed itself
  • 95:08 - 95:14
    to susceptible to other kinds of
    security incidence and breaches.
  • 95:14 - 95:19
    Traces show the attacks originating
    primarily in Mordor.
  • 95:19 - 95:23
    Some of which could be locations
    under government control.
  • 95:23 - 95:27
    Some however, appear to come
    from unrelated countries.
  • 95:27 - 95:31
    Mordor predictably, denies any responsibility.
  • 95:31 - 95:37
    With those facts, in your respective
    roles and responsibilities,
  • 95:37 - 95:42
    start off with what's important to you
    in your given role and then we'll move
  • 95:42 - 95:44
    on to what actions you might take.
  • 95:44 - 95:50
    Jeff, do you want to tee it up?
  • 95:50 - 95:56
    >> Jeff: I guess the first thing, you know I'm
    being the least technical guy up here I think,
  • 95:56 - 96:03
    you're going to want to really figure out, you
    know you talked about the attacks originating
  • 96:03 - 96:08
    from Mordor, but does that mean
    the commanding control is there?
  • 96:08 - 96:11
    Are the machines all over the place?
  • 96:11 - 96:18
    If you're going to respond, you need to figure
    out first what is your first goal in responding?
  • 96:18 - 96:21
    Are you going to try to stabilize
    your systems or are you going to try
  • 96:21 - 96:26
    to somehow get attribution
    and then seek retribution?
  • 96:26 - 96:33
    So, I guess my first council would be look at
    what you have in place to respond and figure
  • 96:33 - 96:34
    out what your ultimate goals are.
  • 96:34 - 96:37
    You need to know what you're driving
    at so you're not wasting resources,
  • 96:37 - 96:47
    pursuing answers to questions that don't
    help you achieve your ultimate goal.
  • 96:47 - 96:50
    >> Brian: Thank you, Ram.
  • 96:50 - 96:51
    >> Ram: Four things.
  • 96:51 - 96:55
    One, get contact lists together
    because you know people
  • 96:55 - 96:58
    but there are other people involved
    here, so you've got to get that.
  • 96:58 - 97:01
    That's in some ways the top thing.
  • 97:01 - 97:04
    Second is to setup an analysis stream work.
  • 97:04 - 97:13
    Once you identify the scope of the problem, then
    you need a framework in which to actually work
  • 97:13 - 97:16
    as new data comes in and you need a structure.
  • 97:16 - 97:19
    So create a structure for it.
  • 97:19 - 97:27
    Third thing is to begin working with upstream
    providers, folks who are connecting you
  • 97:27 - 97:29
    and connecting others to the internet.
  • 97:29 - 97:36
    Start working with them because you need to
    have information sharing and also the ability
  • 97:36 - 97:42
    to take mitigation measures, to
    take steps if and when you have to.
  • 97:42 - 97:51
    And the fourth is to setup alerts based
    on pattern recognition or traffic analysis
  • 97:51 - 97:54
    that your analytical team is already doing.
  • 97:54 - 97:58
    Those are the first four things to do.
  • 97:58 - 98:01
    >> Brian: Thank you, Damian.
  • 98:01 - 98:08
    >> Damian: So the first thing I would ask about
    this would be what style of attack is this?
  • 98:08 - 98:13
    Depending on some attacks can be
    spoofed with the sources, some cannot.
  • 98:13 - 98:19
    So if the sources are definitively like, you
    know they're definitively coming from Mordor
  • 98:19 - 98:25
    or you know what these sources are, that
    can help a lot more than if it's an attack
  • 98:25 - 98:28
    where you don't really know where
    it's coming from, you just know--
  • 98:28 - 98:32
    you don't know which machine
    it's coming from in Mordor.
  • 98:32 - 98:36
    You know that it's just coming from
    that country in general, maybe.
  • 98:36 - 98:40
    And I think that's the key
    thing to focus on here.
  • 98:40 - 98:44
    I mean, I agree with what other's said,
    but I think it's important to start
  • 98:44 - 98:50
    by understanding the details of the
    attack, figuring out what you actually know
  • 98:50 - 98:54
    and versus what you are assuming
    or guessing about the attack.
  • 98:54 - 99:01
    And then I would also start thinking about
    what type of collateral damage is acceptable.
  • 99:01 - 99:08
    If you really only care about financial services
    in Genovia being accessible to people living
  • 99:08 - 99:15
    in Genovia, they could at the boarder of their
    country, just block all traffic from Mordor and
  • 99:15 - 99:19
    yet people who happen to be on
    vacation to Mordor might not be able
  • 99:19 - 99:22
    to access their bank account,
    and that would be pretty bad.
  • 99:22 - 99:28
    But you could at least partition the
    problem and keep your own country up.
  • 99:28 - 99:31
    >> Brian: Thanks for that point and just
    to note, people on vacation in Mordor
  • 99:31 - 99:34
    to my understanding, no one walks into Mordor.
  • 99:34 - 99:35
    Miguel, please.
  • 99:35 - 99:40
    >> Miguel: I might actually repeat some of
    the things that my colleagues here have said.
  • 99:40 - 99:45
    From the perspective of an operator
    that focuses on mitigation and defense,
  • 99:45 - 99:50
    I would probably start by
    looking at the affected entities.
  • 99:50 - 99:56
    Get a good scope on what the
    targets are, what's being affected.
  • 99:56 - 99:59
    Move to start looking at determining
    what the attack vectors are
  • 99:59 - 100:01
    that are being used for this particular attack.
  • 100:01 - 100:06
    You can do this in a variety of ways
    and then I'd probably start focusing
  • 100:06 - 100:12
    on starting the mitigation techniques and
    the defense against these affected systems.
  • 100:12 - 100:20
    As Damian said earlier, I'd look at prioritizing
    and trying to determine or trying to gauge
  • 100:20 - 100:27
    which affected resources are acceptable
    collateral damage which are priorities and need
  • 100:27 - 100:33
    to be available and need to be in place.
  • 100:33 - 100:38
    I'd be sharing information as much as possible
    with both, the public and private sector,
  • 100:38 - 100:42
    the operators in question that manage
    the assets that are being attacked.
  • 100:42 - 100:46
    So definitely start reaching out to people.
  • 100:46 - 100:49
    Another thing that I would be doing
    is heavily monitoring social media.
  • 100:49 - 100:59
    Typically with an attack on Mordor, let's
    say and suspected political motivations
  • 100:59 - 101:02
    for the attack, I would be looking at
    Facebook, I'd be looking at Twitter,
  • 101:02 - 101:04
    I'd be looking at internet relay chat rooms.
  • 101:04 - 101:10
    Anywhere where these attackers could potentially
    congregate to organize, I'd be monitoring that
  • 101:10 - 101:14
    and I'd be trying to agleam
    as much information as I can
  • 101:14 - 101:16
    from that activity that is going on online.
  • 101:16 - 101:19
    So those are some of the
    things that I'd be doing.
  • 101:19 - 101:21
    >> Brian: Thank you, Danny.
  • 101:21 - 101:26
    >> Danny: So yeah I guess there's both a luxury
    in going last and not having much [inaudible],
  • 101:26 - 101:29
    but there are a few things
    I could offer actually.
  • 101:29 - 101:31
    I think these guys are all
    spot-on with a lot of this.
  • 101:31 - 101:35
    I think it certainly, whatever
    detection capabilities you have for this,
  • 101:35 - 101:40
    whether it was a phone call, hopefully
    not, or an alert or some capability,
  • 101:40 - 101:43
    engage your incident response
    capability which you should have now
  • 101:43 - 101:45
    because you've been alerted to that.
  • 101:45 - 101:49
    And the figure out what controls
    for that sort of attack factor,
  • 101:49 - 101:51
    right, exactly as these guys have said.
  • 101:51 - 101:56
    You certainly want to continue with continuous
    monitoring and make sure that other devices,
  • 101:56 - 102:02
    other things aren't impacted in particular
    with sort of multi-vector attacks,
  • 102:02 - 102:05
    especially such as this which we
    have seen empirically in the past.
  • 102:05 - 102:10
    One of the things that you have to be really
    careful about and we've actually seen this
  • 102:10 - 102:15
    in the past and learned from that, is Genovia
    should have learned from is that you've got
  • 102:15 - 102:19
    to be really careful about what kind of
    controls you put in place for attacks as well
  • 102:19 - 102:22
    because you may say, I'm going to bring
    everything back into my organization,
  • 102:22 - 102:25
    under control and then I'll
    turn my internet access back up
  • 102:25 - 102:27
    or inside my nation, or whatever it is.
  • 102:27 - 102:31
    And we've literally seen this at the
    national level and so you decide you're going
  • 102:31 - 102:35
    to break all your connectivity and then you
    realize you don't have a root name server,
  • 102:35 - 102:37
    or you realize your CCTLD is hosted in Mordor.
  • 102:37 - 102:42
    Or you realize that your emails over
    there, your authentication service,
  • 102:42 - 102:47
    your CA that issues your searcher there
    or, some other resource that you need.
  • 102:47 - 102:49
    So you really need to numerate those things
  • 102:49 - 102:53
    and understand what enables your
    business before these attacks occur.
  • 102:53 - 102:59
    I think I use this statement in the past
    but kind of goes back to Mike Tyson's,
  • 102:59 - 103:03
    "Everyone's got a plan until they
    get hit," sort of mentality, right.
  • 103:03 - 103:07
    And so I think that if you haven't done
    this and you're on the receiving end
  • 103:07 - 103:14
    of a large-scale attack, it could be really
    problematic so certainly absorbing an attack
  • 103:14 - 103:18
    and then refining your controls and mitigating
    as surgically as possible and then trying
  • 103:18 - 103:22
    to move those controls further and further
    upstream and then collaborate as much
  • 103:22 - 103:25
    as possible is pretty much what you can do today
  • 103:25 - 103:30
    and then protect any forensics information
    associated with that for whatever it is
  • 103:30 - 103:32
    that you might intend to
    do with that information.
  • 103:32 - 103:34
    >> Brian: Thank you, Jillian.
  • 103:34 - 103:36
    >> Jillian: There is almost
    nothing left for me to add here.
  • 103:36 - 103:39
    It is the great thing about going last.
  • 103:39 - 103:44
    But since you did ask what my organization
    might do, I suspect that after the leaks
  • 103:44 - 103:47
    to the Mordor times come out that Mordor
    government officials had something to do
  • 103:47 - 103:50
    with the attacks, we would probably
    condemn the government of Mordor
  • 103:50 - 103:55
    for having double standards-- no
    I'm just kidding, sort of, but yeah,
  • 103:55 - 104:00
    nothing that I can add from
    a technical perspective.
  • 104:00 - 104:04
    >> Brian: Okay, well from-- you know what I'm
    going to reverse order here, so you'll go first
  • 104:04 - 104:08
    and Jeff you're going to have to
    deal with Danny's problem next.
  • 104:08 - 104:14
    So this is good and very helpful in terms of
    the first priorities, the first analytical
  • 104:14 - 104:19
    and reaction priorities from your
    perspectives very clear and interesting--
  • 104:19 - 104:22
    not interesting but a lot of
    consistency across the board there.
  • 104:22 - 104:29
    Now let's take it from the point of view
    of, if this were an ideal scenario in terms
  • 104:29 - 104:35
    of effective mitigation techniques, effective
    collaboration with network operators,
  • 104:35 - 104:39
    effective collaboration with
    government law enforcement resources.
  • 104:39 - 104:46
    Walk us through how you would get to that good
    outcome from that perspective and Jillian,
  • 104:46 - 104:48
    from your own point of view, kick it off.
  • 104:48 - 104:50
    >> Jillian: I'm not sure
    I can kick that one off.
  • 104:50 - 104:56
    Like I said, this is a wonderful
    and probably very likely scenario
  • 104:56 - 105:00
    but it's also it's not the level at which
    we're generally dealing with these things
  • 105:00 - 105:03
    and so I'd actually love it if
    somebody else wants to kick it off
  • 105:03 - 105:04
    and I'll keep thinking through that.
  • 105:04 - 105:07
    >> Brian: All right, Danny, you're first up.
  • 105:07 - 105:10
    >> Danny: Wow, an ideal scenario
    is that it's not my problem anymore
  • 105:10 - 105:16
    and so having the capability to either certainly
    stop these things from being launched at me
  • 105:16 - 105:19
    with some sort of capability or
    collaboration with law enforcement,
  • 105:19 - 105:24
    other folks which in this case
    might be very problematic so,
  • 105:24 - 105:28
    at the sort of ultimate ingress point of
    your network, putting controls in place
  • 105:28 - 105:34
    that minimize collateral damage or even scope
    the distribution of reachability information
  • 105:34 - 105:36
    in a certain place on the
    infrastructure, that sort of thing
  • 105:36 - 105:39
    so that you have some sustainable
    controls in place
  • 105:39 - 105:46
    and you're not continuously simply filling links
    and absorbing that and causing collateral damage
  • 105:46 - 105:48
    to other services or people
    that may use those links.
  • 105:48 - 105:55
    It's really problematic if there inter-media
    networks with other eyeballs or content
  • 105:55 - 105:58
    or other things that you may or
    may not want on your infrastructure
  • 105:58 - 106:01
    and so if it's an adjacent
    network, it's a lot simpler, right,
  • 106:01 - 106:06
    it simply if you've done your homework
    before and then simply shut those links off
  • 106:06 - 106:12
    and you may be fine, but if I'm a
    smaller network and this is someone,
  • 106:12 - 106:18
    somewhere that's nonadjacent to me, it could be
    much more problematic because I may have to work
  • 106:18 - 106:22
    with them to push controls further and further
    upstream and that's about their capabilities,
  • 106:22 - 106:26
    the lulls, what sort of technical
    or legal framework
  • 106:26 - 106:29
    that they operate under,
    time scales and other things.
  • 106:29 - 106:38
    And so, it's sort of all relative to perspective
    and why the broad variance of attack factors
  • 106:38 - 106:42
    that occur today, why it's so problematic
    to just get your cookie cutter out
  • 106:42 - 106:46
    and say this is a solution for that
    and so, it's nontrivial I think,
  • 106:46 - 106:49
    so it entirely depends on
    vectors and other things.
  • 106:49 - 106:52
    I'm not sure if I said anything
    that was actually useful, but--
  • 106:52 - 106:54
    >> Brian: That's fine, Miguel please.
  • 106:54 - 106:59
    >> Miguel: In an ideal scenario
    where information is being shared,
  • 106:59 - 107:05
    where we've quickly been able to determine what
    the attack vector is, we are looking at ensuring
  • 107:05 - 107:08
    that we can put really precise filters in place
  • 107:08 - 107:12
    to lob off attack traffic while
    letting good traffic through.
  • 107:12 - 107:15
    It's easier said than done a lot of the time.
  • 107:15 - 107:19
    As I said, it's in an ideal
    situation we understand the attack,
  • 107:19 - 107:25
    and we can put the right mitigation
    strategies in place to deal with it.
  • 107:25 - 107:31
    So in that ideal situation, most likely
    we should be able to get to availability
  • 107:31 - 107:34
    within minutes if people
    are cooperating correctly
  • 107:34 - 107:37
    and we have the information that we need.
  • 107:37 - 107:41
    The problem is that we don't
    live in an ideal world
  • 107:41 - 107:45
    and beyond that, attackers are smart, right?
  • 107:45 - 107:54
    So they try one thing and then you
    scramble and get the sites available again
  • 107:54 - 107:58
    and put the right mitigation strategy in place,
  • 107:58 - 108:01
    but then potentially they might
    start trying something else.
  • 108:01 - 108:05
    You know if that's not being effected, they'll
    go route B and then potentially will go right
  • 108:05 - 108:14
    to route C, so it's a cat and mouse game and
    it's far from ideal and it's starting over again
  • 108:14 - 108:18
    in some sense in terms of putting together
    another mitigation strategy to deal
  • 108:18 - 108:23
    with the new attack vector or signature
    that comes in and unfortunately,
  • 108:23 - 108:29
    the ideal scenarios never happen and
    attackers have gotten smart and they know how
  • 108:29 - 108:34
    to [inaudible] it up and do the damage,
    and put the damage that they need
  • 108:34 - 108:36
    to for the people that are unprepared.
  • 108:36 - 108:38
    >> Brian: Thank you, Damian just let
    me interject before you go there.
  • 108:38 - 108:44
    So hearing Danny and Miguel,
    clearly understanding that again,
  • 108:44 - 108:49
    the problem of the upstream operator and
    what their sophistication capabilities are
  • 108:49 - 108:55
    in helping you diagnose the problem across
    networks, if you will you pointed out.
  • 108:55 - 108:58
    And also the clear understanding
    of needing to kind
  • 108:58 - 109:02
    of secure your resources and
    prevent collateral damage.
  • 109:02 - 109:09
    But Damian, Ram, Jeff, bring in also how do
    we work effectively with law enforcement?
  • 109:09 - 109:13
    What can they do to help, what can
    you do together and the good scenario
  • 109:13 - 109:19
    when it works well with the upstream
    provider, what does that look like?
  • 109:19 - 109:23
    >> Damian: Yes I'll start by saying
    without bringing in law enforcement,
  • 109:23 - 109:28
    ideally you would be able to work directly with
    the network operator, they do want to track it
  • 109:28 - 109:32
    through their network and
    stop the attack upstream.
  • 109:32 - 109:39
    There are situations as Miguel was
    saying; sometimes it's a little tricky.
  • 109:39 - 109:45
    In this case we don't know if the
    government of Mordor is behind these attacks.
  • 109:45 - 109:50
    So, it's sticking with the scenario
    it's never going to be entirely idea
  • 109:50 - 109:56
    because you don't necessarily want to tell
    the ISP in Mordor what your fingerprint
  • 109:56 - 110:01
    of the attack is which maybe would help them
    filter it because they might just turn around
  • 110:01 - 110:04
    and tell the government, the government
    will modify the attack to not match
  • 110:04 - 110:07
    that fingerprint anymore and then you're
    in bigger trouble than you were before.
  • 110:07 - 110:15
    So, depending on how paranoid you want
    to be, I'm a security person so I'm paid
  • 110:15 - 110:21
    to be paranoid but, you have to be a little
    cautious about what information you're sharing.
  • 110:21 - 110:26
    Try to share information that's
    useful for stopping the attack but,
  • 110:26 - 110:30
    not sharing everything you know about
    the attack so you can still trace it.
  • 110:30 - 110:38
    In terms of law enforcement since we're
    in the U.S., U.S. CERT is a good resource.
  • 110:38 - 110:41
    They have contacts at CERTs.
  • 110:41 - 110:44
    CERT is Computer Emergency Response Team.
  • 110:44 - 110:48
    They have contacts at CERTs at every
    other country and so that's very helpful
  • 110:48 - 110:51
    because they're sort of a central point.
  • 110:51 - 110:56
    They might be able to recognize that
    you're not the only victim of an attack,
  • 110:56 - 111:01
    so they might be able to correlate events
    that you perhaps were not aware of.
  • 111:01 - 111:04
    And they can also assist with language issues.
  • 111:04 - 111:09
    You know it's very difficult for me
    personally to email an ISP in Asia
  • 111:09 - 111:15
    because I don't speak any of the Asian languages
    whereas U.S. CERT probably has the ability
  • 111:15 - 111:19
    to handle that translation a little bit better
  • 111:19 - 111:23
    than Google Translate which
    is my fallback option.
  • 111:23 - 111:24
    [Laughter]
  • 111:24 - 111:26
    >> Brian: Thank you, Ram.
  • 111:26 - 111:34
    >> Ram: Thanks, so in this ideal scenario
    perhaps one of the things that have to be worked
  • 111:34 - 111:38
    on is the formation of an
    alliance for data sharing.
  • 111:38 - 111:43
    Especially identifying who the next
    Genovia might be and you go work
  • 111:43 - 111:49
    out who those next Genovia's might be and
    this kind of an alliance cannot be government
  • 111:49 - 111:56
    to governments, it's got to be public, private,
    a combination of that and that takes time to do
  • 111:56 - 111:59
    but this is the time to start
    doing it [inaudible].
  • 111:59 - 112:04
    The second, you know we're talking about this
    ideal scenario and there is rapid availability.
  • 112:04 - 112:08
    The attack happened, mitigation
    happened, everything came back
  • 112:08 - 112:14
    but remember this might simply Mordor
    profiling you for a bigger attack to come
  • 112:14 - 112:20
    and they've now learned how you countered it
    and their building counter-measures right now
  • 112:20 - 112:23
    for your counters and that's likely to happen
  • 112:23 - 112:27
    if this is really a serious
    act coming up against you.
  • 112:27 - 112:33
    So, you may leave everything
    on the floor at this time
  • 112:33 - 112:37
    and you may just get killed
    really online the next time.
  • 112:37 - 112:46
    On the third is law enforcement, this is a case
    where most often this is a source less crime,
  • 112:46 - 112:51
    there is no one to prosecute, there's no
    one to really go after for the most part.
  • 112:51 - 112:58
    Most of the people along the way are in
    transit and are trying to help to some extent.
  • 112:58 - 113:02
    They're just doing their job passing
    packets along, passing information along
  • 113:02 - 113:09
    and they got coopted into something that
    was initially beyond their understanding
  • 113:09 - 113:13
    and eventually beyond their
    ability to solve individually.
  • 113:13 - 113:19
    So you have to start to change a little bit of
    law enforcement's mindset of who are we going
  • 113:19 - 113:25
    after because this is not so much about
    a counter attack, this is often much more
  • 113:25 - 113:33
    about prevention and you have to start
    thinking about the online equivalence
  • 113:33 - 113:42
    of a neighborhood watch and one doesn't
    really exist in any coordinated way today.
  • 113:42 - 113:43
    >> Brian: Thanks, Jeff.
  • 113:43 - 113:46
    >> Jeff: I definitely like going last.
  • 113:46 - 113:50
    I have more time to think about what I'm going
    to say and I bounced around with a few ideas
  • 113:50 - 113:52
    but you know they say don't fight the scenario
  • 113:52 - 113:54
    but I was always the kid
    who fought the scenario.
  • 113:54 - 113:58
    So I guess I would start kind of where
    Damian went, if you're an ideal scenario
  • 113:58 - 114:06
    that means Mordor is helping and helping
    you willingly and with no ill intent
  • 114:06 - 114:09
    in actually wanting to stop their
    own citizens who [inaudible]
  • 114:09 - 114:11
    and probably something they believe in.
  • 114:11 - 114:16
    Which leads me to point two, I think Ram hit
    well, if everything is really going that well,
  • 114:16 - 114:20
    that's when you should really start being
    scared because things never go that well.
  • 114:20 - 114:23
    So question everything that worked
    and try to figure out why it worked
  • 114:23 - 114:27
    and is someone just letting you think it worked?
  • 114:27 - 114:33
    In terms of what does it look like to be
    successful on the legal and governmental side,
  • 114:33 - 114:36
    there are a lot of things you need to work.
  • 114:36 - 114:39
    Governments that are willing to share
    information, that have relationships,
  • 114:39 - 114:42
    that trust each other, but then
    even beyond that you need laws
  • 114:42 - 114:47
    that will allow the information sharing both
    between the private sector and the government
  • 114:47 - 114:49
    within each country and then
    between the various governments.
  • 114:49 - 114:52
    But then you also need laws
    that protect the privacy
  • 114:52 - 114:56
    of the individuals whose information is
    being shared and assuming you have all that
  • 114:56 - 115:00
    and you get the information that allows
    you to find the actual source of the crime
  • 115:00 - 115:05
    which as Ram said is very difficult, you
    actually have both resources and laws
  • 115:05 - 115:11
    that allow prosecution and not in medieval ways
    of people who are doing these types of acts.
  • 115:11 - 115:18
    So going back to, you really need
    to figure out what your end-goal is
  • 115:18 - 115:22
    out of this before you figure
    out, it would be great
  • 115:22 - 115:24
    if you'd actually prosecute the people doing it.
  • 115:24 - 115:27
    It would be better if you could get
    all your systems back up really quickly
  • 115:27 - 115:32
    and try to develop better relationships
    to prevent them in the future.
  • 115:32 - 115:33
    >> Brian: So Jeff, just picking
    up at that point,
  • 115:33 - 115:38
    this will be the last round then we'll
    turn it over to Q&A for the audience
  • 115:38 - 115:41
    and Ram mentioned the notion of an alliance.
  • 115:41 - 115:45
    Danny the scizrick work that
    mentioned at the FCC.
  • 115:45 - 115:52
    Very interesting industry, government but
    clearly, just uniquely ISP focused in terms
  • 115:52 - 115:58
    of best practices or a potential code
    of conduct if you will in that exercise.
  • 115:58 - 116:04
    Where is this collaboration happening today or
    the seeds of this collaboration between industry
  • 116:04 - 116:10
    and government specifically that
    clearly has to be globally oriented.
  • 116:10 - 116:13
    That has to be cross-cutting across boundaries.
  • 116:13 - 116:16
    Where is that happening, where should it begin
  • 116:16 - 116:19
    to happen more deeply and
    how can we make that happen?
  • 116:19 - 116:21
    I'll open to the entire panel.
  • 116:21 - 116:23
    Danny.
  • 116:23 - 116:32
    >> Danny: So yeah there are a lot of national
    level stuff that I mentioned certainly as some
  • 116:32 - 116:37
    of the countries that blazing the trail
    there from Australia, to Germany, to Finland,
  • 116:37 - 116:43
    to the U.S. I mean some of the work that
    the FCC and others have done which is
  • 116:43 - 116:46
    about educating folks and sharing information.
  • 116:46 - 116:51
    A lot of this as you'll notice, even though
    these scenarios comes back to international laws
  • 116:51 - 116:58
    or even national laws or disclosure laws or fair
    disclosure laws, right I mean what is the extent
  • 116:58 - 117:03
    of where I can share information and who I can
    get help from and where can we get collaboration
  • 117:03 - 117:07
    from a nation state versus send in a
    snatch team or not do anything, right?
  • 117:07 - 117:14
    And so, what are the kinds of capabilities that
    you have, and then you'd really like to operate
  • 117:14 - 117:18
    in meet space and prosecute people that
    have real impacts on real businesses
  • 117:18 - 117:22
    and break walls internationally,
    but how do you balance
  • 117:22 - 117:26
    that internationally with
    the privacy for example?
  • 117:26 - 117:30
    I mean that's a tough balance because if you
    can attribute every transaction on the internet,
  • 117:30 - 117:34
    then no one has any privacy or
    [inaudible] and what does that mean
  • 117:34 - 117:36
    for censorship or for other things.
  • 117:36 - 117:39
    So all these sort of things together is,
  • 117:39 - 117:43
    it is definitely needs more
    leadership from the government.
  • 117:43 - 117:46
    I think they've certainly
    done a humungous amount,
  • 117:46 - 117:51
    and from local law enforcement folks
    we work with, to national level folks,
  • 117:51 - 117:54
    and certainly Jeff and some
    of the places he'd been.
  • 117:54 - 117:57
    A lot of the folks looking for ways
    to collaborate and to put frameworks
  • 117:57 - 118:05
    in place allowing information sharing and enable
    in a sort of protections of private sector
  • 118:05 - 118:11
    and industry and you know that the government's
    got your back for this and that they're going
  • 118:11 - 118:15
    to pull the levers and turn the
    steam valves they to make sure
  • 118:15 - 118:18
    that if someone is attacking someone on
    this infrastructure and have an impact
  • 118:18 - 118:24
    that it's having a real impact and
    represent their citizens wherever they are.
  • 118:24 - 118:28
    So I think it sort of goes all the way back
    to that from the international perspective
  • 118:28 - 118:32
    because of the projection capability
    that advisories have on the internet
  • 118:32 - 118:39
    and there are a lot of alliances, a lot are
    private sector, public sector, partnerships,
  • 118:39 - 118:42
    everything from internet security alliance,
    online trust alliance, stop bad ware.
  • 118:42 - 118:44
    I mean there's no shortage.
  • 118:44 - 118:49
    I mean a lot of the outreach that we
    talked about, the work that [inaudible]
  • 118:49 - 118:53
    and anti-phishing working group and
    some of the other folks have done.
  • 118:53 - 119:00
    So I think that a lot of this is happening but
    it certainly, the industry level leadership
  • 119:00 - 119:05
    with the recognition by governments
    that they're captive to this.
  • 119:05 - 119:07
    We're all sort of captive to
    this and the only way we're going
  • 119:07 - 119:10
    to get there is if we collaborate.
  • 119:10 - 119:12
    >> Brian: Thanks, anybody else?
  • 119:12 - 119:13
  • 119:13 - 119:17
    >> You know there are many more
    acronyms we could throw out there
  • 119:17 - 119:21
    about the various public/private
    collaboration partnerships.
  • 119:21 - 119:23
    Some doing great work, some doing work.
  • 119:23 - 119:29
    [Laughter] But I want to get back to
    something I think Miguel touched on earlier
  • 119:29 - 119:34
    about information sharing and the need to share
    information and most folks who would go ahead
  • 119:34 - 119:35
    and share will get slapped down for it.
  • 119:35 - 119:43
    There are two reasons for it, one
    corporate strategic secret issues,
  • 119:43 - 119:45
    but also the lawyers will
    often slap you down because,
  • 119:45 - 119:47
    well can we really share that information.
  • 119:47 - 119:53
    That's an area where I think we need change
    and we need it soon is changing the laws
  • 119:53 - 119:58
    that limit the ability of companies who want to
    share information with other companies, ECPA,
  • 119:58 - 120:04
    Electronic Communication Privacy Act, antitrust
    laws, all these don't need to be gutted,
  • 120:04 - 120:07
    they need to be reformed and
    frankly we got to a very weird place
  • 120:07 - 120:10
    in the [inaudible] legislative cycle
    this year where you had the head
  • 120:10 - 120:15
    of the national security agency and you had
    privacy groups all saying this is something we
  • 120:15 - 120:18
    need to do and here's the framework
    that we all think actually can work.
  • 120:18 - 120:23
    It based our own idea of sharing cyber
    security information narrowly defined
  • 120:23 - 120:25
    for cyber security purposes, narrowly defined,
  • 120:25 - 120:30
    but Congress in its infinite
    wisdom got you have the NSA
  • 120:30 - 120:34
    and the privacy groups essentially
    agreeing, so Congress chose not to act.
  • 120:34 - 120:38
    And that is something that I think is not
    going to solve the problem but would be a step
  • 120:38 - 120:41
    in the right direction to
    allow information sharing
  • 120:41 - 120:43
    and maybe breakdown some of those barriers.
  • 120:43 - 120:49
    Make it happen 5, 10, 15, minutes an hour
    soon, sooner or even won't happen at all
  • 120:49 - 120:53
    so that's something that within all these
    groups there are still these limitations
  • 120:53 - 120:57
    that are illegal and need to
    be changed by the politicians.
  • 120:57 - 120:59
    >> Brian: Thanks, Damian.
  • 120:59 - 121:03
    >> Damian: I wanted to mention there are
    some ways that collaboration can occur
  • 121:03 - 121:09
    without needing to necessarily involve
    lawyers or worry about user privacy.
  • 121:09 - 121:14
    Some of the attacks that we see there's
    just sharing information and about the fact
  • 121:14 - 121:17
    that we're seeking an attack,
    the size of the attack,
  • 121:17 - 121:19
    the type of the attack can be helpful to others.
  • 121:19 - 121:27
    So as a recent example the dos attacks
    that hit the banks recently hit us actually
  • 121:27 - 121:32
    about a week before it started hitting all
    of the banks and we sent a quick heads-up
  • 121:32 - 121:38
    to a security list of people
    just letting them know,
  • 121:38 - 121:41
    hey we're getting this surprisingly
    large attack.
  • 121:41 - 121:44
    This is a bit unusual; this
    is what it looks like.
  • 121:44 - 121:47
    You might want to watch out, be prepared.
  • 121:47 - 121:51
    Unfortunately two days later, we wrote
    back and said it just doubled in size,
  • 121:51 - 121:56
    but there are things that you
    can do to give out information.
  • 121:56 - 122:00
    We're not giving out necessarily like
    the IP addresses that it's coming
  • 122:00 - 122:05
    from because we have talk to lawyers
    about the privacy implications of that,
  • 122:05 - 122:09
    but even just the basic information about the
    type of attack that you're getting and the size
  • 122:09 - 122:16
    and maybe the general area of the world it's
    coming from can be very helpful to others.
  • 122:16 - 122:19
    >> Brian: Thanks, any last remarks?
  • 122:19 - 122:22
    Okay, thank you panelists
    very much for playing along
  • 122:22 - 122:25
    and for the great information
    you provide with us so far.
  • 122:25 - 122:30
    So let's get to the real important folks here
    today, the audience both here and online.
  • 122:30 - 122:35
    At least for the next 30 minutes, we'll
    have an open mic in the middle of the room.
  • 122:35 - 122:40
    I think we have some questions
    from online, so if you would,
  • 122:40 - 122:49
    please [inaudible] we have--
    [Pause]-- it doesn't work?
  • 122:49 - 122:50
  • 122:50 - 122:55
    Why don't you come up and use this
    microphone if you would to pose your question.
  • 122:55 - 122:56
    [Pause]
  • 122:56 - 123:03
    >> David: I'm David Thaumenal [phonetic]
    President of The Internet Society of New York
  • 123:03 - 123:07
    and just as we have software as a
    service and infrastructure as a service,
  • 123:07 - 123:13
    there's now crime-ware as a service so if I'm a
    bad person, rather than going to all the trouble
  • 123:13 - 123:16
    of actually attacking somebody
    I don't like on the internet,
  • 123:16 - 123:23
    I can actually pay a service
    provider to do it for me
  • 123:23 - 123:29
    and they're using a commercial business model
    so I can have warranties, guarantees of quality
  • 123:29 - 123:33
    of service, support contracts
    and everything else.
  • 123:33 - 123:41
    So my question is wouldn't it make sense
    for whether it's industry or law enforcement
  • 123:41 - 123:49
    or whatever to focus on identifying these
    crime-ware service providers infiltrating them,
  • 123:49 - 123:55
    targeting them, purchasing their
    software and reverse engineering it
  • 123:55 - 124:01
    to disable it, that type of thing?
  • 124:01 - 124:05
    >> Brian: Anyone on the panel want to take that?
  • 124:05 - 124:12
    >> Danny: Absolutely in if you go back
    to the scenario of an ideal world,
  • 124:12 - 124:16
    but a lot of these are happening offshore in
    countries that aren't particularly mendable
  • 124:16 - 124:23
    to working with our law enforcement
    to arrest or prosecute.
  • 124:23 - 124:28
    Reverse engineering I think goes on, but the
    problem is that the software morph so quickly
  • 124:28 - 124:33
    that the signatures old as soon as you know it.
  • 124:33 - 124:37
    And there are other efforts, other
    techniques for protecting against it
  • 124:37 - 124:41
    and I think that's actively underway, but
    in terms of infiltrating, breaking up,
  • 124:41 - 124:44
    prosecuting, they'd just go somewhere else.
  • 124:44 - 124:50
    >> So I was going to add just there
    is one aspect to this certainly lots
  • 124:50 - 124:53
    of folks are looking at when you try to
    move it back to meet space and the place
  • 124:53 - 124:57
    where law enforcement usually operates
    in a more productive way and better
  • 124:57 - 125:04
    than most information security folks and there
    has been a lot more work on follow the money
  • 125:04 - 125:07
    and use that angle for the
    attribution side of this.
  • 125:07 - 125:12
    I mean some of the recent things you may
    have seen from spam campaigns to phishing
  • 125:12 - 125:15
    and mal-code distribution
    and those sorts of things.
  • 125:15 - 125:20
    Some recent work actually by Steph and
    Savage and some of the folks at UCSB
  • 125:20 - 125:25
    and was particularly enlightening in that
    area for those of you that haven't seen that.
  • 125:25 - 125:28
    And I know that law enforcement is certainly
    taking note and very good at those kind
  • 125:28 - 125:37
    of things and so, I suspect that
    being aware of that and seeing more
  • 125:37 - 125:40
    on that side I would follow the
    money and work on the attribution
  • 125:40 - 125:45
    and the prosecution associated with malicious
    activity, that sort is certainly something
  • 125:45 - 125:49
    that we're going to see more of
    from a prosecution perspective.
  • 125:49 - 125:53
    >> Brian: And the FBI has had
    some big take downs recently.
  • 125:53 - 125:57
    There was one in [inaudible]
    early this year, late last year.
  • 125:57 - 125:59
    >> Last year.
  • 125:59 - 126:00
    >> Brian: Thank you.
  • 126:00 - 126:02
    I've got two questions from online,
  • 126:02 - 126:05
    I'll go to one of them first
    and then come back to the room.
  • 126:05 - 126:09
    From Vanda [phonetic] the reality
    that people don't think it will happen
  • 126:09 - 126:11
    with them is a fact here too.
  • 126:11 - 126:18
    So how can I convince people that they
    need to take preventative measures?
  • 126:18 - 126:19
  • 126:19 - 126:20
    Jillian?
  • 126:20 - 126:25
    >> Jillian: Sure, so I don't know
    what "here" means in that sentence
  • 126:25 - 126:30
    but nonetheless I would say in
    thinking about how to convince people,
  • 126:30 - 126:36
    there is a wealth of information on what sort
    of attacks occurred and who they've targeted
  • 126:36 - 126:40
    and one of the things that this
    Berkman Center study found was
  • 126:40 - 126:43
    that there's really no associated
    ideology with attacks.
  • 126:43 - 126:49
    There's one example where some
    conservative Muslim groups outside
  • 126:49 - 126:52
    of the U.S. were attacking
    U.S. Conservative website.
  • 126:52 - 126:57
    The U.S. Conservative Groups were then attacking
    these Muslim websites outside the U.S. And so on
  • 126:57 - 127:02
    and so forth and sort of in a circle
    and so, anyone can be a victim.
  • 127:02 - 127:07
    Any type of group, any type ideology and
    so I think that's where we start looking
  • 127:07 - 127:13
    at previous attacks and educating people
    about those various desperate targets,
  • 127:13 - 127:15
    that's another way that we can raise awareness.
  • 127:15 - 127:20
    And then like I said just sort of thinking
    about risk assessments not an easy thing
  • 127:20 - 127:26
    in these cases and like I said with having
    desperate ideologies be the target of attacks,
  • 127:26 - 127:31
    it's not easy to really assess what
    your actual risk is and so to assume
  • 127:31 - 127:34
    that you could potentially be a target
    of an attack is the first thing.
  • 127:34 - 127:41
    But then to sort of weigh your risk and figure
    out what you might want to think about in terms
  • 127:41 - 127:44
    of what's important to you
    and keeping your site up.
  • 127:44 - 127:46
    >> Brian: Sure, Miguel.
  • 127:46 - 127:49
    >> Miguel: Thank you Brian.
  • 127:49 - 127:55
    What the question refers to is sort of how
    to make the business case for protection
  • 127:55 - 127:58
    or mitigation against this kind of a threat.
  • 127:58 - 128:04
    Danny actually talked about some of these
    things previously in the conversation in terms
  • 128:04 - 128:08
    of really evaluating your
    infrastructure and your needs and kind
  • 128:08 - 128:13
    of asking yourself some basic questions.
  • 128:13 - 128:20
    What would it mean to you if your, let's
    say for example your website was down?
  • 128:20 - 128:24
    What are some of the things that could
    potentially happen if that was the case
  • 128:24 - 128:26
    and what would the impact to you be
  • 128:26 - 128:30
    if your infrastructure was
    down for 12 hours for example?
  • 128:30 - 128:33
    I'll use some private sector examples
    to just kind of illustrate this.
  • 128:33 - 128:37
    Maybe obviously there's potentially
    the revenue component.
  • 128:37 - 128:39
    Maybe you're making money off your website
  • 128:39 - 128:46
    so there's some tangible result
    in terms of not having revenue.
  • 128:46 - 128:51
    But from a customer service perspective for
    example, what happens if your website is
  • 128:51 - 128:53
    down for a certain amount of time?
  • 128:53 - 128:58
    Maybe your call center gets
    flooded, gets into code red.
  • 128:58 - 129:03
    People are waiting an hour-and-a-half
    to have the phone answered.
  • 129:03 - 129:07
    Maybe your email boxes start getting flooded
    and maybe it's going to take weeks potentially
  • 129:07 - 129:11
    to dig yourself out of that hole.
  • 129:11 - 129:17
    Another thing to kind of think about is,
    as you make the business case for this
  • 129:17 - 129:25
    or to have some kind of a plan to mitigate the
    attacks is how long would it actually take you
  • 129:25 - 129:30
    to get your core infrastructure or the
    infrastructure you need to be online,
  • 129:30 - 129:34
    back online if something like this happened?
  • 129:34 - 129:38
    Potentially it would take you a
    significant amount of time just to figure
  • 129:38 - 129:44
    out what's actually happening let alone figuring
    out what the path is going to be in terms
  • 129:44 - 129:47
    of what the best strategy is to deal
    with the problem when it happens.
  • 129:47 - 129:51
    And then on top of that, after that
    is once you actually know what to do,
  • 129:51 - 129:55
    actually putting the plan
    in place to do what needs
  • 129:55 - 129:57
    to be done to get the threat under control.
  • 129:57 - 130:01
    So when you start asking yourself
    some of these fundamental questions
  • 130:01 - 130:04
    and it's not just a private
    sector thing where you're worried
  • 130:04 - 130:08
    about your revenue potentially
    or your brand equity.
  • 130:08 - 130:11
    You know the public sector faces this as well
  • 130:11 - 130:14
    because it obviously, there's
    some tangible stuff.
  • 130:14 - 130:20
    It looks really bad when a government website
    is down or a free speech NGO website is down.
  • 130:20 - 130:23
    So there are fundamental questions
    that you can start asking yourself
  • 130:23 - 130:28
    and when you start asking yourself
    these question and really look
  • 130:28 - 130:31
    at what the impact is going to
    be, both short-term and long-term,
  • 130:31 - 130:34
    you really have to think about
    the long-term impact too.
  • 130:34 - 130:40
    At that point you start to look at that
    and the business case for DDoS protection
  • 130:40 - 130:45
    or for having a plan in place to deal
    with this particular issue if it happens,
  • 130:45 - 130:50
    it starts to become quite apparent that
    this something that is worth doing.
  • 130:50 - 130:54
    >> Brian: Sounds like good common
    sense, anybody else, yeah, Damian.
  • 130:54 - 131:01
    >> Damian: So I want to highlight like in
    addition to just the business financial impact,
  • 131:01 - 131:03
    there is a very strong PR impact to going down.
  • 131:03 - 131:09
    We saw user comments during the bank
    attacks, you know comments and articles
  • 131:09 - 131:13
    of our users saying things like, if
    my bank can't handle a dos attack,
  • 131:13 - 131:16
    how do I trust that they
    know how to secure my money?
  • 131:16 - 131:20
    They're completely unrelated things but
    the average person doesn't understand that
  • 131:20 - 131:24
    and so there can be a significant PR impact
    to your organization if it goes down even
  • 131:24 - 131:29
    if it doesn't directly affect
    them like with banking yes,
  • 131:29 - 131:32
    some people couldn't do online banking
    for a day, ATMs were still fine.
  • 131:32 - 131:40
    Like there was no actual real risk there but I
    also want to point out that I think the going
  • 131:40 - 131:43
    down is actually a viable option.
  • 131:43 - 131:48
    We're all talking about it as if
    the ultimate goal is to stay online,
  • 131:48 - 131:52
    but economically that might
    not make sense for you and even
  • 131:52 - 131:54
    from a PR standpoint it may not make sense.
  • 131:54 - 131:59
    If you're a human rights organization and
    you can get an article in New York Times
  • 131:59 - 132:02
    about how you went down due to a dos attack,
  • 132:02 - 132:04
    that's the best publicity
    you can possibly imagine.
  • 132:04 - 132:09
    Nobody is thinking about human
    rights until they see this article.
  • 132:09 - 132:16
    So, it's something to keep in mind, staying up
    at all costs isn't necessarily the end goal.
  • 132:16 - 132:17
    >> Brian: Yeah, Danny.
  • 132:17 - 132:21
    >> Danny: So I was going to add a little
    bit to both of what they said actually,
  • 132:21 - 132:24
    and to Vanda's question, how
    do sort of get ahead of these.
  • 132:24 - 132:27
    One of the comments that I made
    earlier is somewhere between 80%
  • 132:27 - 132:31
    and 85% of IT securities span
    goes toward regulatory compliance.
  • 132:31 - 132:36
    Things you have to do just to check boxes
    like these fire suppression systems right,
  • 132:36 - 132:42
    and this is the sort of thing where most of the
    traditional controls that are on our network,
  • 132:42 - 132:48
    the 100s and 100s that we have are about keeping
    private information private and more and more
  • 132:48 - 132:50
    so many organizations, particularly
    for internet facing services,
  • 132:50 - 132:54
    the availability of those services,
    as opposed to just the confidentiality
  • 132:54 - 132:58
    of the data contained therein
    is more and more of an issue
  • 132:58 - 133:02
    and so making sure you understand
    that, to Miguel's point.
  • 133:02 - 133:07
    Risk management 101, basic business resilience
    says take the asset, take what one minute
  • 133:07 - 133:14
    of downtime with that asset may cost you,
    talk about how long a particular outage may be
  • 133:14 - 133:17
    and then you come up with
    your single lost expectancy
  • 133:17 - 133:19
    and then take how many times this
    may occur in a year something known
  • 133:19 - 133:25
    as annualize loss expectancy and you
    multiply annualize rate of occurance
  • 133:25 - 133:27
    with single loss expectancy
    and you know in a year,
  • 133:27 - 133:30
    this much downtime could cost you
    this much in your organization.
  • 133:30 - 133:34
    And if you don't do that, and then say okay
    what are we willing to invest in proactively
  • 133:34 - 133:40
    to get residual risk to some level
    that we [inaudible] or go buy insurance
  • 133:40 - 133:42
    or ignore it and hope that it doesn't happen.
  • 133:42 - 133:44
    And so you really need to think about this.
  • 133:44 - 133:49
    Actually, I'll reference again the
    internet security lines documents.
  • 133:49 - 133:53
    It's a little hefty but it's a really great
    read for folks asking just that question.
  • 133:53 - 133:59
    It's a CFO's guide to cyber risk and it sort
    of talks about some of these sorts of things.
  • 133:59 - 134:04
    I definitely recommend that you have a
    look at that and try to get ahead of it.
  • 134:04 - 134:06
    So, I'm done now so--
  • 134:06 - 134:08
    >> Brian: Okay do we have other
    questions from inside the room?
  • 134:08 - 134:10
    Please, okay.
  • 134:10 - 134:18
    >> You were talking about the PR aspect of
    it and I took Jill's comment to heart earlier
  • 134:18 - 134:22
    about she doesn't think it's
    a good idea and we know
  • 134:22 - 134:27
    that Pirate Bay went anonymous
    [inaudible] the whole Pirate Bay came
  • 134:27 - 134:33
    out against it saying they were for free
    speech and this was against it and I wonder
  • 134:33 - 134:40
    about how much embarrassment and the moral
    argument and basically if you've got governments
  • 134:40 - 134:43
    who are doing it, can there be kind
    of treaties between governments
  • 134:43 - 134:46
    that say this is not acceptable behavior.
  • 134:46 - 134:50
    And in the activist world,
    also the same kind of thing
  • 134:50 - 134:57
    so [inaudible] technical solutions
    are where social solutions?
  • 134:57 - 135:01
    >> Jillian: Sure so I'll just give my quick
    two cents because I'm actually more curious
  • 135:01 - 135:03
    to hear others responses to this.
  • 135:03 - 135:08
    So using our example of Mordor and not getting
    into real life, let's say that the governor
  • 135:08 - 135:12
    of Mordor was partly behind
    the attacks against Genovia.
  • 135:12 - 135:17
    And so in cases like that,
    it's really difficult.
  • 135:17 - 135:21
    I'm assuming that Mordor also
    prosecutes citizens for hacking
  • 135:21 - 135:27
    and for their own DDoS perpitrations and
    so it's really difficult to look at that
  • 135:27 - 135:31
    and say that Mordor has any
    moral ground to stand
  • 135:31 - 135:34
    on when it does prosecute its own
    citizens for being behind those attacks.
  • 135:34 - 135:37
    And I think that we have seen,
    I'm sure you're aware of them,
  • 135:37 - 135:39
    real life examples where this exists.
  • 135:39 - 135:42
    Where you know governments are doing one thing
    with one hand and something with the other.
  • 135:42 - 135:50
    But to the point about [inaudible] example
    is a great one and I agreed with them
  • 135:50 - 135:53
    and I think John Perry Barlow one of the
    founders of [inaudible] said the same thing
  • 135:53 - 135:57
    that DDoS attacks are essentially
    an attack on free expression.
  • 135:57 - 136:00
    I do agree with that.
  • 136:00 - 136:05
    Like I said I think that there are some
    circumstances where it's much more difficult
  • 136:05 - 136:09
    to condemn and those are circumstances
    where you're up against a government
  • 136:09 - 136:15
    that is stifling its own citizens free
    expression and so you're getting into sort
  • 136:15 - 136:21
    of irregular warfare, online warfare in those
    cases, but generally speaking I do think
  • 136:21 - 136:26
    that it would be a lot easier if
    we all viewed this as something
  • 136:26 - 136:28
    that was not morally acceptable
    in terms of free expression.
  • 136:28 - 136:32
    It would certainly be a lot easier
    to go after the actual bad guys.
  • 136:32 - 136:34
    >> Brian: Others, Jeff?
  • 136:34 - 136:39
    >> Jeff: I would say I think that
    there are things that can be improved
  • 136:39 - 136:43
    through international cooperation,
    potentially international treaties.
  • 136:43 - 136:47
    There's a pretty healthy debate over
    whether that's even possible and enforceable
  • 136:47 - 136:51
    and I think we at least have to try.
  • 136:51 - 136:55
    Maybe some of that will filter down
    into day-to-day conduct with people,
  • 136:55 - 136:59
    but people still commit crimes all
    the time even though they're illegal
  • 136:59 - 137:05
    so I think there's a limitation to how far
    that will go to stop the groups that think
  • 137:05 - 137:08
    that they're above the law or independent of law
  • 137:08 - 137:11
    or have a separate obligation
    that's different to it.
  • 137:11 - 137:16
    But I think you will see more
    effort in the future to try
  • 137:16 - 137:23
    out some negotiated agreements remains to
    be seen if they're actually verifiable.
  • 137:23 - 137:25
    >> Brian: We have an interesting
    question from online.
  • 137:25 - 137:27
    I know we've got another
    couple from in the room.
  • 137:27 - 137:29
    This one is from Mikey.
  • 137:29 - 137:37
    What about a global simulation of cyber event
    with a goal of beginning to build a global,
  • 137:37 - 137:40
    who can I call for immediate
    help type mechanism?
  • 137:40 - 137:46
    I know that in certain countries table
    top exercises take place with a number
  • 137:46 - 137:50
    of different participants that create
    scenarios, what about this idea
  • 137:50 - 137:53
    of a global simulated cyber event?
  • 137:53 - 137:55
    Is the feasible, would that be helpful?
  • 137:55 - 137:59
  • 137:59 - 138:01
    Ram-- oh sorry, Danny.
  • 138:01 - 138:11
    >> Ram: I was just going to; I think
    it was Miguel that quoted Mike Tyson.
  • 138:11 - 138:19
    All the simulations are great but reality is
    often very different so, we'd have to think
  • 138:19 - 138:22
    about whether the simulation
    is actually helpful.
  • 138:22 - 138:25
    Certainly it helps to get people to be aware
  • 138:25 - 138:29
    of who they should be contacting
    and who to work with.
  • 138:29 - 138:34
    But the real life scenario is
    probably going to be fairly different.
  • 138:34 - 138:36
    >> Brian: Fair enough, Danny.
  • 138:36 - 138:38
    >> Danny: Yeah this is working now.
  • 138:38 - 138:43
    I would just add there are some multinational
    simulations today, everything from cyber storm
  • 138:43 - 138:47
    to you name it, lots of national
    level exercises,
  • 138:47 - 138:50
    international exercises that sort of thing.
  • 138:50 - 138:54
    I think from a global scale
    perspective, we have those every day,
  • 138:54 - 138:57
    [Laughter] so I'm not sure we actually need one.
  • 138:57 - 139:03
    Certainly we're on the receiving
    end of a lot of love and so I think
  • 139:03 - 139:17
    that exercising [audio issue] and
    understanding those sorts of things,
  • 139:17 - 139:22
    but [audio issue] final turn of attack vectors.
  • 139:22 - 139:25
    >> Brian: Okay in the room, I
    think we have at least 3 more.
  • 139:25 - 139:28
    Okay come on up to the mic-- oh
    is that one working now Joley?
  • 139:28 - 139:29
    >> Joley: No.
  • 139:29 - 139:31
    >> Brian: Okay come on up to the mic please
  • 139:31 - 139:33
    and if you'd introduce yourself
    before the question please.
  • 139:33 - 139:41
    >> My name is Anthony Bargese [phonetic] and
    I'm from John J College of Criminal Justice.
  • 139:41 - 139:48
    You guys covered some of the parties that
    DDoS and users and also the government,
  • 139:48 - 139:54
    and also the providers and how
    to be responsible and proactive.
  • 139:54 - 140:00
    But what about software vendors or some of
    the vendors that are putting their products
  • 140:00 - 140:06
    out there with all these security holes
    and that's where it starts and ends
  • 140:06 - 140:08
    with the NS providers, the ISP providers
  • 140:08 - 140:18
    who sometimes host these command
    control servers for these DDoS attack.
  • 140:18 - 140:21
    Should there be a change
    of mentality on their side?
  • 140:21 - 140:29
    I know that Google does something that's
    called bug bounties; they offer you money
  • 140:29 - 140:32
    if you find a bug on their software.
  • 140:32 - 140:39
    Should this be applied across the
    board for all the software vendors
  • 140:39 - 140:41
    and of these providers of products?
  • 140:41 - 140:43
    >> Brian: [inaudible]
  • 140:43 - 140:47
    >> Damian: I guess I have to start.
  • 140:47 - 140:57
    So we do find-- what he was referring to is
    Google has a program where we actually pay
  • 140:57 - 141:03
    for people to find bugs in our
    products so for security critical bugs.
  • 141:03 - 141:08
    So we found that there's a lot of college
    kids or independent security researchers
  • 141:08 - 141:12
    who are very interested in
    looking for security holes
  • 141:12 - 141:19
    and when they previously basically had no
    option but they could give it to us privately,
  • 141:19 - 141:24
    hope that we'd fix it or to
    whatever vendor of the software was.
  • 141:24 - 141:28
    It could be Microsoft or Adobe,
    and hope that they would fix it,
  • 141:28 - 141:34
    but then if the company could just
    take no action and they could just wait
  • 141:34 - 141:38
    and let this vulnerability remain
    and eventually this kid might say,
  • 141:38 - 141:42
    the security researcher would
    say why am I waiting on this?
  • 141:42 - 141:46
    Everyone is vulnerable to this thing
    and they would publish this exploit
  • 141:46 - 141:51
    and then you could see lots
    of attacks targeting that.
  • 141:51 - 141:58
    So what Google has done is basically start
    offering money for bugs to compensate their time
  • 141:58 - 142:04
    in finding them so, if you compromise, if
    you find a vulnerability in Google Chrome,
  • 142:04 - 142:10
    the web browser, we'll pay you for information
    on that vulnerability with the agreement
  • 142:10 - 142:13
    that you're going to keep it quiet until
    we fix it which could take a few days.
  • 142:13 - 142:22
    And that way we're able to protect everyone
    and also compensate the security researcher.
  • 142:22 - 142:25
    >> Brian: Interesting, Miguel.
  • 142:25 - 142:29
    >> Miguel: The thing that kind of complicates
    this a little bit also is that there is a lot
  • 142:29 - 142:36
    of the internet runs on open source software
    which is it gets a little bit more difficult
  • 142:36 - 142:40
    to be able to put these mechanisms in place.
  • 142:40 - 142:47
    With the recent bank attacks,
    we saw vulnerabilities exploited
  • 142:47 - 142:51
    with open source content management
    systems that are widely deployed
  • 142:51 - 142:55
    like a [inaudible] etcetera at word press.
  • 142:55 - 143:02
    These are open source software that is
    out there that is used significantly
  • 143:02 - 143:05
    and so it gets a little bit harder.
  • 143:05 - 143:11
    Unfortunately it's difficult for operators
    necessarily to control the content that is
  • 143:11 - 143:18
    on their system, especially the shared hosting
    operators etcetera and it's hard to push people
  • 143:18 - 143:24
    to update their software and as for
    software developers, as much as they'll try
  • 143:24 - 143:29
    to make things as secure as they can, there's
    always going to be some kind of a bug,
  • 143:29 - 143:37
    you can't get it all and it's the fact that
    there's so much open source software out there,
  • 143:37 - 143:41
    it's not like you can point a
    figure and you are responsible.
  • 143:41 - 143:43
    It's quite difficult to do.
  • 143:43 - 143:45
    >> Brian: Yeah, Ram.
  • 143:45 - 143:46
  • 143:46 - 143:53
    >> Ram: You know one thing that software
    manufacturers and the developers of software,
  • 143:53 - 143:59
    some of them have to start thinking about
    and changing their mindset is due to come
  • 143:59 - 144:04
    to the understanding that many of the devices
  • 144:04 - 144:09
    on which the software is running are
    always on and they're always online.
  • 144:09 - 144:15
    There's still a lot of software that
    does not incorporate automatic updating
  • 144:15 - 144:18
    and regular downloads of patches.
  • 144:18 - 144:24
    That should be the baseline, that should be
    the very fundamental thing and that's the kind
  • 144:24 - 144:29
    of thing that ought to be taught in schools
    for folks learning how to write code.
  • 144:29 - 144:35
    It's not enough to just learn to do the
    code, but to have that mechanism in there.
  • 144:35 - 144:38
    It ought to be trivial and
    it ought to become regular.
  • 144:38 - 144:45
    Unfortunately, it's more the exception than
    the norm today and I think if you'd get
  • 144:45 - 144:51
    to that point that will solve some
    part of the problem significantly.
  • 144:51 - 144:52
    >> Brian: Danny.
  • 144:52 - 144:56
    >> Danny: So yeah I think I would be
    remiss in not mentioning Versign's,
  • 144:56 - 145:00
    I Defense Vulnerability Contribution Program
    as well and we do something very similar
  • 145:00 - 145:06
    for any vulnerability that fall within a very
    broad spectrum that are multivendor and try
  • 145:06 - 145:10
    and do responsible disclosure
    associated with those.
  • 145:10 - 145:15
    To the topic in general, I think bounties are
    certainly valuable things in general for people
  • 145:15 - 145:21
    that want to apply exploits in a positive way
    and contribute in a positive way to industry.
  • 145:21 - 145:25
    I think anybody that's paying
    attention certainly realizes a lot
  • 145:25 - 145:30
    of the commercial vendors while they're
    always going to be a long way to go,
  • 145:30 - 145:34
    are leaps and bounds from where
    we were with worm able systems
  • 145:34 - 145:40
    or even patch management systems of that
    we were vulnerable of a few years ago.
  • 145:40 - 145:43
    And so I think Microsoft is an
    example, but lots of others as well,
  • 145:43 - 145:50
    and so I think we are making progress
    but, secure coding practices, application,
  • 145:50 - 145:53
    software security, those things and all
    the fundamentals are certainly thing
  • 145:53 - 145:56
    that we're going to have to
    continue to do a much better job at.
  • 145:56 - 145:59
    >> Brian: Thank you, I know we've
    got two more questions in the room.
  • 145:59 - 146:06
    Go here first and then please identify yourself.
  • 146:06 - 146:08
    >> [Inaudible] New York Technology Council.
  • 146:08 - 146:10
    I was wondering if you could
    put this perspective.
  • 146:10 - 146:17
    Are DDoS attacks the one thing we should be
    focusing, are there other like SYN floods,
  • 146:17 - 146:24
    other attacks that are similar in nature that
    there should be conferences on and keep you
  • 146:24 - 146:30
    up at night or is this where
    most of your energy goes?
  • 146:30 - 146:38
    >> Ram: Yeah this, the single biggest
    thing that keeps me up at night.
  • 146:38 - 146:48
    Lots of other things end up becoming part
    of this much larger stream and it used to be
  • 146:48 - 146:53
    that it was a dos attack and then it became a
    DDoS attack and then you had command and control
  • 146:53 - 146:59
    and then you have crowd sourced, it's evolving,
    it's not the same beast as was many years ago.
  • 146:59 - 147:04
    So the definitions from multiple
    years ago, is not what it is today.
  • 147:04 - 147:12
    What really scares me about this is the
    asymmetric nature of the ability for an attacker
  • 147:12 - 147:18
    to mount a significant attack in a very
    short amount of time and keep it sustained
  • 147:18 - 147:23
    for a long period of time and really
    drain you on the responding side
  • 147:23 - 147:28
    of your critical attention resources.
  • 147:28 - 147:33
    That really worries me and I think you
    look at SYN floods or any of those things;
  • 147:33 - 147:39
    those kind of are subsumed into
    the larger scale of this phenomenon
  • 147:39 - 147:47
    that left unchecked I think has
    a significant negative impact.
  • 147:47 - 147:48
    >> Brian: Anyone else?
  • 147:48 - 147:49
    Yes Jillian.
  • 147:49 - 147:53
    >> Jillian: Yeah just I actually
    agree with what Ram just said.
  • 147:53 - 147:58
    I would add to that to say just say,
    and if you're thinking about the scale,
  • 147:58 - 148:01
    the most recent stat that I
    have off the top of my head is
  • 148:01 - 148:08
    that in 2010 Arbor Networks was detecting
    roughly 1300 attacks per day and I guessing
  • 148:08 - 148:13
    that it's much higher than that, the real
    number and so I do think this is a big concern
  • 148:13 - 148:15
    because of the impact that it has.
  • 148:15 - 148:22
    I mean there are certainly plenty of other
    types of attacks but the sort of inability
  • 148:22 - 148:28
    to protect oneself, coupled with everything that
    Ram just said, makes this a much bigger issue
  • 148:28 - 148:33
    than some of the other things
    that we're looking at.
  • 148:33 - 148:38
    >> Danny: I was going to add that DDoS
    the two primary vectors volumetric,
  • 148:38 - 148:41
    in other words attacks are getting
    bigger, more frequent, longer duration,
  • 148:41 - 148:47
    so forth but the sophistication of those as well
    where the right query string could drive a lot
  • 148:47 - 148:50
    of backend transactions on the right
    piece of [inaudible] those sorts of things
  • 148:50 - 148:55
    from a denial service perspective
    is the availability side
  • 148:55 - 148:57
    of the information security [inaudible].
  • 148:57 - 149:03
    The other two sides are the integrity
    of the information on the infrastructure
  • 149:03 - 149:08
    and the confidentiality and
    I think certainly for anyone
  • 149:08 - 149:13
    in the information security field
    persistent attackers, advance attackers,
  • 149:13 - 149:19
    even general attackers and mobile devices
    and bring your own device and sort
  • 149:19 - 149:24
    of a squishy perimeter and soft
    under belly inside an enterprise
  • 149:24 - 149:25
    or at Starbucks or whatever.
  • 149:25 - 149:29
    All those things for information leakage
    and so forth certainly is something
  • 149:29 - 149:33
    that you should be concerned with as well
    but the availability side for a lot of folks
  • 149:33 - 149:37
    that are in the network services business is
    a very big piece of that but also the sort
  • 149:37 - 149:42
    of more concerted attackers that might want
    to control the right keyboard as opposed
  • 149:42 - 149:47
    to simply disabling is also something
    that has some pretty far reaching effects.
  • 149:47 - 149:48
    >> Brian: Damian.
  • 149:48 - 149:51
    >> Damian: So I wanted to say
    from a defender standpoint,
  • 149:51 - 149:57
    yeah DDoS is sort of the largest concern
    right now but from a global view,
  • 149:57 - 150:02
    I think dos attacks are really a symptom of a
    larger problem which is that there are a lot
  • 150:02 - 150:04
    of infected machines on the internet.
  • 150:04 - 150:09
    I think at one point I heard an ISP say is they
    estimated 10% of their customers are infected.
  • 150:09 - 150:15
    So when you take that into account, if we could
    actually stop having so many infected machines
  • 150:15 - 150:18
    on the internet or so many
    vulnerable machines at least,
  • 150:18 - 150:23
    then that would largely reduce
    the scope of these dos attacks
  • 150:23 - 150:26
    and for that we basically
    need what Ram was saying
  • 150:26 - 150:29
    of automatic updates have
    to be the normal thing.
  • 150:29 - 150:33
    You should never have any client side
    software that doesn't automatically update.
  • 150:33 - 150:34
    Brian: Thanks, Miguel.
  • 150:34 - 150:41
    Miguel: Just adding to one thing that Damian
    is saying, I absolutely agree with all of that
  • 150:41 - 150:47
    in terms of automatic updates and especially for
    end user computers which form a significant part
  • 150:47 - 150:50
    of the botnet paradigm these days.
  • 150:50 - 150:54
    When it comes to enterprises, it
    gets a little bit more difficult.
  • 150:54 - 151:06
    I think as much as I would love to say
    automatically update my production software,
  • 151:06 - 151:11
    unfortunately, especially for a large-scale
    operators, they're running infrastructure
  • 151:11 - 151:15
    that services a lot of people, you
    don't really know what's going to happen
  • 151:15 - 151:19
    when you make an update potentially and
    that has to be very carefully controlled,
  • 151:19 - 151:20
    it's got to be regression tested.
  • 151:20 - 151:27
    It's got to go through extensive QA and are we
    ever going to get to a point where it's going
  • 151:27 - 151:34
    to be easy for enterprises to be
    able to push out security fixes?
  • 151:34 - 151:40
    The idealist in me says I hope so, but I'm
    skeptical that that's going to be the case
  • 151:40 - 151:47
    because the day-to-day aspects of ensuring
    business operations, continuity and making sure
  • 151:47 - 151:52
    that assets are available are most likely for
    the foreseeable future, going to trump the need
  • 151:52 - 151:55
    to push out updates as quickly as possible.
  • 151:55 - 151:58
    Brian: Actually we do have two more questions.
  • 151:58 - 152:01
    This gentleman here first and we do
    have time for two more questions.
  • 152:01 - 152:06
    So will you come up please?
  • 152:06 - 152:07
    >> I am [inaudible].
  • 152:07 - 152:10
    I run a software company called QCD Systems.
  • 152:10 - 152:13
    So the question is actually
    very similar to the previous one
  • 152:13 - 152:15
    but I'll go a little more in detail.
  • 152:15 - 152:21
    So when it comes to security, [inaudible]
    security off of just data itself.
  • 152:21 - 152:25
    So there's an attack to intellectual
    property and then we've heard of cases
  • 152:25 - 152:28
    that intellectual property got
    stolen [inaudible] of that.
  • 152:28 - 152:32
    Movie companies always have their trailers
    leaked and pieces of movies leaked,
  • 152:32 - 152:35
    so that's one kind of attack out there.
  • 152:35 - 152:38
    Then there's other things;
    like the phishing kind of thing
  • 152:38 - 152:39
    like [inaudible] scams and all that.
  • 152:39 - 152:43
    I'm talking about things that
    effect users and companies.
  • 152:43 - 152:50
    And then there's also the risk that your
    bank account may have been compromised,
  • 152:50 - 152:53
    your passwords might have been
    stolen or is easy to guess.
  • 152:53 - 152:58
    So in the scheme of all these different things,
    where will you place the denial of service
  • 152:58 - 153:02
    for a company or for a consumer because
    they have plenty of things to deal
  • 153:02 - 153:05
    with right now when it comes to security?
  • 153:05 - 153:11
    So I was just trying to get a perspective
    on where this distributed denial service,
  • 153:11 - 153:16
    where it fits into the larger scheme of things
    and how relevant it is and the other part is
  • 153:16 - 153:19
    where do you see things going
    let's say five years from now?
  • 153:19 - 153:23
    Is this going to be the single biggest thing
    to worry about or do we have other things also
  • 153:23 - 153:26
    that we should be concerned about?
  • 153:26 - 153:27
  • 153:27 - 153:29
    >> Brian: Thanks.
  • 153:29 - 153:34
    >> Danny: I would just say that you
    know for your organization it's going
  • 153:29 - 153:29
    Danny.
  • 153:34 - 153:36
    to be specific to your organization.
  • 153:36 - 153:38
    You're going to say here's our
    risk tolerance for these things,
  • 153:38 - 153:43
    for these internet facing properties,
    this information security or data privacy
  • 153:43 - 153:47
    or data retention, or digital rights management,
    whatever it is you're concerned with.
  • 153:47 - 153:51
    I don't think that there's a one size fits
    all, I think it's all about risk management
  • 153:51 - 153:53
    for your organization because
    if you don't have a lot
  • 153:53 - 153:56
    of internet facing services,
    it may not be a problem.
  • 153:56 - 153:59
    More than likely you have some things today.
  • 153:59 - 154:01
    You wouldn't be here if you weren't
    relying on the internet in some way
  • 154:01 - 154:03
    so what does that mean to your business?
  • 154:03 - 154:07
    As opposed to some piece of information
    from either your personal bank records
  • 154:07 - 154:12
    or your corporate information being actually
    traded to the wrong person what would that mean?
  • 154:12 - 154:17
    So I think it all goes back to what are
    the critical assets your organization,
  • 154:17 - 154:21
    what enables those and how do
    you balance risk to those assets?
  • 154:21 - 154:22
    >> Brian: Yeah, Ram.
  • 154:22 - 154:29
    >> Ram: So the way I advise folks or provide
    some suggestion is, you really have to think
  • 154:29 - 154:32
    about this and look at it as a matrix.
  • 154:32 - 154:35
    You have to think about, which is
    further to what Danny is saying,
  • 154:35 - 154:41
    you have to worry about confidentiality,
    or integrity, or availability and you have
  • 154:41 - 154:45
    to figure out which of those
    matter more for you.
  • 154:45 - 154:51
    You can't have one versus the other, in many
    cases you want to have all of the above,
  • 154:51 - 154:57
    but you have to decide which of those matter
    more for you, and then devote your time,
  • 154:57 - 155:00
    effort and resources towards that.
  • 155:00 - 155:03
    But picking just one, just
    having great availability,
  • 155:03 - 155:09
    DDoS mitigation ensure availability
    but if you have a site that is running
  • 155:09 - 155:12
    on software has not been updated and is prone
  • 155:12 - 155:15
    to buffer overflow attacks then
    all the availability is going
  • 155:15 - 155:18
    to be fantastic for you to get hacked.
  • 155:18 - 155:23
    [Laughter] So you have to figure out
    where it is on the spectrum and devote it.
  • 155:23 - 155:31
    One reality is that no matter what the budget
    that is allocated, if you're a corporation,
  • 155:31 - 155:34
    if you're an entity, the
    budget that is allocated to it,
  • 155:34 - 155:40
    it seems that it remains the
    same, it suddenly doesn't reduce
  • 155:40 - 155:44
    and you simply reallocate the pie depending
  • 155:44 - 155:49
    on what you think your biggest
    vulnerability is, your biggest risk is.
  • 155:49 - 155:50
    >> Brian: Anybody else, Jeff.
  • 155:50 - 155:54
    >> Jeff: I would just say you know you asked
    about what's important to a crump company
  • 155:54 - 155:56
    or [inaudible], I mean it totally depends.
  • 155:56 - 156:01
    I think Brian talked about some guy from
    Ohio, more likely to have a problem,
  • 156:01 - 156:04
    it may be inconvenienced by DDoS because
    they can't get to whatever website,
  • 156:04 - 156:06
    but they're more likely to
    have their computer compromised
  • 156:06 - 156:08
    or identity stolen or other activity.
  • 156:08 - 156:14
    That's going to hit them deeper and for a
    longer period so it's totally situational.
  • 156:14 - 156:19
    In terms of where we going in 5 years,
  • 156:19 - 156:24
    my guess is that we'll see new
    nefarious uses for the same old tools.
  • 156:24 - 156:29
    There's some new stuff out there but
    it's a lot of variations on a theme
  • 156:29 - 156:35
    and just find a new creative bad ways
    to use them for bad purposes or profit.
  • 156:35 - 156:40
    So I think the down service attacks are here to
    stay but how they're used will probably morph
  • 156:40 - 156:45
    and change and cycle back,
    what's old is new again.
  • 156:45 - 156:46
    >> Brian: Miguel.
  • 156:46 - 156:48
    >> Miguel: The thing that troubles me a
    little bit about the future when it comes
  • 156:48 - 156:55
    to DDoS attack is that there is because
    it's been in the news a little bit more
  • 156:55 - 156:59
    because it's been publicized a little
    bit more, you look at what happened
  • 156:59 - 157:04
    on the bank attacks lately, there's kind
    of a blueprint now that is out there
  • 157:04 - 157:09
    that people can potentially follow
    to launch these large-scale attacks.
  • 157:09 - 157:14
    You've got what happened with the banks
    recently it's at least at a high level,
  • 157:14 - 157:22
    its public knowledge how it was sort of done
    from a high level, that information is out there
  • 157:22 - 157:26
    and those attacks kind of
    proved yes, it's possible.
  • 157:26 - 157:31
    They provide a blueprint for people to
    follow for doing it again and the fact
  • 157:31 - 157:35
    that that was done scares the heck out of me.
  • 157:35 - 157:38
    >> Brian: Thank you and we have one
    final question from the room, please.
  • 157:38 - 157:41
    [Pause]
  • 157:41 - 157:46
    >> Hi, it's Lucas from [inaudible].
  • 157:46 - 157:51
    Just following up similarly to the previous
    question, based on the trends that you've seen
  • 157:51 - 157:56
    to date, where do you see these attacks heading
    both from like an attacker perspective as well
  • 157:56 - 157:57
    as from a mitigation perspective?
  • 157:57 - 158:02
    Do you see one side winning
    the cat versus mouse game?
  • 158:02 - 158:03
  • 158:03 - 158:05
    >> Brian: Great question, Damian?
  • 158:05 - 158:11
    >> Damian: Yeah so attacks are basically growing
    exponentially I think if you look at most
  • 158:11 - 158:16
    of the data on this you'll see that the size
    of the attacks roughly doubles every year.
  • 158:16 - 158:22
    I have graphs that track this back
    like 8 years and it's kind of scary
  • 158:22 - 158:26
    that it's actually continuing, that exponential
    growth but I think it's important to realize
  • 158:26 - 158:31
    that that's just the internet is
    growing exponentially as the consumers,
  • 158:31 - 158:35
    as the end users, bandwidth
    increases, their home,
  • 158:35 - 158:41
    the website bandwidth is also increasing so,
    you can kind of keep up but I think that a lot
  • 158:41 - 158:47
    of what we're going to run into is a very small
    website, you know especially the types of sites
  • 158:47 - 158:51
    that Jillian is worried about are
    simply too small to possibly survive.
  • 158:51 - 158:56
    So they're going to be forced to combined
    their resources and pool with others
  • 158:56 - 159:00
    so what I expect is probably going to happen
    over the next five years is we're going
  • 159:00 - 159:05
    to start seeing organizations
    consolidate into larger and larger pools
  • 159:05 - 159:08
    until eventually we're going to have
    only like maybe five organizations
  • 159:08 - 159:12
    that offer DDoS mitigation
    in the cloud as a service.
  • 159:12 - 159:16
    It's just my guess of where the world is headed.
  • 159:16 - 159:16
    >> Brian: Ram.
  • 159:16 - 159:23
    >> Ram: And my fear is that we get at that
    point and then they get too big to fail.
  • 159:23 - 159:26
    >> Brian: Well, with that thought,
    we're going to bring this to a close.
  • 159:26 - 159:27
    [Laughter] Well done.
  • 159:27 - 159:32
    Fear and loathing in New York.
  • 159:32 - 159:37
    Public Interest Registry of the New York
    Technology Council, Internet Society
  • 159:37 - 159:39
    and the Internet Society's New York Chapter want
  • 159:39 - 159:42
    to offer our sincere thanks
    to the panelist today.
  • 159:42 - 159:45
    Thank you so much for your time, your dedication
  • 159:45 - 159:50
    to helping us understand this really critical
    issue and also to thank the audience here
  • 159:50 - 159:52
    and the audience online for following along.
  • 159:52 - 159:57
    We hope that today's event has been
    helpful and that the participants come away
  • 159:57 - 160:02
    with a greater appreciation of the scope
    of this problem, steps that should be taken
  • 160:02 - 160:08
    to mitigate DDoS attacks, and the potential
    for significant unintended consequences.
  • 160:08 - 160:11
    DDoS is a serious issue in
    today's interconnect world,
  • 160:11 - 160:15
    one that is not just going
    to fade away as we've heard.
  • 160:15 - 160:20
    Fortunately there are resources available to
    help us confront the myriad of challenges.
  • 160:20 - 160:25
    I would like to specifically thank Joley
    McFee [phonetic] from iSoc, New York,
  • 160:25 - 160:30
    Eric Grimmelman [phonetic] from New York Tech
    and Paul Brigner [phonetic] from iSoc here
  • 160:30 - 160:33
    for helping us make this happen in a real sense.
  • 160:33 - 160:40
    Along those lines, we at PIR intend to make
    the recording of this event available online
  • 160:40 - 160:45
    at our website and our social media sites
    and push that out and we're also going
  • 160:45 - 160:49
    to post additional background
    materials and encourage anyone
  • 160:49 - 160:52
    to recommend other helpful tools and information
  • 160:52 - 160:54
    like the CFF Guideline to
    keeping your site alive.
  • 160:54 - 160:57
    So again thank you to everyone
    for joining us today.
  • 160:57 - 160:59
    Thank you so much.
  • 160:59 - 161:01
    [ Applause ]
  • 161:01 -
Title:
Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape
Description:

Distributed Denial of Service (DDoS) attacks are an all-too-common reality in today's Internet landscape and are an escalating global problem. Whether a DDoS attack is motivated by criminal intent, like cyber extortion, or is executed as an extreme form of free expression, the resulting service interruptions can have wide-ranging effects. This program will address the motives behind and targets of DDoS attacks. It will also explore the various ways attacks are carried out, as well as mitigation techniques and the risks of "unintended consequences." The goal is to foster a discussion and provide a platform for developing a framework of best practices to mitigate DDoS attacks.

Presented by the Public Interest Registry (PIR), Internet Society's New York Chapter (ISOC-NY) and the New York Technology Council (NYTECH) at the AMA Executive Conference Center NYC on December 5 2012.

Wednesday December 5, 2012, 10:00 AM

MODERATOR
Brian Cute - CEO, Public Interest Registry (PIR)

SPEAKERS
Jeff Greene - Senior Policy Counsel, Symantec
Ram Mohan - EVP & Chief Technology Officer, Afilias
Damian Menscher -- Security Engineer, Google
Miguel Ramos - Senior Product Manager, Neustar
Danny McPherson - Chief Security Officer, Verisign
Jillian York - Director for International Freedom of Expression, Electronic Frontier Foundation (EFF)

http://www.pir.org/why/security/ddos

more » « less
Video Language:
English
Duration:
02:41:04

English subtitles

Incomplete

Revisions