Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape
-
0:02 - 0:05>> Brian: Welcome to the AMA
Conference Center in New York City -
0:05 - 0:09and for those following us on
line, my name is Brian Cute. -
0:09 - 0:12I am the CEO of Public Interest Registry.
-
0:12 - 0:17Public Interest Registry or PIR
is the operator of the dot org, -
0:17 - 0:19top level domain on the internet.
-
0:19 - 0:25We, along with New York Tech, a New York
City based Technology Industry Association -
0:25 - 0:28and the Internet Society, New
York Chapter want to welcome you -
0:28 - 0:35to today's event Mitigating DDoS Attacks, Best
Practices for an Evolving Threat Landscape. -
0:35 - 0:42For those of you online, today's event is
being webcast at the iSock Live Stream Channel -
0:42 - 0:44and on that channel you can also post questions.
-
0:44 - 0:50We welcome questions from our online
audience to bring into the Q&A session today. -
0:50 - 0:58You can also follow the event at
the hashtag DDoS and with that, -
0:58 - 1:01let me introduce today's
session, Mitigating DDoS Attacks, -
1:01 - 1:05Best Practices for an Evolving Threat Landscape.
-
1:05 - 1:09Distributed denial of service
attacks are deliberate attempts -
1:09 - 1:15to make internet connected machines or network
resources unavailable to their intended users -
1:15 - 1:20by temporarily or indefinitely
interrupting or suspending DNS service. -
1:20 - 1:27Unfortunately DDoS attacks are an all to-common
reality across today's internet landscape. -
1:27 - 1:31Examples abound, most recently
large-scale attacks have been directed -
1:31 - 1:36at major U.S. banks since September of 2012.
-
1:36 - 1:41Online service providers and corporations
around the world are often targeted. -
1:41 - 1:46DDoS attacks have been directed against
Government websites and it's quite possible -
1:46 - 1:50that some attacks were at
least condoned by governments. -
1:50 - 1:55Why a DDoS attack is motivated by criminal
intent, like Cyber Extortion or is executed -
1:55 - 1:58as an extreme form of free expression,
-
1:58 - 2:03the resulting service interruptions
can have wide ranging effects. -
2:03 - 2:08Today's program will explore the motives
behind and targets of DDoS attacks. -
2:08 - 2:13We will address ways attacks are carried
out, as well as mitigation techniques -
2:13 - 2:16and the importance of collaboration.
-
2:16 - 2:23We will also explore the risks of unintended
consequences related to DDoS attacks. -
2:23 - 2:26Now before I introduce our esteem panelists,
-
2:26 - 2:31I wanted to note that PIR recently
conducted a survey in the United States -
2:31 - 2:36to test the public's awareness of
DDoS attacks, this very important -
2:36 - 2:39and growing problem on the internet.
-
2:39 - 2:42Among the results, we found that 85%
-
2:42 - 2:47of the respondents did not
know what AD DDoS Attack was. -
2:47 - 2:48
-
2:48 - 2:53When asked, what would you do if you were made
aware that DDoS attacks were taking place? -
2:53 - 2:59Among the very revealing responses
were, "Call the geek squad," -
2:59 - 3:04which is a technical service organization
that comes to fix your home computer. -
3:04 - 3:10"Call my spouse, or go to Google."
-
3:10 - 3:13And while we're very happy to have a Google
Representative here on the panel today, -
3:13 - 3:19I think these answers reveal the depth
and breadth of misunderstanding and lack -
3:19 - 3:23of awareness about this very
important problem in the public. -
3:23 - 3:28So today we're going to try to begin
to chip away and provide some awareness -
3:28 - 3:30about the important problem of DDoS attacks
-
3:30 - 3:34and how we collectively can
address them effectively. -
3:34 - 3:38So with that, let me get on to the
introduction of today's panelists. -
3:38 - 3:42Today's panelists represent a
variety of organizations that operate -
3:42 - 3:45at various points in the internet ecosystem.
-
3:45 - 3:49Their wealth of experiences and
insights from industry, government, -
3:49 - 3:55and civil society perspectives should help us
better understand the challenges of DDoS attacks -
3:55 - 3:58and identify mitigation practices.
-
3:58 - 4:03First, at the far-end, we have Mr. Jeff Greene.
-
4:03 - 4:07Jeff serves as a senior policy
council at Symantec. -
4:07 - 4:12Jeff focuses on cyber security,
identity management, and privacy issues -
4:12 - 4:16and works extensively with industry
and government organizations. -
4:16 - 4:21Prior to joining Symantec, Jeff was a
senior staffer on both the U.S. Senate, -
4:21 - 4:25and House Homeland Security Committees
and before that was an Attorney -
4:25 - 4:28with the Washington D.C. law firm.
-
4:28 - 4:30Next we have Ram Mohan.
-
4:30 - 4:36Ram is the Executive Vice President and
Chief Technology Officer at Afilias Limited. -
4:36 - 4:41Ram oversees key strategic management
and technology choices for the Dublin, -
4:41 - 4:44Ireland based provider of
internet infrastructure services. -
4:44 - 4:49Ram also serves as a Director and Key Advisor
to the Internet Corporation for Assigned Names -
4:49 - 4:56and Numbers or ICANN, The Internet Society,
and the Anti-Phishing Working Group. -
4:56 - 5:01Next, we have Dr. Damian Menscher.
-
5:01 - 5:06Damian is a Security Engineer at Google
where he leads the DDoS Defense Team. -
5:06 - 5:11Damian uses his front-line experience defending
today's largest attacks to design defenses -
5:11 - 5:15that will automatically mitigate future attacks.
-
5:15 - 5:20He also reduces botnet sizes by directly
informing users of infections on their machines -
5:20 - 5:23that are targeted messaging on Google.
-
5:23 - 5:25Previously, Damian gained experience
-
5:25 - 5:31in large-scale data analysis while completing
his PhD in Computational Particle Physics. -
5:31 - 5:33I could barely say that.
-
5:33 - 5:35Next is Miguel Ramos.
-
5:35 - 5:41Miguel is Senior Product Manager at NewStar
Inc, responsible for NewStar site project, -
5:41 - 5:45a leading cloud-based DDoS Mitigation Service.
-
5:45 - 5:51Mr. Ramos has extensive experience in
product management, marketing and technology. -
5:51 - 5:55Previously Miguel was a Product Manager in
charge of hosting and email product lines -
5:55 - 6:00at Network Solutions, a leading domain
registrar and online services provider. -
6:00 - 6:05We were also to have Wout
DeNatris from the Netherlands. -
6:05 - 6:11Unfortunately Wout is here in New York but came
down with a sudden illness of food poisoning. -
6:11 - 6:13We regret deeply that he's
not here with us today. -
6:13 - 6:18He was very eager to be here with
you and we wish him a swift recovery. -
6:18 - 6:22Next on the panel is Danny McPherson.
-
6:22 - 6:26Danny is the Chief Security Officer
for Verisign, the trusted provider -
6:26 - 6:31of key internet infrastructure services
including two of the root servers, -
6:31 - 6:34and the dot com and dot net name spaces.
-
6:34 - 6:38Danny is responsible for strategic
direction, research and innovation -
6:38 - 6:40in infrastructure and information security.
-
6:40 - 6:45He currently serves on the internet
architecture board, ICANN security -
6:45 - 6:51and stability advisory council, the
FCCs communication security reliability -
6:51 - 6:55and interoperability council and
several other industry forum. -
6:55 - 6:59And finally, on the near-end,
we have Miss Jillian York. -
6:59 - 7:06Jillian is a Director for International Freedom
of Expression at Electronic Frontier Foundation -
7:06 - 7:11where she specializes in free speech issues
and the effects of corporate intermediaries -
7:11 - 7:13on freedom of expression and anonymity,
-
7:13 - 7:17as well as the disruptive power
of global, online activism. -
7:17 - 7:23Prior to joining EFF, Jillian spent 3 years at
Harvard University's Berkman Center for Internet -
7:23 - 7:29and Society, where she worked on several
projects including the open net initiative. -
7:29 - 7:32Thank you all for coming,
we appreciate your time. -
7:32 - 7:36Now the way we're going to structure
today's event and discussion is -
7:36 - 7:42that I will do a first round of introductory
remarks from each of the panelists. -
7:42 - 7:45We'll keep it brief and we're
basically going to try -
7:45 - 7:49to set the stage, the background
on DDoS attacks. -
7:49 - 7:56Now before I get there, I just want to
offer a little reaction from the common man. -
7:56 - 7:58"I've been in the industry myself for 10 years.
-
7:58 - 8:02I have a familiarity with DDoS
attacks and internet infrastructure, -
8:02 - 8:07but in approaching this event and preparing
for it, I went on line and pretended -
8:07 - 8:10to be an average guy from Columbus, Ohio.
-
8:10 - 8:16What would I find if I'm trying to educate
myself online about this serious problem? -
8:16 - 8:23And in doing that, what jumped out to me is an
issue of nomenclature, an issue of language, -
8:23 - 8:27an issue of understanding, potentially
barriers to understanding and awareness." -
8:27 - 8:33So I'm going to ask Jeff Greene to start
painting the picture of what DDoS attacks are -
8:33 - 8:36and while we have a number of
brilliant engineers on this panel, -
8:36 - 8:40let me suggest that when one goes online
as the average guy from Columbus, Ohio, -
8:40 - 8:51he runs into things such as, dos, DDoS, DRDoS,
Smurf attacks, SYN floods, ping of death, -
8:51 - 8:56attacks that are perpetrated by Trojans
and Zombies, attacks that are combated -
8:56 - 9:01through techniques like Black-holing,
sink-holing, and intrusion protection. -
9:01 - 9:06Our job today is to utilize the expertise
of these brilliant folks on our panel -
9:06 - 9:11to help translate all of these very intimidating
words around attacks on the internet -
9:11 - 9:13so that we can raise the
awareness for the public. -
9:13 - 9:17So, Jeff if you wouldn't
mind kicking this off for us. -
9:17 - 9:19>> Jeff: Sure, thanks again for
having me and thanks for including me -
9:19 - 9:22with such a great group of folks up here.
-
9:22 - 9:28I thought I'd give a little background on
what are some trends we're seeing at Symantec -
9:28 - 9:35in DDoS attacks, motivations also, and
hopefully set the table for the conversation. -
9:35 - 9:40The first thing I would start by saying is,
when you're thinking about a DDoS attack, -
9:40 - 9:44don't conceptualize it as a
single event or a siloed activity. -
9:44 - 9:49You really need to think about it as potentially
part of a larger effort directed at you -
9:49 - 9:52or directed at an entity organization.
-
9:52 - 9:55It can still be a one-off but
more often now days, it is not. -
9:55 - 10:01In terms of motives, they can run the gamut, it
can be harassment, political, it could mischief, -
10:01 - 10:06you know there's probably still some
15-year-old hackers in the basement somewhere. -
10:06 - 10:09It could be someone you know, annoyed,
-
10:09 - 10:14frustrated with a particular company
or entity and going after them. -
10:14 - 10:16It really runs anything.
-
10:16 - 10:22It could extortion, simple "pay me"
type activity, or more common now -
10:22 - 10:28or what we're seeing more of what we're calling
multi-frank attacks and transitioning to talk -
10:28 - 10:31about some of trends, we'll start there.
-
10:31 - 10:36If you folks saw, I think it was in October,
Defense Secretary Panetta was talking -
10:36 - 10:40about cyber security and one of the things
he mentioned were these frank attacks -
10:40 - 10:46and DDoS is certainly a part of them and has
become less of a blunt-force attack to more -
10:46 - 10:50of a sophisticated diversionary
attack; I should say it can be. -
10:50 - 10:59The goal, basically being drawing attention and
resources away from standard security to focus -
10:59 - 11:03on this response and leaving perhaps
yourself open to other activity. -
11:03 - 11:10One example that we talked about at a conference
earlier this year, DDoS was a big part of it -
11:10 - 11:16but the DDoS attack happened
actually at the end of the activity. -
11:16 - 11:18This particular effort was
directed to mid-sized banks. -
11:18 - 11:22It began with spear-phishing and other efforts
-
11:22 - 11:25to compromise some IT administrators
at the bank. -
11:25 - 11:31Once that is successful, the bad guys will then
spend their time figuring out what they need -
11:31 - 11:36and they want and it was at this point
that the DDoS attack was launched in one -
11:36 - 11:38of the cases that our folks talked about.
-
11:38 - 11:43It was done on a Friday afternoon when staffing
was light, nationally resources were directed -
11:43 - 11:49at responding to the denial service attack which
then left other activities perhaps unmonitored, -
11:49 - 11:52and that's when the criminal enterprise
-
11:52 - 11:57or individual actually began the more
sophisticated attack and actually traded a lot -
11:57 - 12:02of information that allowed them to
clone ATM Debit and Credit Cards. -
12:02 - 12:08There press reports about one bank having
lost 9 million dollars over the next 48 hours. -
12:08 - 12:11So again, the DDoS was a big part of it
-
12:11 - 12:16because it had really facilitated the
ability to conduct a larger crime. -
12:16 - 12:21Another trend we're seeing is
crowd sourcing of DDoS attack. -
12:21 - 12:28You may be familiar with operation payback,
which is something that Anonymous was behind. -
12:28 - 12:34Initially started as a response to some
antipiracy efforts and worked into a response -
12:34 - 12:39when the wikileaks became
very press-worthy in terms -
12:39 - 12:45of some companies responding to the wikileaks.
-
12:45 - 12:53So social networking facilitates the crowd
sourcing essentially why do you need to go build -
12:53 - 12:58up or acquire your own botnet to
engage in attack when you could get 100 -
12:58 - 13:01or 1,000 like-minded friends who
will happily do that thinking -
13:01 - 13:03that they're doing something
for the greater good. -
13:03 - 13:09And I would also suggest that the criminal
enterprises are fully aware of this -
13:09 - 13:15and why should they expose themselves or spend
their resources if they can gin up some real -
13:15 - 13:20or imagined front by a company they're
trying to penetrate and get people -
13:20 - 13:23to unwittingly support their efforts.
-
13:23 - 13:27Another trend is application layer attacks.
-
13:27 - 13:31More sophisticated, generally
you get more bang-for-your-buck, -
13:31 - 13:34you can have more impact with less resources.
-
13:34 - 13:37It takes a little more work, but it is something
-
13:37 - 13:40that you will see more of,
we suspect going forward. -
13:40 - 13:45Two more things, one insider
threat, not strictly DDoS -
13:45 - 13:46but it is certainly can be a part of it.
-
13:46 - 13:52What we're seeing generally with intrusions is
an increasing number of compromised insiders. -
13:52 - 13:55Again, often through use of social
media, social media is wonderful. -
13:55 - 13:59So it allows folks to figure
out just how to get at someone -
13:59 - 14:02and a compromising insider
facilitates the effort and again, -
14:02 - 14:05often the DDoS is part of
the culmination of it there. -
14:05 - 14:08Finally I would say it's
getting easier than ever. -
14:08 - 14:15There are attack kits, there's malware out there
that you can buy, optimized for DDoS attacks. -
14:15 - 14:17As all the attack kits out there,
-
14:17 - 14:20they're becoming much easier
for less sophisticated users. -
14:20 - 14:24You don't have to have a lot coding
expertise to get some of these up and running -
14:24 - 14:29and have yourself an ongoing
criminal enterprise. -
14:29 - 14:32So, circling back to where I began, I
would say that, you know we're here talking -
14:32 - 14:37about DDoS attacks but I think it's important
in this conversation not to put it in a box -
14:37 - 14:41and isolate it from other malicious activities
that going on and other vulnerabilities -
14:41 - 14:46and intrusions because the bad guys don't
think about it that way so we really, -
14:46 - 14:51as we're talking about responding to
it, make sure that we don't do the same. -
14:51 - 14:54>> Brian: Thank you Jeff, so in listening
I'm hearing that I have more things -
14:54 - 14:56to be concerned about, more
things to be afraid of, -
14:56 - 14:59something called spear-phishing,
I'm not sure what that is. -
14:59 - 15:06That this is a broader attack profile against
the internet that there's numerous points -
15:06 - 15:13of attack and it's part a simple attack
that is designed to provide misdirection -
15:13 - 15:15so a secondary attack can happen.
-
15:15 - 15:21So clearly, this is a troubling
landscape that I'm trying to sort through. -
15:21 - 15:27Ram, as Afilias Registry Operator on the
internet, you provide technical services -
15:27 - 15:30for dot org, on the internet
and other top-level domains. -
15:30 - 15:36From the Registry Operators perspective,
what is the scope of this problem? -
15:36 - 15:41>> Ram: Thank you Brian and
thanks for having me here. -
15:41 - 15:44I guess the very first thing is,
if you're a Registry Operator, -
15:44 - 15:49really what you're doing is
you're providing a targeted answer -
15:49 - 15:53for where the main names are on the internet.
-
15:53 - 15:58You're in a target of directory, to a large
extent and that's the biggest job that you do -
15:58 - 16:04as Registry and you get information
from people who want to buy domain names -
16:04 - 16:06or who want to get a website going.
-
16:06 - 16:09You get information from them,
store it into a large database, -
16:09 - 16:15and the biggest thing you do is propagate it
instantaneously everywhere around the world. -
16:15 - 16:21And what that means, is that your browser,
typing in redcross.org when it's sitting here -
16:21 - 16:28or on your mobile phone, typing in redcross.org
when your perhaps in another part of the world, -
16:28 - 16:34they all translate to get to the actual Red
Cross site, and that translation is done -
16:34 - 16:36by the registry, by the directory.
-
16:36 - 16:45So that makes it a really interesting place to
attack because after all if you can compromise -
16:45 - 16:50or if you can take down the
authoritative directory for every dot or, -
16:50 - 16:53the main-name in the world, there are
more than 10 million dot org domain names. -
16:53 - 16:56There are more than 10 million
dot org websites in the world. -
16:56 - 17:03If you can take down the provider who is giving
the information that says to every computer -
17:03 - 17:08in the world, hey for a given dot
org, which computer should I go to? -
17:08 - 17:09Where should I go to?
-
17:09 - 17:15If you can take them down, that's not only
a coo, but that also is a global event. -
17:15 - 17:19It gets you noticed, there are many motivations
but that's certainly one of them, right? -
17:19 - 17:26And that makes the order of registry, a
[inaudible] of what we run a regular target. -
17:26 - 17:32Up on the screen you see, this is
some data from earlier in the year, -
17:32 - 17:36gives you an idea of the scaling, the
kinds of attacks that come through. -
17:36 - 17:46So that's 2012, February and from 2012 February,
to 2012 June, this is the number of queries, -
17:46 - 17:53the number of a requests coming into the servers
that we run worldwide asking for information -
17:53 - 17:56about a daughter of domain name right.
-
17:56 - 18:03And much of this comes from DDoS so, the
foundation for DDoS is very simple, right? -
18:03 - 18:09It's a denial of service so all these computers
around the world do it, they send a request -
18:09 - 18:16in to our server saying hey, tell me where
a particular daughter of domain name is. -
18:16 - 18:21And before you even respond they're gone and
they come back again and they say tell me where. -
18:21 - 18:28And they do this hundreds of millions of times
in, it used to be a very short timeframe, -
18:28 - 18:31but as you can see here,
it's an extended timeframe. -
18:31 - 18:35Now what we saw earlier in the year
was in the space of just a few months, -
18:35 - 18:40February through to June, we had
a 3X increase, a 3 times increase -
18:40 - 18:44in the total volume coming
in in just 4 months-time. -
18:44 - 18:50But, if you look further, if you look in
the next screen, that's not the real story. -
18:50 - 18:56That 3X increase that I showed you
earlier, so that was up to 2012, -
18:56 - 19:00June but look at what happened
from there through to September. -
19:00 - 19:06That was a 9X increase in total volume
coming through to the daughter systems. -
19:06 - 19:14In total, from February through to September,
that was an 18 times increase in volume. -
19:14 - 19:18Not the data is interesting.
-
19:18 - 19:25The real life importance of this is if as a
registry provider, if you're not provisioned -
19:25 - 19:31and if you don't have the measures to boot the
[inaudible] attacks are coming and then be able -
19:31 - 19:35to take appropriate counter measures
when such attacks are coming. -
19:35 - 19:42You could just go down and going drinking
water means that every single dot org website -
19:42 - 19:47in the world, dot org email address, okay
every single thing that depends on dot org, -
19:47 - 19:55sooner or later is not accessible on the
internet and it's not happened so far, -
19:55 - 20:00but the gap between what do you
provision, and what the scale -
20:00 - 20:02of attacks, and who was attacking you.
-
20:02 - 20:06It's a continuous cat and mouse game.
-
20:06 - 20:16The other thing that I've wanted for you to
know about is the DDoS words coming from, -
20:16 - 20:26it's often coming from your PC that is just on
at home, connected to your broadband connection. -
20:26 - 20:29Just sitting there, and you
probably don't even know it. -
20:29 - 20:34If you have a good ISB, if you have a good
internet provider, they probably have ways -
20:34 - 20:38to track it and many of the internet
providers these days are putting in measures -
20:38 - 20:45to understand whether they're a DDoS
attack, so whether you're part of a botnet. -
20:45 - 20:48But when we say a zombie,
that's really what it is. -
20:48 - 20:56Your computer, your computing device somewhere
connected online, has been taken over, -
20:56 - 21:06and you don't know it but it's now part of a
global group of computers that can be harnessed -
21:06 - 21:10to attack any given target at a moment's notice.
-
21:10 - 21:16And that is pretty scary, it's a
pretty impressive feat of engineering, -
21:16 - 21:23but it's scary because pulling together
5 million of these is no big deal. -
21:23 - 21:28Pulling together 40 million of these,
takes some effort but it's doable. -
21:28 - 21:35And if you have 40 million computers
that are just sending a little ping every -
21:35 - 21:40so many milliseconds, asking for
information and then just going away, -
21:40 - 21:47that becomes a massive problem and
something that you really have to work hard -
21:47 - 21:50to mitigate before it overwhelms you
-
21:50 - 21:54because if it becomes a tsunami,
it's very hard to overcome. -
21:54 - 21:58>> Brian: Thank you Ram and thank you for
giving pictures are worth a million words -
21:58 - 22:02and giving us a sense of the scope of
the problem and also in your comments, -
22:02 - 22:07connecting this to the "why should
I care" question as an individual -
22:07 - 22:12if all the dot org sites in the world go down,
the organization who have that website up, -
22:12 - 22:16whether they're an NGO or not-for-profit
trying to do good in their mission -
22:16 - 22:20or whether it's an individual
or a company in a dot com, -
22:20 - 22:23having their commercial activities
interrupted, that's a very serious impact. -
22:23 - 22:28So as we move through the discussion,
connecting the dots to "why should I care", -
22:28 - 22:31the individual at home, and
also the interesting thing is -
22:31 - 22:37that I might be an unwitting participant in
an attack, my machine on my desk at home, -
22:37 - 22:39and be completely unaware of this.
-
22:39 - 22:42I think we're starting to get to
those issues of "why I should care". -
22:42 - 22:48So next, let's get to I think,
it's Dr. Damian Menscher. -
22:48 - 22:53So we've heard from a Registry Operator
now from an online service provider, -
22:53 - 22:57in this case Google, the leading search engine.
-
22:57 - 23:03Damian with Google's breadth and depth of
technology and reach, this certainly can't be -
23:03 - 23:06that big of a concern for a
company the size of Google, right? -
23:06 - 23:09Tell me why I'm wrong.
-
23:09 - 23:15>> Damian: Right because we have a team
of people that worries about this stuff. -
23:15 - 23:19So, most people don't realize that
Google is actually regularly attacked. -
23:19 - 23:24The reasons you'd sort of wonder why
would anyone have anything against Google? -
23:24 - 23:27Well it turns out we actually
host a lot of user content, -
23:27 - 23:31so blogspy includes random user
content from people all over the world. -
23:31 - 23:34Sometimes that's controversial.
-
23:34 - 23:38Similarly u-Tube might have
a controversial video on it -
23:38 - 23:43and so frequently these sorts
of sites do get attacked. -
23:43 - 23:49And it's not just DNSs as previously mentioned,
it's you know, we see application layer attacks -
23:49 - 23:54where they'll dispatch the same homepage
over and over again at very high rates, -
23:54 - 23:59you know upwards of maybe
a million times a second. -
23:59 - 24:03So, you've also probably noticed that we're
never actually down so, if you want to talk -
24:03 - 24:06about how we do that, if
you go to the first slide. -
24:06 - 24:13So we benefit a lot from economy of scale
when you look at most small websites, -
24:13 - 24:16there might be a thousand
websites hosted on a single machine -
24:16 - 24:19because they don't get very much traffic.
-
24:19 - 24:22We sort of turned that around and we might
have a thousand machines hosting one website. -
24:22 - 24:28You know Google.com is a big website,
it doesn't fit on a single machine. -
24:28 - 24:32So we do benefit a lot from the economy of scale
-
24:32 - 24:36and pooling our defense resources
across our various properties. -
24:36 - 24:41But, go to the next slide, you have
to be a little bit careful about this -
24:41 - 24:44if you put everything together,
you also have some risk. -
24:44 - 24:52So, I wanted to talk briefly about how
we deal with this and this also is, -
24:52 - 24:56as Jeff had mentioned, we have to be careful
-
24:56 - 24:59that we don't distract our security
team when there is a dos attack. -
24:59 - 25:03If we have one team that
focuses on all of security, -
25:03 - 25:06then when there's a dos attack we might
be looking at that and miss other things. -
25:06 - 25:14So, what we do actually is, go
on, we have layered defenses. -
25:14 - 25:18So we have a separate team that
focuses on dos attacks so that -
25:18 - 25:21when there's an attack we don't
lose sight of the other attacks -
25:21 - 25:24that are happening against us every day.
-
25:24 - 25:32And, basically we focus on having layered
defenses so; this is a very rough sketch -
25:32 - 25:33of what our network might look like.
-
25:33 - 25:37We don't see the internet
necessarily as a single cloud. -
25:37 - 25:43We see it as multiple clouds because we
peer directly with several major ISPs. -
25:43 - 25:48We go through a layer of
load balancing at our network -
25:48 - 25:54so if any particular network device gets
overloaded, we can work around that. -
25:54 - 26:01Then we go through a layer of load balancing
within our own network to eventually get -
26:01 - 26:05to the backend that are the
webservers, serving the actual content. -
26:05 - 26:08And so by doing this, we're
able to shift traffic -
26:08 - 26:13around to avoid any damage
from the attack traffic. -
26:13 - 26:17We also have many layers of which we
can filter out the bad traffic so, -
26:17 - 26:22at the very edge of our network we might be able
to filter out some of the more obvious attacks, -
26:22 - 26:30but as you get deeper in or more sophisticated
attacks, we filter them at other places. -
26:30 - 26:37Another thing I want to mention though is, this
style works really well for a very large company -
26:37 - 26:42like Google, but most of you are probably more
interested in how to defend the small site -
26:42 - 26:51and the best advice I have there is that
the user comment of going to Google, -
26:51 - 26:54might actually make sense if
they host their site on Google, -
26:54 - 26:56they automatically benefit from our defenses.
-
26:56 - 26:58They won't even know they're being attacked.
-
26:58 - 27:04And we frequently do see cases of
organizations that are under a heavy, dos attack -
27:04 - 27:09and they just quickly setup a site on
blogger saying, "Hey, we're being attacked. -
27:09 - 27:12We're going to use this for
our communication for now." -
27:12 - 27:17That's actually, at one point, the
country of Georgia had their ministry -
27:17 - 27:23of foreign affairs host their site on blogger
which was entertaining for me to say, like oh, -
27:23 - 27:28what are we going to see as a result of this?
-
27:28 - 27:33But the other thing is just making sure that
you are pooling your resources with others -
27:33 - 27:40in your organization, there are other cloud
based dos mitigation providers that sort -
27:40 - 27:47of aggregate resources from several different
clients and can provide good defenses for you. -
27:47 - 27:50>> Brian: Thank you Damian, and love ice.
-
27:50 - 27:52It's terrific.
-
27:52 - 27:55>> Damian: Also our PR people would
want me to say it's not as weak -
27:55 - 27:59as eggs, you know like fortified eggs.
-
27:59 - 28:00>> Brian: Boiled eggs.
-
28:00 - 28:02[Laughter] No terrific, thank you.
-
28:02 - 28:04>> Damian: Each layer is very strong.
-
28:04 - 28:08>> Brian: Thank you and you know,
fully appreciating your remarks too, -
28:08 - 28:15one thing that jumped out to me is that I
think one of the challenges we all share -
28:15 - 28:19in this space is that from the user perspective,
and I'm going to try to keep bringing us back -
28:19 - 28:25to the user and the average person at home,
is that this problem, there's a low level -
28:25 - 28:30of awareness and one of the reasons is
because as very responsible service providers -
28:30 - 28:35like Google and the other's on this panel,
you've taken on the challenge and objective -
28:35 - 28:38of staying up and not being
taken down by DDoS attack. -
28:38 - 28:44You've been successful to date and as
such, users who have their sites on Google, -
28:44 - 28:49the DNS is sometimes thought of like
electricity, you know it's just there. -
28:49 - 28:52It's my website is up, the internet is up.
-
28:52 - 28:55I only notice it when it goes down.
-
28:55 - 28:59I only become aware there's a
problem when there's a problem. -
28:59 - 29:03So interesting thought, let's
keep coming back to that -
29:03 - 29:05"why should the individual,
why should the user care?" -
29:05 - 29:08How do we get this on their
radar screen in a meaningful way -
29:08 - 29:10so they can become part of the solution?
-
29:10 - 29:14So with that thought let's go to Miguel.
-
29:14 - 29:20And Miguel we're going to ask you to
focus on specifically corporate responses -
29:20 - 29:25from the perspective of a third-party
mitigation service provider. -
29:25 - 29:26>> Miguel: Sure and thank you Brian.
-
29:26 - 29:33I'm going to dovetail on some of
the things that Damian was saying. -
29:33 - 29:38A lot of organizations and a lot of
people don't understand or know about DDoS -
29:38 - 29:42and don't see an issue until
it actually happens to them. -
29:42 - 29:46And at that point, a lot of
organizations are kind of scrambling, -
29:46 - 29:51trying to figure out what it is that they
can potentially do to deal with this issue. -
29:51 - 29:57And they most likely go to Google to try
to determine and try to find an answer. -
29:57 - 30:03So, a lot of people don't think about
this because they assume that their ISP -
30:03 - 30:07or their hoster is actually going to
take care of the problem for them. -
30:07 - 30:13Actually, what tends to happen is that when
an organization is under heavy DDoS attack, -
30:13 - 30:17the ISP and the hoster is looking
at protecting their own assets -
30:17 - 30:21and will most likely just shut you down.
-
30:21 - 30:24And so they might contact you and
tell you you're under a DDoS attack -
30:24 - 30:27but they may not help you through it.
-
30:27 - 30:33So, there are some things that organizations
can do to help mitigate this risk. -
30:33 - 30:37Some organizations look at dealing
with the DDoS problem themselves. -
30:37 - 30:39They'll look at buying their own hardware;
-
30:39 - 30:42they'll look at provisioning
bandwidth, etcetera. -
30:42 - 30:47Unfortunately a lot of organizations don't
have the resources to be able to do that. -
30:47 - 30:51And it doesn't necessarily make sense for
a lot of organizations because it's sort -
30:51 - 30:56of an arms-race and it's hard to spend
your way out of dealing with this problem -
30:56 - 31:01as attacks larger and larger and
more complicated and etcetera. -
31:01 - 31:09So, there some third-party options that
organizations can look at that I would kind -
31:09 - 31:15of consider to be the infrastructure as a
service that can be used on an on-demand basis -
31:15 - 31:19to help organizations deal with
DDoS attack when they happen. -
31:19 - 31:26So the idea is simply, you don't necessarily
have to over-provision all hardware, -
31:26 - 31:29bandwidth, etcetera to deal with the risk.
-
31:29 - 31:36You can potentially use the third-party that has
that capacity and capability when you need it. -
31:36 - 31:42And you know at that point you're looking at
options like content distribution networks, -
31:42 - 31:47they can potentially help deal with
absorbing some of this traffic and keeping -
31:47 - 31:49that traffic away from your network.
-
31:49 - 31:55There's also cloud-based providers that
specifically focus on the DDoS problem -
31:55 - 31:59and the idea there is if you're under an attack,
-
31:59 - 32:03your organization can potentially redirect
the traffic over to a cloud-based provider -
32:03 - 32:08that can absorb the traffic that
knows how to mitigate and deal -
32:08 - 32:12with [inaudible] service attacks and then
sends you basically the clean traffic. -
32:12 - 32:19It's sort of kind of putting a shield in front
of your infrastructure on a non-demand basis -
32:19 - 32:21when you're dealing with these attacks.
-
32:21 - 32:28So, infrastructure as a service is something
that is more affordable for organizations -
32:28 - 32:32and something that organizations are
starting to look at more and more -
32:32 - 32:35as a way to deal with this DDoS issue.
-
32:35 - 32:38And certainly, there's a lot
of information about that -
32:38 - 32:42on Google and it's key to become informed.
-
32:42 - 32:46>> Brian: Thanks Miguel, so we're beginning to
get a clear picture of the scope of the problem -
32:46 - 32:52from a number of different perspectives and in
addition to service providers such as Google -
32:52 - 32:58and Afilias, Verisign and NewStar maintaining
their services in a way that keeps them -
32:58 - 33:01up 24/7 and addresses these attacks.
-
33:01 - 33:06There are 4 certain organizations
specific resources available if needed -
33:06 - 33:11and that's interesting as we're
beginning to, after setting the scene, -
33:11 - 33:16now let's transition towards those solutions
as mitigation efforts, the services that are -
33:16 - 33:20out there to design specifically
to provide additional protection. -
33:20 - 33:28As we transition, Danny I want you to help the
audience understand some domestic initiatives -
33:28 - 33:32such as the anti-botnet work
undertaken by CSIRC and help us to begin -
33:32 - 33:38to understand how we can begin to collectively
come together to address this problem. -
33:38 - 33:39>> Danny: Yes sir thanks Brian.
-
33:39 - 33:43So there have been a large number
of clamber of efforts between public -
33:43 - 33:50and private sector related to botnet infections,
compromised machines, male code proliferation, -
33:50 - 33:55virulence of threats on the internet, just
this broad swath of malicious activity. -
33:55 - 34:01It's a nontrivial problem to solve because the
ISPs for example, a lot of folks point fingers -
34:01 - 34:05at the ISPs, but the ISPs don't [inaudible]
systems, their [inaudible] system in particular, -
34:05 - 34:10the broadband ISP user residential
consumers that acquire service from the ISP, -
34:10 - 34:14and the ISP shouldn't be looking
at their traffic and you know -
34:14 - 34:17and they have privacy concerns or other things.
-
34:17 - 34:21So, what sort of controls the capabilities
of the ISPs actually add to help them. -
34:21 - 34:24So a number of efforts have
been underway actually. -
34:24 - 34:27One such example is the FCC sizerk3,
-
34:27 - 34:31working group 7 recently published
something called the ABC for ISPs -
34:31 - 34:36and it's basically the anti-botnet code and
they develop with a number of other folks -
34:36 - 34:42in the industry monolog messaging and ANIB's
working group as well as some publication -
34:42 - 34:48in the IETF and broader participation,
actually internationally from folks from Japan, -
34:48 - 34:53Cyber Clean to Australia, Finland,
Germany, other folks and it basically talks -
34:53 - 34:58about some fundamental things that ISPs
can do to help educate, protect, notify, -
34:58 - 35:02detect malicious threats associated with their
consumers and then activity they might take -
35:02 - 35:04to help to clean that problem or sanitize
-
35:04 - 35:07or provide a little better
hygiene on their infrastructure. -
35:07 - 35:12So, one pointer there is one of the
reports, the ABCs again, for ISPs, -
35:12 - 35:20you can find it on the [inaudible] website
or the FCC sizerk3, working group 7 webpage -
35:20 - 35:25that you can find easily via Google
and so that's certainly one effort. -
35:25 - 35:27One of the fundamental things,
going back to the user, -
35:27 - 35:30is there anyone on the receiving
end of a DDoS attack? -
35:30 - 35:33What you should definitely be looking at
is sort of what enables your business? -
35:33 - 35:37Most of the folks on this panel, you
know network is our business all right, -
35:37 - 35:39we're going to focus on providing
network services and availability. -
35:39 - 35:44We're absolutely committed to the security and
stability of our infrastructure and services, -
35:44 - 35:47but a lot of folks, network
enables their business. -
35:47 - 35:52It enables your email or your web
presents or your small business -
35:52 - 35:54or your e-commerce or retail site.
-
35:54 - 35:59And so irrespective of what
it is, you absolutely need -
35:59 - 36:03to consider what the critical network assets
are or the critical assets across the board -
36:03 - 36:11to your organization and you identify those, you
say what's the impact of an availability issue -
36:11 - 36:16or security issue or a compromise of
information impacting those assets? -
36:16 - 36:21And how might I put controls in place to
help mitigate that or to at least have a plan -
36:21 - 36:26to respond if there's a DDoS attack or a breach
inside my infrastructure, those sorts of things. -
36:26 - 36:31You know one of the things that I've seen in
the past, we did this survey for several years, -
36:31 - 36:35a previous employer of mine, and
most of the folks that responded -
36:35 - 36:39to this infrastructure security survey didn't
actually even have an incident response team -
36:39 - 36:42in place in their organization
even if it's an over-lay team, -
36:42 - 36:44much less an incident response plan.
-
36:44 - 36:47And if you don't have an incident response plan,
you're certainly not going to exercise that -
36:47 - 36:51and so you really don't want to be on the
receiving end of something like a DDoS attack -
36:51 - 36:56and not have a book in someone's hand that
says this is the phone number I call for my ISP -
36:56 - 37:01or for my national curator for my vendor that
provides a certain service or capability to me, -
37:01 - 37:05so I think it sort of starts with those
fundamentals, identifying critical assets, -
37:05 - 37:09understanding what the options are to
protect the things that are critical to you. -
37:09 - 37:13If it's moving services to cloud infrastructure,
acquiring protection services for those, -
37:13 - 37:16putting your own controls in
place, but you definitely need -
37:16 - 37:18to consider that in your environment.
-
37:18 - 37:19Consider what the impact would be.
-
37:19 - 37:23These are a real risk to your
business and your operations and so, -
37:23 - 37:27I think fundamentally that's sort of
where I would recommend you start, Brian. -
37:27 - 37:32>> Brian: Thanks Danny, so interesting
in your comments, you mentioned ISPs, -
37:32 - 37:37we've got registry operators, you've got online
service providers, we've got search engines, -
37:37 - 37:43so we really have a number of different
service providers in this community -
37:43 - 37:45that helps keep the internet
up in a collaborative way. -
37:45 - 37:52The siezerk effort for ISPs in particular
sounds interesting and what we want to get -
37:52 - 37:56at a little bit later in the conversation is
a cross this community of service providers -
37:56 - 38:00who I assume have different roles and maybe
different responsibilities in some ways, -
38:00 - 38:05how do we build on the collaboration that you've
begun to speak about and also interestingly, -
38:05 - 38:09you spoke to the organization and
what they should have in place. -
38:09 - 38:14Understanding what enables your business, having
a plan in place, and the question that raises -
38:14 - 38:18for me is, well how do organizations
know they should have these things -
38:18 - 38:20and how do we educate on that front as well?
-
38:20 - 38:27So we'll get to that in a little bit, but
to round out the panel, thank you all so far -
38:27 - 38:31for shedding some light on the scope and
dimensions of the problem and how we can begin -
38:31 - 38:36to address it, but let me now go to Jillian.
-
38:36 - 38:42Jillian, what I'd like you to talk about
from your perspective is what are some -
38:42 - 38:47of the unintended consequences related
to DDoS attacks and in particular, -
38:47 - 38:51help us start thinking about potential
over-reactions to DDoS attacks. -
38:51 - 38:57We know that these attacks are of furious
in nature, we know that we have a panelist -
38:57 - 39:02of good guys who are doing what they can
and doing everything we think they should, -
39:02 - 39:06but tell us about the unintended consequences
both from the malicious attack side -
39:06 - 39:12and when a well-intended operator tries to
take mitigation techniques against an attack. -
39:12 - 39:20>> Jillian: Sure, so at the beginning of this
I think Jeff referred to, actually I'm sorry, -
39:20 - 39:23Brian referred to sometimes
these attacks being used as sort -
39:23 - 39:25of an extreme form of free expression.
-
39:25 - 39:27I'm not sure I would classify
it as free expression, -
39:27 - 39:32but we could say civil disobedience that's
been argued by many and an example of this -
39:32 - 39:36that might resonate a little bit better than
say the anonymous attacks against Master Card -
39:36 - 39:41and Visa, would be sympathetic
people to the Syrian opposition going -
39:41 - 39:43after Syrian Government websites.
-
39:43 - 39:45That's something that a lot of
people have sympathized with, -
39:45 - 39:50have considered civil disobedience in a
scenario where the government has shut -
39:50 - 39:52down the internet sensor,
the internet, etcetera. -
39:52 - 40:00And so nevertheless the vast majority of
these attacks are malicious, are directed at, -
40:00 - 40:03not just these big companies and the
big networks, but also at the little guy -
40:03 - 40:06and that's kind of where my
perspective is coming from. -
40:06 - 40:11A few years ago when I was still at the Berkman
Center, we did a study that looked attacks -
40:11 - 40:17on human rights websites and independent
media website, and 62% of the respondents -
40:17 - 40:23to that study said that they had experienced a
DDoS attack at some point and as Damian said, -
40:23 - 40:26Google is sort of at what would
you say, the core of the network. -
40:26 - 40:30Google has resources, they
have staff, they own fiber, -
40:30 - 40:36but then you've got these
other small organizations -
40:36 - 40:38that are what we would say is
at the edge of the network. -
40:38 - 40:42These are organizations that not only are
they literally at the edge of the network -
40:42 - 40:46but they also lack the funding and
the staff to ward-off an attack. -
40:46 - 40:52They often have fairly insecure hosting,
their host might jack-up the cost in an effort -
40:52 - 40:58to help them and so if you are using say,
I don't want to throw any specific examples -
40:58 - 41:02out there although I have a couple, but if
you're using say a shared hosting provider -
41:02 - 41:08such as Rackspace or Bluehost, I'm not
speaking of those companies specifically but, -
41:08 - 41:12if you're using one of those, and
you are the victim of an attack, -
41:12 - 41:17your provider could kick you off, they
could also raise your costs which for many -
41:17 - 41:19of us would be completely unaffordable.
-
41:19 - 41:23And so, when we're looking at the
unintended consequences of these, -
41:23 - 41:26I mean I think that there's a
couple of different aspects here. -
41:26 - 41:31One is the legal consequences and so
I'm not a lawyer and so I should say -
41:31 - 41:37that I should just preface by saying that,
but you know these attacks are largely -
41:37 - 41:41by most governments at this point considered
hacking and are dealt with as such. -
41:41 - 41:45And so in the U.S. that's governed
by the Computer Fraud and Abuse Act -
41:45 - 41:51and in Europe there are other similar
conventions, but I think that we need -
41:51 - 41:55to start looking at them as a
little bit different, than that. -
41:55 - 41:58I think that you need to look at the sort
of the [inaudible] behind the attack, -
41:58 - 42:04we need to look at the consequences of
the attack, and I think a great example -
42:04 - 42:09of this is an attack that was conducted against
Lufthansa, the German airline back in gosh, -
42:09 - 42:16I'm not going to remember the year, early 2000
I believe where a court actually did determine -
42:16 - 42:22that the intent of that attack
was not coercion and was there-- -
42:22 - 42:28I'm not a lawyer so I feel like
I'm using the wrong language here, -
42:28 - 42:32but it was dealt with as
civil disobedience and so. -
42:32 - 42:34But that's actually not my biggest concern.
-
42:34 - 42:39My biggest concern is the unintended
consequences on these smaller websites -
42:39 - 42:43and so when we look at the
consequences on independent human rights -
42:43 - 42:49and independent media websites, generally
these sites go off line and are not able -
42:49 - 42:53to quickly get back up and so we've
seen attacks that last a week, 6 weeks, -
42:53 - 42:55or where the site goes down entirely.
-
42:55 - 42:58And so some of the suggestions that
have already been given are excellent -
42:58 - 43:02and I think actually what Damian said in
terms of people moving their sites to Google, -
43:02 - 43:06that's actually one of the suggestions that
we give is, if you are a small website, -
43:06 - 43:10sometimes you're just better off hosting
your site on a provider like Google -
43:10 - 43:14where you have those resources to back you up.
-
43:14 - 43:17We've also, my organization along
-
43:17 - 43:21with the tactical technology collective has
also developed this guide which is really, -
43:21 - 43:23really basic mitigation techniques.
-
43:23 - 43:26We're not even talking about the kinds
of things that a corporate website -
43:26 - 43:32or even a large-scale organization would
use, but the things that your blogger, -
43:32 - 43:35your independent media site might utilize.
-
43:35 - 43:39And this is available, I'll share it after,
but it's also available in 9 languages. -
43:39 - 43:46And so just to sum up, I would say that
we need to think about these attacks, -
43:46 - 43:52not just how they affect major websites, but
also how they affect much smaller organizations. -
43:52 - 43:53>> Brian: Thank you.
-
43:53 - 43:54So thank you all.
-
43:54 - 43:58We've now set the scene, I hope, and provide
some baseline understanding of the nature -
43:58 - 44:00of the attacks, the scope of the attacks.
-
44:00 - 44:01We have 2 hours.
-
44:01 - 44:08What we're going to do is as follows, we're
going to leave 30 minutes at the end for Q&A -
44:08 - 44:11from the folks in the room and from online and
we're looking forward to all of your questions. -
44:11 - 44:14We're going to have basically 2 sessions now.
-
44:14 - 44:20What I'm going to do now is engage in some Q&A
with the panelists and we'll have 45 minutes -
44:20 - 44:26for that and then we have in the second session
a scenario that we've built that we want -
44:26 - 44:29to rollout in front of our
panelist and ask how they, -
44:29 - 44:33in their respective rolls would
react to that particular scenario. -
44:33 - 44:38Now I've got about 7 questions or so, we've
got 45 minutes so this isn't rapid-fire -
44:38 - 44:43but let's leave about 5 or 6 minutes for
a response to each of these questions. -
44:43 - 44:48This is open to anyone on the panel so let's
be dynamic, raise your hand, don't be shy -
44:48 - 44:53and we'll kick it off with the first question
which is; let's get specific and both -
44:53 - 44:56from your perspective and
from a user's perspective. -
44:56 - 45:00What mitigation techniques
are available to us today? -
45:00 - 45:05Both you, as a service provider and the user,
how do we stop these things at a basic level? -
45:05 - 45:07Who would like to take that on first?
-
45:07 - 45:09Ram.
-
45:09 - 45:16>> Ram: Brian this is Ram, let me start; if
I was a user, one of the things that I'd want -
45:16 - 45:29to do is if I have a good ISP, then they
probably have a botnet mitigation kit -
45:29 - 45:35or something like that, that gets installed
in my computing devices and if not, -
45:35 - 45:43I would go to my ISP and ask them
for a mitigation kit like that. -
45:43 - 45:45There pretty commonly available.
-
45:45 - 45:50They're pretty sophisticated and they
give you the first order of protection. -
45:50 - 45:57I just also want to point out; having antivirus
software in your computer doesn't protect you -
45:57 - 46:03from your computer getting
compromised in a DDoS attack. -
46:03 - 46:03>> Brian: That's interesting.
-
46:03 - 46:06Most average users would assume
that that addresses that problem. -
46:06 - 46:09Tell us why.
-
46:09 - 46:12>> Ram: So earlier, let me give you
an example, earlier we were hearing -
46:12 - 46:16about spear-phishing right, so
I give you a specific example, -
46:16 - 46:20something that actually happened in
one the organizations I work with. -
46:20 - 46:29A high-level executive in this company,
it's a pretty small company, got an email -
46:29 - 46:35and the email had a very good subject line,
you know it's a photograph of their daughter. -
46:35 - 46:41And it said, took this photograph,
she looks great -
46:41 - 46:44and even had the daughter's name on it, right?
-
46:44 - 46:49And so the executive got the mail, it
looked like a legitimate thing and the, -
46:49 - 46:55from address in the email was kind
of somebody he ran into in random, -
46:55 - 46:59but there was enough things in the mail
that looked like it was real, you know. -
46:59 - 47:04It was the daughter's name was right, there was
actually a photograph and so they double-clicked -
47:04 - 47:10and they opened up the photograph and
that compromised their machine and ended -
47:10 - 47:13up compromising the network
from there on, right? -
47:13 - 47:18Now that was not a virus in the
traditional sense of a virus. -
47:18 - 47:23That was something that was custom
crafted just for that one individual -
47:23 - 47:30because the person trying to brake-in
had a clear idea who this person was, -
47:30 - 47:35they were trying to penetrate, they
understood that that person likely had access -
47:35 - 47:41to other important resources inside of the
company's corporate network, got through. -
47:41 - 47:48So, they had antivirus on their computer,
but this was not the traditional virus, -
47:48 - 47:54this was an attack just aimed
at you, individually. -
47:54 - 47:58>> Brian: Thank you and getting back to the
botnet protection package from your ISP, -
47:58 - 48:01at a basic level what does that provide?
-
48:01 - 48:06We heard the story of how your own computer
can become an unwitting zombie participating -
48:06 - 48:11in a botnet attack, is it designed to
present that from happening, or other things? -
48:11 - 48:16That was a follow-up for Ram.
-
48:16 - 48:19>> Ram: Oh, for me specifically.
-
48:19 - 48:26Okay, yeah there are many things that this piece
of software or these pieces of software do, -
48:26 - 48:32but often they look at patterns, they look
at where the attacks may be coming from. -
48:32 - 48:38They also look at what's happening on your
own device and where it's trying to connect to -
48:38 - 48:41and typically you've got certain patterns.
-
48:41 - 48:47You go to a certain set of sites or you send
emails, you know you connect to a known set -
48:47 - 48:55of places for the most part and if your device
has been compromised, often your device is going -
48:55 - 48:59to places that you normally don't go to
-
48:59 - 49:04and your ISP typically has an
idea of that stored up over time. -
49:04 - 49:05>> Brian: Thank you.
-
49:05 - 49:08So let's dig a little bit deeper on that.
-
49:08 - 49:14What was in your answer was, how do we
identify where this problem is coming from? -
49:14 - 49:19I think it's an important piece of the puzzle
here and you and your service provider capacity, -
49:19 - 49:23let's turn deeper on preventative measures.
-
49:23 - 49:27How can we identify where these
malicious attacks are coming from? -
49:27 - 49:30Is that an easy thing to solve
for, or a harder thing to solve -
49:30 - 49:33for from the service provider
perspective and also from the user? -
49:33 - 49:35I think Ram just started to touch on that.
-
49:35 - 49:37Anybody want to take that on?
-
49:37 - 49:40So, Danny?
-
49:40 - 49:44>> Danny: Yeah this is Danny, I'll say
something about that and then move on to others, -
49:44 - 49:49but one of the things I think I would touch on
initially is that if you're on the receiving end -
49:49 - 49:52of even a moderate sized DDoS attack,
-
49:52 - 49:56a lot of some of the bigger networks
have the capacity to absorb the attack. -
49:56 - 50:00What many ISPs or services in the
infrastructure offer is the capability -
50:00 - 50:05to absorb the large-scale bits of
malicious traffic and surgically mitigate -
50:05 - 50:07and preserve the availability of the services
-
50:07 - 50:10that someone may be concerned
with, so that's sort of one aspect. -
50:10 - 50:16From an ISP side, one of the
interesting things is that IP is a sort -
50:16 - 50:23of hop-by-hap packet forwarding paradigm
for communications networks and anyone, -
50:23 - 50:29largely anyone on the internet can emit a packet
in the infrastructure that has a source address -
50:29 - 50:34of anyone else on that infrastructure and so
this is known as IP source address booping. -
50:34 - 50:38And it's a common attack factor, it's
not the only attack factor and a lot -
50:38 - 50:41of times spotted hosts don't
spoof packets at all, -
50:41 - 50:45but trace back in large networks
is fairly complex. -
50:45 - 50:49There are a lot of techniques people use
from some things like commercial tools -
50:49 - 50:53that do net-flow and flow-based analysis to
trace back to the ingress of their network. -
50:53 - 50:57The problem is you then have to have
the capability to say, the upstream -
50:57 - 51:00or the adjacent network that
attack flows I'm seeing from you. -
51:00 - 51:01Can you trace these back on your network?
-
51:01 - 51:04Hope that they have the same
capability and so forth. -
51:04 - 51:08And so it's non-trivial when the
fact that any sort of advisory -
51:08 - 51:13on the internet has global projection capability
and you could be on the receiving end of a lot -
51:13 - 51:16of packet lull as a result of
that, right, you know what I mean, -
51:16 - 51:19and these could be broadly
distributed or single-source attacks. -
51:19 - 51:23So, tracing these attacks back is one aspect.
-
51:23 - 51:28So you would certainly want to trace back
flow-based tools other things and then ideally -
51:28 - 51:31if you could find sources that were
participating in an attack, then you could try -
51:31 - 51:35and identify command and control
infrastructure that's used a command -
51:35 - 51:41or took control those attack sources or those
botnet hosts and then you would step back -
51:41 - 51:46from there, but that's an extremely complex
thing and unfortunately what most people do, -
51:46 - 51:50and to Jillian's point actually, is that a
lot of the controls some people put in place -
51:50 - 51:54through data mitigate DDoS attacks is actually
to effectively complete those attacks. -
51:54 - 51:59It's like hey, there's a large-scale attack
of 10 gigabytes per second going toward one -
51:59 - 52:07of the smaller hosts on my network so, what
an ISP may do is actually say I'm going -
52:07 - 52:10to drop all the traffic towards that
destination at the ingress of my network. -
52:10 - 52:13So they do is effectively complete the attack.
-
52:13 - 52:16That's why it's so important to have
controls in place to be able to identify -
52:16 - 52:20and surgically mitigate those attacks,
before the attacks occur, so anyway. -
52:20 - 52:21>> Brian: Thank you, very interesting.
-
52:21 - 52:23Anybody else want to pick-up on this point?
-
52:23 - 52:24Miguel.
-
52:24 - 52:30>> Miguel: Just adding to what Danny is
saying, collaboration to try to figure -
52:30 - 52:34out what the attacks those sources
are is key and it's not something -
52:34 - 52:37that happens very well currently.
-
52:37 - 52:42It's something that the internet community is
trying to improve on but we're nowhere near -
52:42 - 52:48where we need to be and to be able to do some
of the things that Danny is referring to, -
52:48 - 52:52you kind of have to have backchannel
communications between providers. -
52:52 - 52:56You have to be able to have
somebody on the inside, -
52:56 - 53:01somewhere that you can share intelligence
with and that's something that's difficult. -
53:01 - 53:07The last thing I'll say about
it is that sometimes, -
53:07 - 53:16where are who it is that's doing it is not
necessarily that important potentially. -
53:16 - 53:20When these things are happening,
a lot of people might be focused -
53:20 - 53:25on getting their infrastructure back online,
but you do have to temper that with the fact -
53:25 - 53:30that as Jeff was alluding to
earlier, this might be something -
53:30 - 53:34that an organization is doing
while they're doing something else. -
53:34 - 53:36It could very well be a diversionary tactic.
-
53:36 - 53:41>> Brian: Let me pick-up on one point there
Miguel, you know you mentioned the collaboration -
53:41 - 53:45between and across network
operators being a challenge. -
53:45 - 53:49Is that a resource challenge, it
is a communications challenge, -
53:49 - 53:54is it a technical sophistication challenge,
because it is understood from Danny's comment -
53:54 - 53:57that this is complex investigation
that has to cross a number -
53:57 - 54:00of different network operators
to get to the answer. -
54:00 - 54:02What's the issue there?
-
54:02 - 54:10>> Miguel: I would say that there's a
corporate privacy challenge that a lot -
54:10 - 54:18of organizations don't really want their
technical staff or the staff that are dealing -
54:18 - 54:23with this problem to be collaborating with other
operators and that's a significant roadblock. -
54:23 - 54:24>> Brian: Thank you.
-
54:24 - 54:26Jillian-- oh go ahead Damian?
-
54:26 - 54:29>> Damian: I also wanted to say that I
think that the 3 things that you mentioned, -
54:29 - 54:32Brian it being resources and technical issues
-
54:32 - 54:38and communication are also significant
challenges even if you do get -
54:38 - 54:42through the communication barrier
to talking to somebody at the ISP, -
54:42 - 54:46they might not have the technical
capability to track it further back -
54:46 - 54:50or they might not have the resources to spend
time on spending an hour to track it back. -
54:50 - 54:56Just knowing that it will just go to yet
another ISP that won't have time to communicate -
54:56 - 54:59with you or track it back or anything.
-
54:59 - 55:00>> Brian: Right, thank you.
-
55:00 - 55:00Jillian.
-
55:00 - 55:03>> Jillian: Sure, I'm just
going to make my point again -
55:03 - 55:05to the sort of smaller organizations.
-
55:05 - 55:09I think that it's important for them to sort of
assess beforehand, before this is even an issue, -
55:09 - 55:12both what their risk is, if they can do that,
-
55:12 - 55:16as well as what their priorities
are in the event of a DDoS attack. -
55:16 - 55:20And so, for a lot of these organizations
that I'm thinking of, I'm thinking of sort -
55:20 - 55:23of the human right sites in embattled countries.
-
55:23 - 55:28A lot of times there priority is just to stay
up and to keep their content on the internet -
55:28 - 55:32in the event of an attack and sometimes these
attacks are coming during say, election periods, -
55:32 - 55:38or periods of protest and so a lot of times
what that means is choosing their host wisely, -
55:38 - 55:43so we talked about that a little bit but knowing
what their host can do to mitigate an attack, -
55:43 - 55:47but also if they're high-risk,
considering a DDoS Resistant Hosting -
55:47 - 55:49or some programs that are starting to come up.
-
55:49 - 55:53Some of these are pretty cost prohibitive for
smaller organizations but, there are a couple -
55:53 - 55:56that are a little bit more affordable.
-
55:56 - 55:57One of them is called Virtual Road.
-
55:57 - 56:02It's hosted by the international--
I forget the acronym-- IMS-- -
56:02 - 56:04forget that but based in Denmark.
-
56:04 - 56:08Another thing is to, you know really
easy stuff, keep backups of your site. -
56:08 - 56:11I know that seems so simple,
but that's something that a lot -
56:11 - 56:15of these sites are not thinking of and so when
there site goes down, it goes down forever. -
56:15 - 56:17And then another thing is
just mirroring their site. -
56:17 - 56:21If we're talking about a site that's
say in Iran that's going to come -
56:21 - 56:26under attack during elections or something like
that, you know making sure that that content is -
56:26 - 56:28up somewhere else can be really important.
-
56:28 - 56:32You know URLs don't matter as much as
they used to, thanks to social media. -
56:32 - 56:36And so just making sure that that content
is still up and available is a lot -
56:36 - 56:41of times more important than actually
immediately mitigating the attack. -
56:41 - 56:42>> Brian: Jeff?
-
56:42 - 56:46>> Jeff: Real briefly, I would say in
particular, if you have limited resources, -
56:46 - 56:49figure out what your purpose
in tracking back is. -
56:49 - 56:53If there's a technical side of it and as smarter
folks up here may appear to have explained it. -
56:53 - 56:58It's very difficult to get to the end but
let's say you get through all those hurdles -
56:58 - 57:03and you find out where it's actually coming
from, then you walk into a human problem. -
57:03 - 57:04Do you really care what the motivation is?
-
57:04 - 57:10I mean, if your goal is to stay up, you may
only want to track back far enough to be able -
57:10 - 57:15to protect yourself and even if you get to the
end, you know it's a bunch of computers sitting -
57:15 - 57:21in country x, you'd have to get to those
people to figure out is it a nation state act, -
57:21 - 57:24is it a bunch of individuals,
is it somehow loosely connected? -
57:24 - 57:29So the track back, you know I would say
just from my perspective thinking about this -
57:29 - 57:32when I was up on the hill, there is a techno
side, but there's very much the political -
57:32 - 57:36and security side and you get into human
litigations there which are even harder -
57:36 - 57:41to track back than some of the techno stuff.
-
57:41 - 57:42>> Brian: Thank you Jeff.
-
57:42 - 57:45Let me ask a slightly different question.
-
57:45 - 57:51When an attack is happening, does it matter what
the targeted platform is from your perspective -
57:51 - 57:53and how you react to it, how do you manage it?
-
57:53 - 57:58For example if it's an attack against the banks
as we've been seeing recently, versus an attack, -
57:58 - 58:02versus a social media site or a small-user site.
-
58:02 - 58:07Does the nature of the target affect
the way you address the problem, -
58:07 - 58:08try to mitigate the problem?
-
58:08 - 58:12Can you give us some dimension on that front?
-
58:12 - 58:13
-
58:13 - 58:16Miguel, do you want to go first?
-
58:16 - 58:17>> Danny: Yeah, sure.
-
58:17 - 58:20Yeah so what I would say is that if
you're trying to mitigate an attack, -
58:20 - 58:23what you're really trying to
do is preserve the availability -
58:23 - 58:24of the services that you care about.
-
58:24 - 58:29And so you've really got to flip and say you
know, I really want to scrub out the bad stuff -
58:29 - 58:30and try and be able to absorb this attack.
-
58:30 - 58:34One of the interesting things, when you see
numbers thrown around on scale, frequency, -
58:34 - 58:39duration, attack factors, all those things,
you might see 10 gigabyte per second attack. -
58:39 - 58:45Well what 10 gigabytes per second attack is on a
webserver or on a DNS server is very different. -
58:45 - 58:49That means 10 gigabytes per second
of transaction servicing capacity. -
58:49 - 58:54Right, that's basically I've got to be able to
process 10 gigabytes per second of DNS packets -
58:54 - 58:59or of web-service packets or SSL packets or
whatever the service is you're concerned with -
58:59 - 59:02and that's the only way you can
preserve the availability of that. -
59:02 - 59:05So when it gets more and more complex,
is when you have more stay-based -
59:05 - 59:08and more complex applications
-
59:08 - 59:13that more sophisticated attacks
become problematic in that manner. -
59:13 - 59:18So I think it absolutely
depends on the attack factor. -
59:18 - 59:22One of the challenges is that sort of
commodity, off the shelf routers and firewalls -
59:22 - 59:25and those things don't do
application [inaudible] mitigation. -
59:25 - 59:27They don't provide certain capabilities.
-
59:27 - 59:30On the other hand, if it's
some services it may be simpler -
59:30 - 59:34to simply absorb a high-rate per second attack
-
59:34 - 59:38or to just drop bad traffic that's
not target a production service. -
59:38 - 59:42So, yeah in short the answer is
yes to your question, I think. -
59:42 - 59:44>> Brian: Thank you, Miguel.
-
59:44 - 59:47>> Miguel: Danny mentioned
that the type of infrastructure -
59:47 - 59:50that is being attacked matters,
I absolutely agree. -
59:50 - 59:55The type of organization that is being
attacked also plays a factor potentially -
59:55 - 60:00and how you're dealing with the
problem of mitigating the attack. -
60:00 - 60:04I think Jeff alluded to the fact
earlier that there are attacks -
60:04 - 60:06that are potentially, for example extortion.
-
60:06 - 60:11There's activist-type attacks;
I'll use the activists' example. -
60:11 - 60:15These people that are protesting
and attacking your site, -
60:15 - 60:21they're most likely discussing it online, so
they're congregating on twitter, on Facebook, -
60:21 - 60:25Payspin, whatever site it is that
they're using to IRC relay chip, -
60:25 - 60:31you know internet relay chat rooms,
they're discussing attack strategies there. -
60:31 - 60:36So, what kind of an attack it is, and
which organization is being attacked, -
60:36 - 60:42it does matter because you do want to factor
in how your monitoring social media based -
60:42 - 60:48on the particular attack because it can
help you determine what it is that you need -
60:48 - 60:51to do and what you need to focus on.
-
60:51 - 60:52
-
60:52 - 60:54>> Brian: Anyone else?
-
60:54 - 60:55
-
60:55 - 60:58Let me shift gears here.
-
60:58 - 61:03I think by now, hopefully we've got a
fairly good picture of the dimensions -
61:03 - 61:06of DDoS attacks both from website operator,
-
61:06 - 61:10individual user, service
provider, civil society. -
61:10 - 61:13It's an important problem.
-
61:13 - 61:16It's a growing problem, there's
no doubt about that. -
61:16 - 61:19It gets bigger each year,
it's a big cat and mouse came, -
61:19 - 61:23we have a hard time identifying
the bad guys, tracking them down, -
61:23 - 61:25stopping them from doing what they're doing.
-
61:25 - 61:27Who should fix this problem?
-
61:27 - 61:29
-
61:29 - 61:35Private sector, government,
how do we fix this problem? -
61:35 - 61:39Collaboration is important, we've heard
that but it seems like it's a game -
61:39 - 61:41that we're not necessarily winning.
-
61:41 - 61:43Anyone want to take that on?
-
61:43 - 61:45Pros and cons, Damian?
-
61:45 - 61:46
-
61:46 - 61:48>> Damian: I'll start off the discussion.
-
61:48 - 61:55So I think a lot of the difficulty we have
is that nobody feels actually responsible -
61:55 - 62:01so the attacks are often being
sourced from compromised machines -
62:01 - 62:04and people are saying well it's not
my fault, my machine is compromised. -
62:04 - 62:09You know they don't know it, it's an
end user, they don't actually know how -
62:09 - 62:12to secure their machine, they're not even aware
-
62:12 - 62:16that there machine is participating
in the attack. -
62:16 - 62:19Then it goes from that machine
through an ISP and the ISP says well, -
62:19 - 62:24we're just providing network
transit to our customers. -
62:24 - 62:26We don't actually look at what that content is.
-
62:26 - 62:32And then it might go through multiple
ISPs and eventually get to the victim -
62:32 - 62:37who really doesn't have any choice
but to just receive this traffic. -
62:37 - 62:43So I think the root issue here is to figure
out who you would actually hold responsible -
62:43 - 62:48for these attacks and then maybe figure out
in what way they would be held responsible. -
62:48 - 62:52You know clearly, we don't want
to hold the home user responsible -
62:52 - 62:58for an attack they weren't aware that they were
committing, however, if we could inform them -
62:58 - 63:02and they refuse to fix their machine,
maybe after they've had that opportunity -
63:02 - 63:06to fix their machine and they refuse to,
or after we inform a hosting provider -
63:06 - 63:10that has compromised webservers
that are attacking you. -
63:10 - 63:13If they don't fix those machines after
a month and they're still attacking, -
63:13 - 63:16maybe there should be some responsibility there.
-
63:16 - 63:20>> Brian: So that's an interesting thought
Damian because you all do have terms of service -
63:20 - 63:24and abuse policies that users agree
to when they use your service, -
63:24 - 63:25so that's an interesting thought.
-
63:25 - 63:30Jeff, I want to throw this to you and I
know this is part of your past experience, -
63:30 - 63:34but having been in the Senate and House
Committee, can you bring a little bit -
63:34 - 63:37of the government perspective
to the question I asked -
63:37 - 63:40of who should be fixing this problem and how?
-
63:40 - 63:41>> Jeff: So I guess I would step back
-
63:41 - 63:47and say that we can't define
this problem as just dos attacks. -
63:47 - 63:50You know you phrase it as, it's
not a game of winning, well, -
63:50 - 63:53in my mind it's not a game that will ever end.
-
63:53 - 63:58To the extent it's more of a constant
race, how far ahead or behind are we -
63:58 - 64:02of the people developing new ways to attack?
-
64:02 - 64:08And to my first point about, it's a
broader problem, if someone has a computer -
64:08 - 64:12that is being used as part of a botnet
for a DDoS attack or something else, -
64:12 - 64:17it's very likely that the folks who are on
that computer could do a lot of other things -
64:17 - 64:21with that computer or to that person's
identity or steel their banking credentials, -
64:21 - 64:26so it is a much broader problem and I think
Damian made a good point is everyone kind -
64:26 - 64:29of pushes it back but at
some level it needs to start -
64:29 - 64:34with users taking more control
over their computers. -
64:34 - 64:37Not just looking at antivirus
but broader protections. -
64:37 - 64:42The government's role from my perspective
and that's something that we worked -
64:42 - 64:47on the projects I worked on the hill are
much more critical infrastructure focused, -
64:47 - 64:51but if it's true there, I think it's even
more true with a much more commercial side. -
64:51 - 64:56It's got to be private sector laden and
the government can play a role facilitating -
64:56 - 65:02and educating and punishing and perhaps in some
areas where there is significant possibility -
65:02 - 65:06of major national impact requiring
some standards, you're not going to do -
65:06 - 65:11that for John Smith who has his
computer at home, you're not going to say -
65:11 - 65:15that there is a minimum security
[inaudible] that you have to have -
65:15 - 65:17in order to log into the internet.
-
65:17 - 65:19Were you even to try that, it would never pass.
-
65:19 - 65:24But the government can play a
significant role educating folks; -
65:24 - 65:29simple things as patching whatever software
applications you have, making it the easiest way -
65:29 - 65:30for someone to get into your computer.
-
65:30 - 65:33The patch comes out, someone is out there
trying to figure out what was patched -
65:33 - 65:36and how can we take advantage
of the people who don't patch. -
65:36 - 65:41So the government, I think the role, sort
of hopefully I'm answering the question. -
65:41 - 65:43The role the government is going to play is
going to depend on what you're talking about. -
65:43 - 65:46If it's an attack on water, electrical,
other systems the government is going -
65:46 - 65:49to have a very active role,
hopefully ahead of time, protecting -
65:49 - 65:51and assisting in developing protections.
-
65:51 - 65:55The government will also have a role in
the backend where possible prosecuting, -
65:55 - 65:57investigating and that's
where your earlier question -
65:57 - 66:00about does it matter who is being attacked?
-
66:00 - 66:04Maybe it shouldn't, but the government is going
to be much more focused when you have a series -
66:04 - 66:08of major banks attacked, looking whether
there's another type of attack going on -
66:08 - 66:11or there are more laws that
apply [inaudible] after that. -
66:11 - 66:18Then if it is, you're attacking someone's speech
on block spy, so the government's role is going -
66:18 - 66:23to vary, I think depending upon where you are
but ultimately it can't be government lead -
66:23 - 66:28because it will end up being less
effective and more [inaudible], in my view. -
66:28 - 66:29>> Brian: Thank you.
-
66:29 - 66:37Let me ask for the service providers, you all
run services that are globally accessible. -
66:37 - 66:43You all have network footprints
that are global to some extent. -
66:43 - 66:48Specifically, engaging with law
enforcement which I'm sure you do, -
66:48 - 66:53you all work for law abiding companies who
under the proper circumstances collaborate -
66:53 - 66:57with law enforcement to address
legitimate concerns. -
66:57 - 67:02What are you seeing in your
interactions with law enforcement -
67:02 - 67:05that provides the good seeds for collaboration?
-
67:05 - 67:09What do you think might be missing in
your interactions with law enforcement? -
67:09 - 67:13I'd like the service providers
to address that point. -
67:13 - 67:18Who wants to go first, Ram?
-
67:18 - 67:19>> Ram: Let me start.
-
67:19 - 67:24One of the things that is striking
in interactions with law enforcement, -
67:24 - 67:30one of the fundamentals here is that
this is essential a borderless problem -
67:30 - 67:34and law enforcement has a broader problem.
-
67:34 - 67:34>> Brian: Okay.
-
67:34 - 67:38>> Ram: Not a problem, they have to work
-
67:38 - 67:41within the jurisdictions of
the borders that they're in. -
67:41 - 67:46So often when you're collaborating
and working on uncovering, -
67:46 - 67:52you know somebody is running a botnet that's
got some significant problems behind it -
67:52 - 67:56and if you start to do trace-backs,
you'll find that the folks -
67:56 - 68:02in law enforcement would rather work
with you informally than formally -
68:02 - 68:10because if they go formal, then you go
through a method where you then have -
68:10 - 68:17to involve every law enforcement agency at
every boarder that is crossed on the internet. -
68:17 - 68:20It's pretty damn easy to cross those boarders.
-
68:20 - 68:27So, that's a, I think that's an
essential thing and the real-world hasn't -
68:27 - 68:31yet caught-up to that reality online.
-
68:31 - 68:39That attacks come from multiple boarders,
from across multiple boarders and the morph -
68:39 - 68:50in real-time, depending what the response looks
like, and so that's a very significant factor -
68:50 - 68:58when we work for instance on, a year and a
half ago, we worked on pulling together part -
68:58 - 69:06of an industry or in a taskforce on child abuse
set of sites that were focused on child abuse -
69:06 - 69:17and they were using that to infect the
computers of those who had the bad stuff on it -
69:17 - 69:19to make them part of a zombie network.
-
69:19 - 69:28And it got very snarled up in various
jurisdictions legal restrictions, -
69:28 - 69:34the necessity to preserve evidence,
versus the imperative to solve the problem -
69:34 - 69:37and make sure it doesn't become very large.
-
69:37 - 69:38>> Brian: Interesting.
-
69:38 - 69:42Anyone else, Danny?
-
69:42 - 69:44>> Danny: Yeah so I'll point out
again, some of the work that you know -
69:44 - 69:48with public/private sector
partnerships, I think that's so important. -
69:48 - 69:51Certainly I don't think you're going to
regulate your way out of this, right? -
69:51 - 69:58From a controls perspective there are 869
things that I have to do in my day job just -
69:58 - 70:01to check boxes and those give me
marginally more secure, right, -
70:01 - 70:0682% of IT security span goes towards
compliance and regulatory controls -
70:06 - 70:08and then people try and get
secure on top of that. -
70:08 - 70:13Those sorts of things are like antivirus
software and there's 10 new pieces -
70:13 - 70:17of male-code a second on the
internet, yet AV is a frontline defense -
70:17 - 70:23to protect the residential user or maybe even
a corporate machine, and so I think education -
70:23 - 70:28of the threat vector, some of the very
fundamental stuff like patching systems -
70:28 - 70:33and software and collaboration and information
sharing and putting these things in place. -
70:33 - 70:36From a law enforcement perspective,
I think that some -
70:36 - 70:40of the most successful stuff we've seen
involves multilateral teaming agreements -
70:40 - 70:44and collaboration, those sorts of
things where there is some coordination -
70:44 - 70:47and some effort in trying to work together.
-
70:47 - 70:51In general though, in particular with
DDoS attack we've always seen this sort -
70:51 - 70:56of fragmented response where one ISP on
the receiving end, or along the projectory -
70:56 - 71:00of an attack will drop all the traffic
towards the destination and cause, -
71:00 - 71:02you know effectively completing
the attack for that network, -
71:02 - 71:08and another one will security research will
infiltrate the command [inaudible] structure -
71:08 - 71:12and law enforcement may be there and then
someone will break one of their connections -
71:12 - 71:16to the C&C infrastructure and all of a
sudden, you can't even disable the attack -
71:16 - 71:20because you've got all these headless machines
out there that are attacking something -
71:20 - 71:23and depending on where those systems
reside and where they're coming from. -
71:23 - 71:28I mean we've seen attacks with
attack sources in 100s of countries -
71:28 - 71:30and you're breaking lots of laws.
-
71:30 - 71:36I mean just if you were to try and disable
an attack if you had the keys to the command -
71:36 - 71:39and control infrastructure, that sort of thing.
-
71:39 - 71:43So it's really problematic and there needs
to be a lot of collaboration and cooperation -
71:43 - 71:47and I don't think regulations a way,
but I do think harmonizing and working -
71:47 - 71:52on the international aspects and the information
sharing and collaboration, you know those sort -
71:52 - 71:56of things are the only way we're going
to be in a better spot collectively. -
71:56 - 72:00We're playing a lot of wackemall
today and I'm not sure it's effective. -
72:00 - 72:05>> Brian: Jillian, let me ask you, from your
perspective, from a civil society perspective, -
72:05 - 72:11what more should industry and government
in their roles, be doing to address this? -
72:11 - 72:16And what in their collaboration
would you hope that they avoid? -
72:16 - 72:20>> Jillian: So in terms of what more,
I mean I think it's hard for me to say. -
72:20 - 72:24I mean I think one of the problems
here is that as others have mentioned, -
72:24 - 72:30law enforcement is going after the folks
who are going after the big targets. -
72:30 - 72:34And I understand that, but it's not really
ever going to help these smaller targets. -
72:34 - 72:38I mean you don't see law enforcement going after
the perpetrators of small attacks and a lot -
72:38 - 72:41of the attacks that I'm looking at
are happening in other countries -
72:41 - 72:44where sometimes the perpetrators
are in other countries -
72:44 - 72:49and so from my perspective I'm not
thinking so much about U.S. law enforcement, -
72:49 - 72:53but in terms of what people can be doing
more about and what they should avoid. -
72:53 - 73:01I think that a lot of it is about raising
awareness as folks at the other end -
73:01 - 73:05of the table said in the beginning,
I think that making people aware, -
73:05 - 73:09not only of what might be going on in their
own systems that they can avoid becoming part -
73:09 - 73:17of a botnet, but also what they can be
doing as individuals and as organizations -
73:17 - 73:21to mitigate the potential of DDoS attacks.
-
73:21 - 73:24And then as far as industry,
I think adding that layer -
73:24 - 73:26of civil society is really important as well.
-
73:26 - 73:32Making sure that industry is collaborating
with civil society to make more -
73:32 - 73:37of these systems available to
the smaller user would be great. -
73:37 - 73:42And as far as what law enforcement
should avoid, I think a lot of it -
73:42 - 73:47for me is addressing whether DDoS attack
are a useful form of civil disobedience. -
73:47 - 73:51I think it kind of comes down to that and my
personal opinion, this is really not the view -
73:51 - 73:53of my organization which does
not have a stated view on this, -
73:53 - 73:59but it's just that I don't think it's a
particularly useful form of civil disobedience. -
73:59 - 74:04I think that in the United States we have
many other paths of recourse to protest -
74:04 - 74:07and then I think that when you look
at the example like I gave before, -
74:07 - 74:11attacks against Syrian government
websites, it's a bit of a different thing. -
74:11 - 74:19But nonetheless, I think that the effect of
these attacks on smaller websites is so great -
74:19 - 74:22that we should really sort of
try to look at the whole picture -
74:22 - 74:25and realize how much damage this is doing.
-
74:25 - 74:29And so I guess in thinking about that, I
think that that should also sort of inform -
74:29 - 74:31where we think about law enforcement.
-
74:31 - 74:32>> Brian: Thank you.
-
74:32 - 74:32Danny [inaudible]?
-
74:32 - 74:35>> Danny: Yeah I just wanted to make
one other comment, something she touched -
74:35 - 74:39on which I think is really actually
is, one of the things we see a lot -
74:39 - 74:42of is the internet itself
is inherently multi-tenant. -
74:42 - 74:47And then you see a lot of, in particular
a lot of the smaller folks can aggregate -
74:47 - 74:50and there's these really high tenant
densities on certain pieces of infrastructure -
74:50 - 74:55and what ends up happening is that someone
on the infrastructure gets attacked -
74:55 - 74:58and there's a lot of collateral
damage that everybody is impacted. -
74:58 - 75:01Or a really large attack along
a trajectory fills some links -
75:01 - 75:06and not only is the intended target impacted
but there's collateral damage to other people -
75:06 - 75:07that utilize that infrastructure.
-
75:07 - 75:15And most of the attacks that the folks have been
on the receiving end of seeing is that it's hard -
75:15 - 75:20for an attacker to gage how much firepower they
actually have and to surgically attack a target -
75:20 - 75:26with a DDoS attack on the internet, usually they
sort brute-force flood a whole bunch of traffic -
75:26 - 75:29of a particular type and there
is collateral damage in that. -
75:29 - 75:32And that's an important artifact
that you're highlighting there -
75:32 - 75:36and if you have high-tenant
densities on cloud infrastructure -
75:36 - 75:43or lots of people behind small links then
it does have a really devastating impact -
75:43 - 75:46and not just on the target, but maybe on
other people that utilize that infrastructure. -
75:46 - 75:49And so I think that's important highlight.
-
75:49 - 75:50>> Brian: Thank you.
-
75:50 - 75:51Damian?
-
75:51 - 75:55>> Damian: Yeah just to follow-up
on that, Jillian had mentioned -
75:55 - 75:59that law enforcement doesn't go
after the very small attacks. -
75:59 - 76:00They tend to focus on the large attacks.
-
76:00 - 76:04But I do see the large attacks
as the most damaging, -
76:04 - 76:09largely because of what Danny said
of, it causes collateral damage. -
76:09 - 76:12If there's collateral damage on other sites
that they have no other way to mitigate, -
76:12 - 76:15they will kill the small
victim, they'll completely attack -
76:15 - 76:17by just turning off everything to that site.
-
76:17 - 76:23So by basically preventing any very large
attacks by having law enforcement focus -
76:23 - 76:28on those we at least give the smaller sites a
change of getting some dos mitigation service -
76:28 - 76:35to help them and basically that
boundary is probably around 10 gigabyte. -
76:35 - 76:41You know once you get up over 100 gig, there's
very few organizations that are going to be able -
76:41 - 76:45to help and most are just
going to turn off the site. -
76:45 - 76:49>> Brian: So right now on this issue,
it's the rule of the submarine captain -
76:49 - 76:54that is the compartment flooding, and their
sailors in there shut it off to save the rest. -
76:54 - 76:55And that's where we are.
-
76:55 - 76:59So, this is interesting and I think
we've all been very polite so far, -
76:59 - 77:03so allow me to play devil's advocate and put
your feet to the fire a little bit folks. -
77:03 - 77:09So what I'm hearing at a high level to pull some
threads together, is there is some coordination -
77:09 - 77:14across law enforcement which is key
to this solution in collaboration, -
77:14 - 77:17but it's not nearly what it needs to be.
-
77:17 - 77:21It itself is a barrier to our
ability, at least in the industry, -
77:21 - 77:24to work on these problems with law enforcement.
-
77:24 - 77:28We're hearing that there is some collaboration
across network operators but not as good -
77:28 - 77:32as it needs to be all the
way up and down the stream. -
77:32 - 77:40And some lack of sense of responsibility
coloring that part of the puzzle. -
77:40 - 77:46We all in this industry trumpet the fact that
the internet is critical global infrastructure. -
77:46 - 77:51We all in this industry trumpet the
fact that the infrastructure of nations -
77:51 - 77:58of countries have come to rely on the
internet, banking systems, electric grids soon, -
77:58 - 78:04governments have a clear interest in this
critical infrastructure and if I listen to all -
78:04 - 78:07of this and piece together,
I could come at this from, -
78:07 - 78:11this is a fiddling while Rome burns
dynamic going on between industry -
78:11 - 78:14and governments and civil society.
-
78:14 - 78:20So, putting your feet back to the fire, what
needs to happen in terms of collaboration, -
78:20 - 78:27in concrete terms to break through at the
industry level, at the government level -
78:27 - 78:31and across those levels and with
the civil society perspective. -
78:31 - 78:32Let's get to it.
-
78:32 - 78:37Who wants to take it on?
-
78:37 - 78:38Pause.
-
78:38 - 78:39>> Ram: Sure I'll jump on the grenade.
-
78:39 - 78:47Look I think everyone who is here and everyone
who is up here is not part of the problem. -
78:47 - 78:51When you take it to the global
level of the impact on society -
78:51 - 78:56and the fiddling while Rome burns and the
implication that there's an existential or close -
78:56 - 79:03to a threat to us, everyone up here and I
assume because you're here, you all get it. -
79:03 - 79:08The problem we have are the sectors
that you mentioned that use technology -
79:08 - 79:15but are not technology sectors and going back
to my government experiences, often, not always -
79:15 - 79:23but often, the difficulty in those sectors to
get nontechnical executives to spend the money -
79:23 - 79:26or the time to put in place the protections.
-
79:26 - 79:33You know Danny, I thought talked earlier
about the need of a mitigation plan in place. -
79:33 - 79:36If you're under a major denial service
attack and you're then figuring oh, -
79:36 - 79:38how do I deal with a denial service attack?
-
79:38 - 79:45You're toast, you need to have things in place
ahead of time and that's where going back -
79:45 - 79:49to the question about where the government
can play a role, my personal view -
79:49 - 79:52and what we were trying to do on
the hill was create an environment -
79:52 - 79:58where the truly critical
infrastructure systems are required -
79:58 - 80:00to meet some base-level of security.
-
80:00 - 80:04Not a technology specific but more
if you're talking about computers -
80:04 - 80:07that control big machines,
water pumps, electric grids, -
80:07 - 80:09those shouldn't be connected to the internet.
-
80:09 - 80:11A lot of them are.
-
80:11 - 80:17Some of them are connected with open connections
using default passwords available through, -
80:17 - 80:19no offense, Google searches.
-
80:19 - 80:26So, what needs to happen, I think is some
impetus, some general understanding of the type -
80:26 - 80:33of threat that the country faces both in
the digital realm and in the physical realm. -
80:33 - 80:40But again, I think going back to what I said
earlier a lot of it starts with the individual -
80:40 - 80:45and I used to be very skeptical as to
whether we could actually get most people -
80:45 - 80:50to do basic hygiene things on their computer
and then one of the things that we also covered, -
80:50 - 80:54the committee worked on was swine flu and
as soon as big bird told everyone to cough -
80:54 - 80:58into their elbows, you have a fast majority
of American's, you see people coughing -
80:58 - 81:00or sneezing into their elbows now.
-
81:00 - 81:04We change behavior very quickly and I
think there can be an education campaign -
81:04 - 81:11that could change enough behavior to help stop
the problem, but without some type of push, -
81:11 - 81:14I think that we're all going to
keep trying to do what we can, -
81:14 - 81:18but the people who need to
make the changes may not. -
81:18 - 81:20>> Brian: Ram, thank you.
-
81:20 - 81:25>> Miguel: Thank you, so I'm a bit
of a skeptic on these push-measures. -
81:25 - 81:31Folks do push-measures, governments do
push-measures all the time and decades go by -
81:31 - 81:35and the basic problems don't get resolved.
-
81:35 - 81:38One thing that does seem to work is events.
-
81:38 - 81:40Events result in consequences.
-
81:40 - 81:47Michael Angelo, the virus got people to install
antivirus software, Y2K got people to focus -
81:47 - 81:53on mitigation measures, 9/11
caused a series of responses -
81:53 - 81:58and the Georgian Cyber War
caused another set of responses. -
81:58 - 82:04We don't really have a global cyber event,
I'm not asking for one, but I'm just saying -
82:04 - 82:09that if you just look at human behavior and
you want to affect human behavior and you want -
82:09 - 82:15to get individuals, governments, civil
society, public sector, everybody together -
82:15 - 82:22and the private sector together, you
need to have something to unify around. -
82:22 - 82:30The threat today doesn't feel real to me until
I get attacked and if my friend got attacked, -
82:30 - 82:33I kind of have some sympathy about
it but I kind of shrug my shoulders -
82:33 - 82:36and say, "Ain't going to happen to me."
-
82:36 - 82:43And there is not the unifying
sense of impending doom. -
82:43 - 82:48>> Danny: Can I just, I agree with everything
Ram said from the skepticism to the kind -
82:48 - 82:53of work I was also trying to also do the
need for an event and we would tell a lot -
82:53 - 82:58of the skeptics who came in is, look you
have Congress trying to act proactively. -
82:58 - 83:01It may not fix everything now but when
something happens there will be better systems -
83:01 - 83:03in place to respond to it.
-
83:03 - 83:06But more importantly, you want
government to act proactively -
83:06 - 83:11because when government acts reactively, it acts
stupidly and that's why there is a strong effort -
83:11 - 83:17to get some type of performance-based,
nontechnology specific standards -
83:17 - 83:21that are limited to really critical stuff in
place, so hopefully some things will improve -
83:21 - 83:25and if something happens, we have the framework
that is not so regimented that the attempt -
83:25 - 83:28to fix the problem actually enhances it.
-
83:28 - 83:32But I'm ultimately, because I'm a cynic
I don't think we're going to do anything -
83:32 - 83:39until we have something blowup and
that's unfortunate to say the least. -
83:39 - 83:41>> Brian: Danny, oh Damian thank you.
-
83:41 - 83:47>> Damian: Sure, yes I also sort of
agree with the cyber event being needed. -
83:47 - 83:56Not needed but, [Laughter] if you look
at history, we've seen that there's -
83:56 - 84:00like an email worm or virus that comes
out approximately once every 6 months -
84:00 - 84:04because that's how long it takes people
to forget and start being stupid again. -
84:04 - 84:07And you know click on everything they see but,
-
84:07 - 84:09you know once every 6 months
everyone gets infected, -
84:09 - 84:11everyone is like oh yeah, I shouldn't do that.
-
84:11 - 84:13Fortunately no major damage has been caused.
-
84:13 - 84:17Nobody has ever actually-- there
haven't been any large-scale cases -
84:17 - 84:19where people have lost data.
-
84:19 - 84:24I see this as very similar
to how diseases spread. -
84:24 - 84:28If you killed the person instantly,
like if someone gets infected -
84:28 - 84:32and you format their hard drive right
away, they don't have time to spread. -
84:32 - 84:36They don't have time to pass it on to others
and so most of the malware that we've seen -
84:36 - 84:39so far has been fairly benign
and that allows it to spread, -
84:39 - 84:41but it also means it doesn't cause much damage.
-
84:41 - 84:47I also wanted to say, I think right
now laws largely favor the attacker. -
84:47 - 84:54There's a lot of constraints on information
sharing, all of the jurisdiction issues, -
84:54 - 84:59and that also means that
there's a very slow response. -
84:59 - 85:04If somebody goes to law enforcement, law
enforcement might have to sit on it for weeks -
85:04 - 85:07or months before they can actually
take action against the attacker, -
85:07 - 85:09if they can even get to the attacker.
-
85:09 - 85:15So, some things might need to change
in laws to allow the defenders -
85:15 - 85:19to keep up with the pace of the attacks.
-
85:19 - 85:23And it's also important to note, you know
sometimes the attacker would actually know how -
85:23 - 85:28to shut down the attack, it's just they're
not legally able to and so there are a lot -
85:28 - 85:32of inherent delays in the system.
-
85:32 - 85:32>> Brian: Thank you, Miguel.
-
85:32 - 85:35>> Miguel: Just adding to that,
it's worth noting that there's -
85:35 - 85:39such a stigma associated
with security incidence. -
85:39 - 85:43Organizations are very unwilling to
admit that something has happened. -
85:43 - 85:45They don't want to admit so publically.
-
85:45 - 85:52They really, they don't want to collaborate
and to be effective, a lot of operators have -
85:52 - 85:55to work, as I mentioned earlier, they
have to work through back-channels, -
85:55 - 85:59people they know where the person
that you're potentially collaborating -
85:59 - 86:08with would probably get slapped if other people
were aware of this collaboration taking place. -
86:08 - 86:15So, that needs to get formalized,
potentially more formal protocols -
86:15 - 86:17for collaboration need to be developed.
-
86:17 - 86:24And from an international perspective,
governments need to do a better job at. -
86:24 - 86:28They haven't caught up to the
fact that this is a big issue. -
86:28 - 86:35So, some examples where we, as an
operator, we're seeing attacks happening -
86:35 - 86:41on small government websites, Syria's
as an example, and you actually want -
86:41 - 86:45to lend your resources and
expertise to help these people, -
86:45 - 86:50but because of their own
roadblocks, legislation, -
86:50 - 86:55etcetera they actually can't receive the help
-
86:55 - 86:57that you are potentially
looking at offering them. -
86:57 - 87:04So we've been in situations where we've
seen protest attacks during elections, -
87:04 - 87:09for example in smaller countries, and
we are willing to help them but then, -
87:09 - 87:13these governments have restrictions
on where their data is etcetera while -
87:13 - 87:16at the same time they don't
have the infrastructure to deal -
87:16 - 87:21with this problem themselves, but they're
handcuffing themselves, so all of that has -
87:21 - 87:24to change for us to be able
to be more effective. -
87:24 - 87:25>> Brian: Danny?
-
87:25 - 87:30>> Danny: Yeah I think some of this sort
of the tragedy of the common sort of thing, -
87:30 - 87:32the sheep on the commons I guess if you will.
-
87:32 - 87:36And what's the impact on
me or the investment on me? -
87:36 - 87:41Actually the Internet Security Alliance did
something not long ago called a CFO's Guide -
87:41 - 87:45to Cyber Risk and in that document they
introduced the notion of a digital immigrant -
87:45 - 87:52and they're talking about someone that didn't
grow up digital native or wasn't prolific -
87:52 - 87:56with electronic devices and the
internet and the capabilities of those -
87:56 - 87:59and they were discussing how in many places,
-
87:59 - 88:02they're the ones that control the purse
strings or control the investments. -
88:02 - 88:06Like people don't have problems investing in
fire suppression systems but if you ask about a, -
88:06 - 88:09DDoS mitigation capability, well
nobody is going to invest in that -
88:09 - 88:14until they've been attacked right, or
unless you're a very savvy organization -
88:14 - 88:16or have a lot of the right folks that do that.
-
88:16 - 88:21And then people even question those investments
after a long time of not being attacked. -
88:21 - 88:27So I think definitely looking at what enables
your business again or whatever size business, -
88:27 - 88:30because it's all relative
right, I mean we've seen things -
88:30 - 88:34from animal rights activists attacking zoos,
-
88:34 - 88:42to Jersy Joe's a local sports memorabilia
being attacked by a guy across the street -
88:42 - 88:44for a gold watch and a pair of tennis shoes.
-
88:44 - 88:46And that's a decade old, right?
-
88:46 - 88:49And so, I think understanding what
the impact of these things are -
88:49 - 88:51in your business is extremely important.
-
88:51 - 88:56I think understanding the constraints
today as well, this is a global problem. -
88:56 - 89:02The internet is loosely interconnected network
of networks and largely provides any kind -
89:02 - 89:04of activity and that's a fantastic thing.
-
89:04 - 89:08You know the fact that you can launch
DDoS attack might be considered a success -
89:08 - 89:12of that substraight or that
infrastructure, right I don't know. -
89:12 - 89:17And so you certainly don't want
over-pivot either and compromise privacy, -
89:17 - 89:22you're a regulator, put controls in place
that might impact that global platform. -
89:22 - 89:28That's something important as well, so
I think that's why industry partnership, -
89:28 - 89:32private sector with halook and things
like information sharing and saying look, -
89:32 - 89:36these things are impacting
real people, real organizations -
89:36 - 89:40and law enforcement government needs to go
after that and accommodate those as appropriate. -
89:40 - 89:44But at the same time, I think we do have
to be careful about over-pivoting as well. -
89:44 - 89:47>> Brian: Thanks, Jillian.
-
89:47 - 89:49
-
89:49 - 89:53>> Jillian: Sure, you know I think I'll just
give the civil society perspective what we can -
89:53 - 89:54be doing better.
-
89:54 - 89:59For example, my organization has come under
several DDoS attacks at different points -
89:59 - 90:04and we do have a big enough team in place
to try mitigate those pretty quickly -
90:04 - 90:06and we've mostly been able
to do that successfully. -
90:06 - 90:11But I think there's actually a pretty
strong lack of information sharing -
90:11 - 90:15across my type of NGO or NGOs in general.
-
90:15 - 90:18I'll give you an example of this, and
I don't mean to pick on this group, -
90:18 - 90:21but I think it's perfect
and quite public example. -
90:21 - 90:25Avaz, which I'm sure you're familiar with, a
few months back they came under DDoS attack -
90:25 - 90:29and their first reaction was to send a message
out to their members asking for donations. -
90:29 - 90:33But what they didn't do is they didn't
share any of the details of the attack, -
90:33 - 90:35not that they necessarily needed to publically
-
90:35 - 90:38but they actually straight-up
refused to share the details. -
90:38 - 90:42We have a group of technologists who had
been asking for that information and I think -
90:42 - 90:46that sometimes that information is actually
quite helpful for organizations to share -
90:46 - 90:50with each other so that we can
understand what type of attacks our allies -
90:50 - 90:55and friends are coming under and therefore what
types of attacks we might be at greater risk of. -
90:55 - 90:59And so I think that that's a really
good example of how not to respond. -
90:59 - 91:07In the end they still didn't want to share, and
we said okay, fine but I think that just sort -
91:07 - 91:10of going and asking for donations
and not kind of collaborating -
91:10 - 91:14with other civil site organization is not
a particularly helpful way of responding -
91:14 - 91:18and we'd be much better off if
we were clearer with each other. -
91:18 - 91:19>> Brian: Thank you.
-
91:19 - 91:21So thank you for that.
-
91:21 - 91:23I'm going to draw this part to a close.
-
91:23 - 91:27Some takeaways for me in the
last round of questions is -
91:27 - 91:32that clearly there are some structural
barriers to the level of collaboration -
91:32 - 91:35that everyone seems to believe is
important to addressing the problem, -
91:35 - 91:39both at the government level,
and at the operator level. -
91:39 - 91:46I guess the understanding at senior management
level that investments in the security aspect -
91:46 - 91:49of their business are as critical
as any other to their business -
91:49 - 91:51and have to be central to their planning.
-
91:51 - 91:56And at the government level, clearly
existing legislative structures -
91:56 - 92:01and collaborative barriers between governments
need to be broken down if we can get -
92:01 - 92:04to the place where we can be more aggressively
-
92:04 - 92:06and effectively collaborating
to address the problem. -
92:06 - 92:11So, we all knew that we weren't going to solve
this problem with today's panel and I want -
92:11 - 92:15to thank you all for giving us a lot
to think about and those are some -
92:15 - 92:18of the takeaways that I've gotten for myself.
-
92:18 - 92:26So now, let's take a breath and for the next 35
minutes or so, try to have a little bit of fun, -
92:26 - 92:30make it a little bit more dynamic for the
panelists by running through a scenario -
92:30 - 92:34and then we'll have 30 minutes at the end
where we want to hear Q&A again from folks -
92:34 - 92:36in the room and from the folks online.
-
92:36 - 92:41So, shift your mindset now on
the panel, we're going to walk -
92:41 - 92:44through a scenario of a DDoS attack.
-
92:44 - 92:49What I'd like you to think about
is what your specific role would be -
92:49 - 92:55within the scenario and how would you react?
-
92:55 - 93:02What would be the things that would be important
to you in addressing your part of the problem? -
93:02 - 93:04There's a clear understanding
and appreciation for the fact -
93:04 - 93:10that good security also means not divulging
all of your good effective practices. -
93:10 - 93:14So I'm not asking you to say anything
that you wouldn't want to say publically. -
93:14 - 93:15Let's get that clear.
-
93:15 - 93:20But I want you to take this on as a
real-time event and then in your proper role, -
93:20 - 93:24tell the audience what's important to
you, what do you need, and in a direction -
93:24 - 93:31of how would you see or design a best
practices reaction to this scenario. -
93:31 - 93:34So let's start this part of the program.
-
93:34 - 93:39So the scenario we've developed is as follows.
-
93:39 - 93:45The citizens of small country A,
let's call it the Kingdom of Genovia, -
93:45 - 93:48my 14-year-old daughter insisted that I do that.
-
93:48 - 93:54Kingdom of Genovia has been criticizing
an economic embargo put in place -
93:54 - 94:04by a regional Hodgeman, let's call it Mordor,
against its neighbor, a small country Gilder. -
94:04 - 94:10The citizens of Genovia who have a long
standing alliance with Gilder are very upset -
94:10 - 94:12about Mordor's embargo against Gilder.
-
94:12 - 94:17Condemnations include mass rallies as well
-
94:17 - 94:22as increasingly critical posts
on blogs and social media sites. -
94:22 - 94:27While the government of Genovia itself
shows no public support for the protestors, -
94:27 - 94:31neither does it criticize them for
exercising their freedom of expression rights, -
94:31 - 94:35fueling speculation that it
actually condones the protests -
94:35 - 94:38and may even be behind some of them.
-
94:38 - 94:43Large-scale DDoS attacks begin against Genovia.
-
94:43 - 94:46They are aimed primarily at the social
media sites posting the criticisms -
94:46 - 94:50but also at Genovia's financial sector.
-
94:50 - 94:57Researchers indicate that the attacks are coming
from botnets of comprised end-user machines. -
94:57 - 95:03The financial attacks are perceived to
be an attempt to weaken Genovia's economy -
95:03 - 95:08because the core issue, after all is an embargo
and that the financial sector has showed itself -
95:08 - 95:14to susceptible to other kinds of
security incidence and breaches. -
95:14 - 95:19Traces show the attacks originating
primarily in Mordor. -
95:19 - 95:23Some of which could be locations
under government control. -
95:23 - 95:27Some however, appear to come
from unrelated countries. -
95:27 - 95:31Mordor predictably, denies any responsibility.
-
95:31 - 95:37With those facts, in your respective
roles and responsibilities, -
95:37 - 95:42start off with what's important to you
in your given role and then we'll move -
95:42 - 95:44on to what actions you might take.
-
95:44 - 95:50Jeff, do you want to tee it up?
-
95:50 - 95:56>> Jeff: I guess the first thing, you know I'm
being the least technical guy up here I think, -
95:56 - 96:03you're going to want to really figure out, you
know you talked about the attacks originating -
96:03 - 96:08from Mordor, but does that mean
the commanding control is there? -
96:08 - 96:11Are the machines all over the place?
-
96:11 - 96:18If you're going to respond, you need to figure
out first what is your first goal in responding? -
96:18 - 96:21Are you going to try to stabilize
your systems or are you going to try -
96:21 - 96:26to somehow get attribution
and then seek retribution? -
96:26 - 96:33So, I guess my first council would be look at
what you have in place to respond and figure -
96:33 - 96:34out what your ultimate goals are.
-
96:34 - 96:37You need to know what you're driving
at so you're not wasting resources, -
96:37 - 96:47pursuing answers to questions that don't
help you achieve your ultimate goal. -
96:47 - 96:50>> Brian: Thank you, Ram.
-
96:50 - 96:51>> Ram: Four things.
-
96:51 - 96:55One, get contact lists together
because you know people -
96:55 - 96:58but there are other people involved
here, so you've got to get that. -
96:58 - 97:01That's in some ways the top thing.
-
97:01 - 97:04Second is to setup an analysis stream work.
-
97:04 - 97:13Once you identify the scope of the problem, then
you need a framework in which to actually work -
97:13 - 97:16as new data comes in and you need a structure.
-
97:16 - 97:19So create a structure for it.
-
97:19 - 97:27Third thing is to begin working with upstream
providers, folks who are connecting you -
97:27 - 97:29and connecting others to the internet.
-
97:29 - 97:36Start working with them because you need to
have information sharing and also the ability -
97:36 - 97:42to take mitigation measures, to
take steps if and when you have to. -
97:42 - 97:51And the fourth is to setup alerts based
on pattern recognition or traffic analysis -
97:51 - 97:54that your analytical team is already doing.
-
97:54 - 97:58Those are the first four things to do.
-
97:58 - 98:01>> Brian: Thank you, Damian.
-
98:01 - 98:08>> Damian: So the first thing I would ask about
this would be what style of attack is this? -
98:08 - 98:13Depending on some attacks can be
spoofed with the sources, some cannot. -
98:13 - 98:19So if the sources are definitively like, you
know they're definitively coming from Mordor -
98:19 - 98:25or you know what these sources are, that
can help a lot more than if it's an attack -
98:25 - 98:28where you don't really know where
it's coming from, you just know-- -
98:28 - 98:32you don't know which machine
it's coming from in Mordor. -
98:32 - 98:36You know that it's just coming from
that country in general, maybe. -
98:36 - 98:40And I think that's the key
thing to focus on here. -
98:40 - 98:44I mean, I agree with what other's said,
but I think it's important to start -
98:44 - 98:50by understanding the details of the
attack, figuring out what you actually know -
98:50 - 98:54and versus what you are assuming
or guessing about the attack. -
98:54 - 99:01And then I would also start thinking about
what type of collateral damage is acceptable. -
99:01 - 99:08If you really only care about financial services
in Genovia being accessible to people living -
99:08 - 99:15in Genovia, they could at the boarder of their
country, just block all traffic from Mordor and -
99:15 - 99:19yet people who happen to be on
vacation to Mordor might not be able -
99:19 - 99:22to access their bank account,
and that would be pretty bad. -
99:22 - 99:28But you could at least partition the
problem and keep your own country up. -
99:28 - 99:31>> Brian: Thanks for that point and just
to note, people on vacation in Mordor -
99:31 - 99:34to my understanding, no one walks into Mordor.
-
99:34 - 99:35Miguel, please.
-
99:35 - 99:40>> Miguel: I might actually repeat some of
the things that my colleagues here have said. -
99:40 - 99:45From the perspective of an operator
that focuses on mitigation and defense, -
99:45 - 99:50I would probably start by
looking at the affected entities. -
99:50 - 99:56Get a good scope on what the
targets are, what's being affected. -
99:56 - 99:59Move to start looking at determining
what the attack vectors are -
99:59 - 100:01that are being used for this particular attack.
-
100:01 - 100:06You can do this in a variety of ways
and then I'd probably start focusing -
100:06 - 100:12on starting the mitigation techniques and
the defense against these affected systems. -
100:12 - 100:20As Damian said earlier, I'd look at prioritizing
and trying to determine or trying to gauge -
100:20 - 100:27which affected resources are acceptable
collateral damage which are priorities and need -
100:27 - 100:33to be available and need to be in place.
-
100:33 - 100:38I'd be sharing information as much as possible
with both, the public and private sector, -
100:38 - 100:42the operators in question that manage
the assets that are being attacked. -
100:42 - 100:46So definitely start reaching out to people.
-
100:46 - 100:49Another thing that I would be doing
is heavily monitoring social media. -
100:49 - 100:59Typically with an attack on Mordor, let's
say and suspected political motivations -
100:59 - 101:02for the attack, I would be looking at
Facebook, I'd be looking at Twitter, -
101:02 - 101:04I'd be looking at internet relay chat rooms.
-
101:04 - 101:10Anywhere where these attackers could potentially
congregate to organize, I'd be monitoring that -
101:10 - 101:14and I'd be trying to agleam
as much information as I can -
101:14 - 101:16from that activity that is going on online.
-
101:16 - 101:19So those are some of the
things that I'd be doing. -
101:19 - 101:21>> Brian: Thank you, Danny.
-
101:21 - 101:26>> Danny: So yeah I guess there's both a luxury
in going last and not having much [inaudible], -
101:26 - 101:29but there are a few things
I could offer actually. -
101:29 - 101:31I think these guys are all
spot-on with a lot of this. -
101:31 - 101:35I think it certainly, whatever
detection capabilities you have for this, -
101:35 - 101:40whether it was a phone call, hopefully
not, or an alert or some capability, -
101:40 - 101:43engage your incident response
capability which you should have now -
101:43 - 101:45because you've been alerted to that.
-
101:45 - 101:49And the figure out what controls
for that sort of attack factor, -
101:49 - 101:51right, exactly as these guys have said.
-
101:51 - 101:56You certainly want to continue with continuous
monitoring and make sure that other devices, -
101:56 - 102:02other things aren't impacted in particular
with sort of multi-vector attacks, -
102:02 - 102:05especially such as this which we
have seen empirically in the past. -
102:05 - 102:10One of the things that you have to be really
careful about and we've actually seen this -
102:10 - 102:15in the past and learned from that, is Genovia
should have learned from is that you've got -
102:15 - 102:19to be really careful about what kind of
controls you put in place for attacks as well -
102:19 - 102:22because you may say, I'm going to bring
everything back into my organization, -
102:22 - 102:25under control and then I'll
turn my internet access back up -
102:25 - 102:27or inside my nation, or whatever it is.
-
102:27 - 102:31And we've literally seen this at the
national level and so you decide you're going -
102:31 - 102:35to break all your connectivity and then you
realize you don't have a root name server, -
102:35 - 102:37or you realize your CCTLD is hosted in Mordor.
-
102:37 - 102:42Or you realize that your emails over
there, your authentication service, -
102:42 - 102:47your CA that issues your searcher there
or, some other resource that you need. -
102:47 - 102:49So you really need to numerate those things
-
102:49 - 102:53and understand what enables your
business before these attacks occur. -
102:53 - 102:59I think I use this statement in the past
but kind of goes back to Mike Tyson's, -
102:59 - 103:03"Everyone's got a plan until they
get hit," sort of mentality, right. -
103:03 - 103:07And so I think that if you haven't done
this and you're on the receiving end -
103:07 - 103:14of a large-scale attack, it could be really
problematic so certainly absorbing an attack -
103:14 - 103:18and then refining your controls and mitigating
as surgically as possible and then trying -
103:18 - 103:22to move those controls further and further
upstream and then collaborate as much -
103:22 - 103:25as possible is pretty much what you can do today
-
103:25 - 103:30and then protect any forensics information
associated with that for whatever it is -
103:30 - 103:32that you might intend to
do with that information. -
103:32 - 103:34>> Brian: Thank you, Jillian.
-
103:34 - 103:36>> Jillian: There is almost
nothing left for me to add here. -
103:36 - 103:39It is the great thing about going last.
-
103:39 - 103:44But since you did ask what my organization
might do, I suspect that after the leaks -
103:44 - 103:47to the Mordor times come out that Mordor
government officials had something to do -
103:47 - 103:50with the attacks, we would probably
condemn the government of Mordor -
103:50 - 103:55for having double standards-- no
I'm just kidding, sort of, but yeah, -
103:55 - 104:00nothing that I can add from
a technical perspective. -
104:00 - 104:04>> Brian: Okay, well from-- you know what I'm
going to reverse order here, so you'll go first -
104:04 - 104:08and Jeff you're going to have to
deal with Danny's problem next. -
104:08 - 104:14So this is good and very helpful in terms of
the first priorities, the first analytical -
104:14 - 104:19and reaction priorities from your
perspectives very clear and interesting-- -
104:19 - 104:22not interesting but a lot of
consistency across the board there. -
104:22 - 104:29Now let's take it from the point of view
of, if this were an ideal scenario in terms -
104:29 - 104:35of effective mitigation techniques, effective
collaboration with network operators, -
104:35 - 104:39effective collaboration with
government law enforcement resources. -
104:39 - 104:46Walk us through how you would get to that good
outcome from that perspective and Jillian, -
104:46 - 104:48from your own point of view, kick it off.
-
104:48 - 104:50>> Jillian: I'm not sure
I can kick that one off. -
104:50 - 104:56Like I said, this is a wonderful
and probably very likely scenario -
104:56 - 105:00but it's also it's not the level at which
we're generally dealing with these things -
105:00 - 105:03and so I'd actually love it if
somebody else wants to kick it off -
105:03 - 105:04and I'll keep thinking through that.
-
105:04 - 105:07>> Brian: All right, Danny, you're first up.
-
105:07 - 105:10>> Danny: Wow, an ideal scenario
is that it's not my problem anymore -
105:10 - 105:16and so having the capability to either certainly
stop these things from being launched at me -
105:16 - 105:19with some sort of capability or
collaboration with law enforcement, -
105:19 - 105:24other folks which in this case
might be very problematic so, -
105:24 - 105:28at the sort of ultimate ingress point of
your network, putting controls in place -
105:28 - 105:34that minimize collateral damage or even scope
the distribution of reachability information -
105:34 - 105:36in a certain place on the
infrastructure, that sort of thing -
105:36 - 105:39so that you have some sustainable
controls in place -
105:39 - 105:46and you're not continuously simply filling links
and absorbing that and causing collateral damage -
105:46 - 105:48to other services or people
that may use those links. -
105:48 - 105:55It's really problematic if there inter-media
networks with other eyeballs or content -
105:55 - 105:58or other things that you may or
may not want on your infrastructure -
105:58 - 106:01and so if it's an adjacent
network, it's a lot simpler, right, -
106:01 - 106:06it simply if you've done your homework
before and then simply shut those links off -
106:06 - 106:12and you may be fine, but if I'm a
smaller network and this is someone, -
106:12 - 106:18somewhere that's nonadjacent to me, it could be
much more problematic because I may have to work -
106:18 - 106:22with them to push controls further and further
upstream and that's about their capabilities, -
106:22 - 106:26the lulls, what sort of technical
or legal framework -
106:26 - 106:29that they operate under,
time scales and other things. -
106:29 - 106:38And so, it's sort of all relative to perspective
and why the broad variance of attack factors -
106:38 - 106:42that occur today, why it's so problematic
to just get your cookie cutter out -
106:42 - 106:46and say this is a solution for that
and so, it's nontrivial I think, -
106:46 - 106:49so it entirely depends on
vectors and other things. -
106:49 - 106:52I'm not sure if I said anything
that was actually useful, but-- -
106:52 - 106:54>> Brian: That's fine, Miguel please.
-
106:54 - 106:59>> Miguel: In an ideal scenario
where information is being shared, -
106:59 - 107:05where we've quickly been able to determine what
the attack vector is, we are looking at ensuring -
107:05 - 107:08that we can put really precise filters in place
-
107:08 - 107:12to lob off attack traffic while
letting good traffic through. -
107:12 - 107:15It's easier said than done a lot of the time.
-
107:15 - 107:19As I said, it's in an ideal
situation we understand the attack, -
107:19 - 107:25and we can put the right mitigation
strategies in place to deal with it. -
107:25 - 107:31So in that ideal situation, most likely
we should be able to get to availability -
107:31 - 107:34within minutes if people
are cooperating correctly -
107:34 - 107:37and we have the information that we need.
-
107:37 - 107:41The problem is that we don't
live in an ideal world -
107:41 - 107:45and beyond that, attackers are smart, right?
-
107:45 - 107:54So they try one thing and then you
scramble and get the sites available again -
107:54 - 107:58and put the right mitigation strategy in place,
-
107:58 - 108:01but then potentially they might
start trying something else. -
108:01 - 108:05You know if that's not being effected, they'll
go route B and then potentially will go right -
108:05 - 108:14to route C, so it's a cat and mouse game and
it's far from ideal and it's starting over again -
108:14 - 108:18in some sense in terms of putting together
another mitigation strategy to deal -
108:18 - 108:23with the new attack vector or signature
that comes in and unfortunately, -
108:23 - 108:29the ideal scenarios never happen and
attackers have gotten smart and they know how -
108:29 - 108:34to [inaudible] it up and do the damage,
and put the damage that they need -
108:34 - 108:36to for the people that are unprepared.
-
108:36 - 108:38>> Brian: Thank you, Damian just let
me interject before you go there. -
108:38 - 108:44So hearing Danny and Miguel,
clearly understanding that again, -
108:44 - 108:49the problem of the upstream operator and
what their sophistication capabilities are -
108:49 - 108:55in helping you diagnose the problem across
networks, if you will you pointed out. -
108:55 - 108:58And also the clear understanding
of needing to kind -
108:58 - 109:02of secure your resources and
prevent collateral damage. -
109:02 - 109:09But Damian, Ram, Jeff, bring in also how do
we work effectively with law enforcement? -
109:09 - 109:13What can they do to help, what can
you do together and the good scenario -
109:13 - 109:19when it works well with the upstream
provider, what does that look like? -
109:19 - 109:23>> Damian: Yes I'll start by saying
without bringing in law enforcement, -
109:23 - 109:28ideally you would be able to work directly with
the network operator, they do want to track it -
109:28 - 109:32through their network and
stop the attack upstream. -
109:32 - 109:39There are situations as Miguel was
saying; sometimes it's a little tricky. -
109:39 - 109:45In this case we don't know if the
government of Mordor is behind these attacks. -
109:45 - 109:50So, it's sticking with the scenario
it's never going to be entirely idea -
109:50 - 109:56because you don't necessarily want to tell
the ISP in Mordor what your fingerprint -
109:56 - 110:01of the attack is which maybe would help them
filter it because they might just turn around -
110:01 - 110:04and tell the government, the government
will modify the attack to not match -
110:04 - 110:07that fingerprint anymore and then you're
in bigger trouble than you were before. -
110:07 - 110:15So, depending on how paranoid you want
to be, I'm a security person so I'm paid -
110:15 - 110:21to be paranoid but, you have to be a little
cautious about what information you're sharing. -
110:21 - 110:26Try to share information that's
useful for stopping the attack but, -
110:26 - 110:30not sharing everything you know about
the attack so you can still trace it. -
110:30 - 110:38In terms of law enforcement since we're
in the U.S., U.S. CERT is a good resource. -
110:38 - 110:41They have contacts at CERTs.
-
110:41 - 110:44CERT is Computer Emergency Response Team.
-
110:44 - 110:48They have contacts at CERTs at every
other country and so that's very helpful -
110:48 - 110:51because they're sort of a central point.
-
110:51 - 110:56They might be able to recognize that
you're not the only victim of an attack, -
110:56 - 111:01so they might be able to correlate events
that you perhaps were not aware of. -
111:01 - 111:04And they can also assist with language issues.
-
111:04 - 111:09You know it's very difficult for me
personally to email an ISP in Asia -
111:09 - 111:15because I don't speak any of the Asian languages
whereas U.S. CERT probably has the ability -
111:15 - 111:19to handle that translation a little bit better
-
111:19 - 111:23than Google Translate which
is my fallback option. -
111:23 - 111:24[Laughter]
-
111:24 - 111:26>> Brian: Thank you, Ram.
-
111:26 - 111:34>> Ram: Thanks, so in this ideal scenario
perhaps one of the things that have to be worked -
111:34 - 111:38on is the formation of an
alliance for data sharing. -
111:38 - 111:43Especially identifying who the next
Genovia might be and you go work -
111:43 - 111:49out who those next Genovia's might be and
this kind of an alliance cannot be government -
111:49 - 111:56to governments, it's got to be public, private,
a combination of that and that takes time to do -
111:56 - 111:59but this is the time to start
doing it [inaudible]. -
111:59 - 112:04The second, you know we're talking about this
ideal scenario and there is rapid availability. -
112:04 - 112:08The attack happened, mitigation
happened, everything came back -
112:08 - 112:14but remember this might simply Mordor
profiling you for a bigger attack to come -
112:14 - 112:20and they've now learned how you countered it
and their building counter-measures right now -
112:20 - 112:23for your counters and that's likely to happen
-
112:23 - 112:27if this is really a serious
act coming up against you. -
112:27 - 112:33So, you may leave everything
on the floor at this time -
112:33 - 112:37and you may just get killed
really online the next time. -
112:37 - 112:46On the third is law enforcement, this is a case
where most often this is a source less crime, -
112:46 - 112:51there is no one to prosecute, there's no
one to really go after for the most part. -
112:51 - 112:58Most of the people along the way are in
transit and are trying to help to some extent. -
112:58 - 113:02They're just doing their job passing
packets along, passing information along -
113:02 - 113:09and they got coopted into something that
was initially beyond their understanding -
113:09 - 113:13and eventually beyond their
ability to solve individually. -
113:13 - 113:19So you have to start to change a little bit of
law enforcement's mindset of who are we going -
113:19 - 113:25after because this is not so much about
a counter attack, this is often much more -
113:25 - 113:33about prevention and you have to start
thinking about the online equivalence -
113:33 - 113:42of a neighborhood watch and one doesn't
really exist in any coordinated way today. -
113:42 - 113:43>> Brian: Thanks, Jeff.
-
113:43 - 113:46>> Jeff: I definitely like going last.
-
113:46 - 113:50I have more time to think about what I'm going
to say and I bounced around with a few ideas -
113:50 - 113:52but you know they say don't fight the scenario
-
113:52 - 113:54but I was always the kid
who fought the scenario. -
113:54 - 113:58So I guess I would start kind of where
Damian went, if you're an ideal scenario -
113:58 - 114:06that means Mordor is helping and helping
you willingly and with no ill intent -
114:06 - 114:09in actually wanting to stop their
own citizens who [inaudible] -
114:09 - 114:11and probably something they believe in.
-
114:11 - 114:16Which leads me to point two, I think Ram hit
well, if everything is really going that well, -
114:16 - 114:20that's when you should really start being
scared because things never go that well. -
114:20 - 114:23So question everything that worked
and try to figure out why it worked -
114:23 - 114:27and is someone just letting you think it worked?
-
114:27 - 114:33In terms of what does it look like to be
successful on the legal and governmental side, -
114:33 - 114:36there are a lot of things you need to work.
-
114:36 - 114:39Governments that are willing to share
information, that have relationships, -
114:39 - 114:42that trust each other, but then
even beyond that you need laws -
114:42 - 114:47that will allow the information sharing both
between the private sector and the government -
114:47 - 114:49within each country and then
between the various governments. -
114:49 - 114:52But then you also need laws
that protect the privacy -
114:52 - 114:56of the individuals whose information is
being shared and assuming you have all that -
114:56 - 115:00and you get the information that allows
you to find the actual source of the crime -
115:00 - 115:05which as Ram said is very difficult, you
actually have both resources and laws -
115:05 - 115:11that allow prosecution and not in medieval ways
of people who are doing these types of acts. -
115:11 - 115:18So going back to, you really need
to figure out what your end-goal is -
115:18 - 115:22out of this before you figure
out, it would be great -
115:22 - 115:24if you'd actually prosecute the people doing it.
-
115:24 - 115:27It would be better if you could get
all your systems back up really quickly -
115:27 - 115:32and try to develop better relationships
to prevent them in the future. -
115:32 - 115:33>> Brian: So Jeff, just picking
up at that point, -
115:33 - 115:38this will be the last round then we'll
turn it over to Q&A for the audience -
115:38 - 115:41and Ram mentioned the notion of an alliance.
-
115:41 - 115:45Danny the scizrick work that
mentioned at the FCC. -
115:45 - 115:52Very interesting industry, government but
clearly, just uniquely ISP focused in terms -
115:52 - 115:58of best practices or a potential code
of conduct if you will in that exercise. -
115:58 - 116:04Where is this collaboration happening today or
the seeds of this collaboration between industry -
116:04 - 116:10and government specifically that
clearly has to be globally oriented. -
116:10 - 116:13That has to be cross-cutting across boundaries.
-
116:13 - 116:16Where is that happening, where should it begin
-
116:16 - 116:19to happen more deeply and
how can we make that happen? -
116:19 - 116:21I'll open to the entire panel.
-
116:21 - 116:23Danny.
-
116:23 - 116:32>> Danny: So yeah there are a lot of national
level stuff that I mentioned certainly as some -
116:32 - 116:37of the countries that blazing the trail
there from Australia, to Germany, to Finland, -
116:37 - 116:43to the U.S. I mean some of the work that
the FCC and others have done which is -
116:43 - 116:46about educating folks and sharing information.
-
116:46 - 116:51A lot of this as you'll notice, even though
these scenarios comes back to international laws -
116:51 - 116:58or even national laws or disclosure laws or fair
disclosure laws, right I mean what is the extent -
116:58 - 117:03of where I can share information and who I can
get help from and where can we get collaboration -
117:03 - 117:07from a nation state versus send in a
snatch team or not do anything, right? -
117:07 - 117:14And so, what are the kinds of capabilities that
you have, and then you'd really like to operate -
117:14 - 117:18in meet space and prosecute people that
have real impacts on real businesses -
117:18 - 117:22and break walls internationally,
but how do you balance -
117:22 - 117:26that internationally with
the privacy for example? -
117:26 - 117:30I mean that's a tough balance because if you
can attribute every transaction on the internet, -
117:30 - 117:34then no one has any privacy or
[inaudible] and what does that mean -
117:34 - 117:36for censorship or for other things.
-
117:36 - 117:39So all these sort of things together is,
-
117:39 - 117:43it is definitely needs more
leadership from the government. -
117:43 - 117:46I think they've certainly
done a humungous amount, -
117:46 - 117:51and from local law enforcement folks
we work with, to national level folks, -
117:51 - 117:54and certainly Jeff and some
of the places he'd been. -
117:54 - 117:57A lot of the folks looking for ways
to collaborate and to put frameworks -
117:57 - 118:05in place allowing information sharing and enable
in a sort of protections of private sector -
118:05 - 118:11and industry and you know that the government's
got your back for this and that they're going -
118:11 - 118:15to pull the levers and turn the
steam valves they to make sure -
118:15 - 118:18that if someone is attacking someone on
this infrastructure and have an impact -
118:18 - 118:24that it's having a real impact and
represent their citizens wherever they are. -
118:24 - 118:28So I think it sort of goes all the way back
to that from the international perspective -
118:28 - 118:32because of the projection capability
that advisories have on the internet -
118:32 - 118:39and there are a lot of alliances, a lot are
private sector, public sector, partnerships, -
118:39 - 118:42everything from internet security alliance,
online trust alliance, stop bad ware. -
118:42 - 118:44I mean there's no shortage.
-
118:44 - 118:49I mean a lot of the outreach that we
talked about, the work that [inaudible] -
118:49 - 118:53and anti-phishing working group and
some of the other folks have done. -
118:53 - 119:00So I think that a lot of this is happening but
it certainly, the industry level leadership -
119:00 - 119:05with the recognition by governments
that they're captive to this. -
119:05 - 119:07We're all sort of captive to
this and the only way we're going -
119:07 - 119:10to get there is if we collaborate.
-
119:10 - 119:12>> Brian: Thanks, anybody else?
-
119:12 - 119:13
-
119:13 - 119:17>> You know there are many more
acronyms we could throw out there -
119:17 - 119:21about the various public/private
collaboration partnerships. -
119:21 - 119:23Some doing great work, some doing work.
-
119:23 - 119:29[Laughter] But I want to get back to
something I think Miguel touched on earlier -
119:29 - 119:34about information sharing and the need to share
information and most folks who would go ahead -
119:34 - 119:35and share will get slapped down for it.
-
119:35 - 119:43There are two reasons for it, one
corporate strategic secret issues, -
119:43 - 119:45but also the lawyers will
often slap you down because, -
119:45 - 119:47well can we really share that information.
-
119:47 - 119:53That's an area where I think we need change
and we need it soon is changing the laws -
119:53 - 119:58that limit the ability of companies who want to
share information with other companies, ECPA, -
119:58 - 120:04Electronic Communication Privacy Act, antitrust
laws, all these don't need to be gutted, -
120:04 - 120:07they need to be reformed and
frankly we got to a very weird place -
120:07 - 120:10in the [inaudible] legislative cycle
this year where you had the head -
120:10 - 120:15of the national security agency and you had
privacy groups all saying this is something we -
120:15 - 120:18need to do and here's the framework
that we all think actually can work. -
120:18 - 120:23It based our own idea of sharing cyber
security information narrowly defined -
120:23 - 120:25for cyber security purposes, narrowly defined,
-
120:25 - 120:30but Congress in its infinite
wisdom got you have the NSA -
120:30 - 120:34and the privacy groups essentially
agreeing, so Congress chose not to act. -
120:34 - 120:38And that is something that I think is not
going to solve the problem but would be a step -
120:38 - 120:41in the right direction to
allow information sharing -
120:41 - 120:43and maybe breakdown some of those barriers.
-
120:43 - 120:49Make it happen 5, 10, 15, minutes an hour
soon, sooner or even won't happen at all -
120:49 - 120:53so that's something that within all these
groups there are still these limitations -
120:53 - 120:57that are illegal and need to
be changed by the politicians. -
120:57 - 120:59>> Brian: Thanks, Damian.
-
120:59 - 121:03>> Damian: I wanted to mention there are
some ways that collaboration can occur -
121:03 - 121:09without needing to necessarily involve
lawyers or worry about user privacy. -
121:09 - 121:14Some of the attacks that we see there's
just sharing information and about the fact -
121:14 - 121:17that we're seeking an attack,
the size of the attack, -
121:17 - 121:19the type of the attack can be helpful to others.
-
121:19 - 121:27So as a recent example the dos attacks
that hit the banks recently hit us actually -
121:27 - 121:32about a week before it started hitting all
of the banks and we sent a quick heads-up -
121:32 - 121:38to a security list of people
just letting them know, -
121:38 - 121:41hey we're getting this surprisingly
large attack. -
121:41 - 121:44This is a bit unusual; this
is what it looks like. -
121:44 - 121:47You might want to watch out, be prepared.
-
121:47 - 121:51Unfortunately two days later, we wrote
back and said it just doubled in size, -
121:51 - 121:56but there are things that you
can do to give out information. -
121:56 - 122:00We're not giving out necessarily like
the IP addresses that it's coming -
122:00 - 122:05from because we have talk to lawyers
about the privacy implications of that, -
122:05 - 122:09but even just the basic information about the
type of attack that you're getting and the size -
122:09 - 122:16and maybe the general area of the world it's
coming from can be very helpful to others. -
122:16 - 122:19>> Brian: Thanks, any last remarks?
-
122:19 - 122:22Okay, thank you panelists
very much for playing along -
122:22 - 122:25and for the great information
you provide with us so far. -
122:25 - 122:30So let's get to the real important folks here
today, the audience both here and online. -
122:30 - 122:35At least for the next 30 minutes, we'll
have an open mic in the middle of the room. -
122:35 - 122:40I think we have some questions
from online, so if you would, -
122:40 - 122:49please [inaudible] we have--
[Pause]-- it doesn't work? -
122:49 - 122:50
-
122:50 - 122:55Why don't you come up and use this
microphone if you would to pose your question. -
122:55 - 122:56[Pause]
-
122:56 - 123:03>> David: I'm David Thaumenal [phonetic]
President of The Internet Society of New York -
123:03 - 123:07and just as we have software as a
service and infrastructure as a service, -
123:07 - 123:13there's now crime-ware as a service so if I'm a
bad person, rather than going to all the trouble -
123:13 - 123:16of actually attacking somebody
I don't like on the internet, -
123:16 - 123:23I can actually pay a service
provider to do it for me -
123:23 - 123:29and they're using a commercial business model
so I can have warranties, guarantees of quality -
123:29 - 123:33of service, support contracts
and everything else. -
123:33 - 123:41So my question is wouldn't it make sense
for whether it's industry or law enforcement -
123:41 - 123:49or whatever to focus on identifying these
crime-ware service providers infiltrating them, -
123:49 - 123:55targeting them, purchasing their
software and reverse engineering it -
123:55 - 124:01to disable it, that type of thing?
-
124:01 - 124:05>> Brian: Anyone on the panel want to take that?
-
124:05 - 124:12>> Danny: Absolutely in if you go back
to the scenario of an ideal world, -
124:12 - 124:16but a lot of these are happening offshore in
countries that aren't particularly mendable -
124:16 - 124:23to working with our law enforcement
to arrest or prosecute. -
124:23 - 124:28Reverse engineering I think goes on, but the
problem is that the software morph so quickly -
124:28 - 124:33that the signatures old as soon as you know it.
-
124:33 - 124:37And there are other efforts, other
techniques for protecting against it -
124:37 - 124:41and I think that's actively underway, but
in terms of infiltrating, breaking up, -
124:41 - 124:44prosecuting, they'd just go somewhere else.
-
124:44 - 124:50>> So I was going to add just there
is one aspect to this certainly lots -
124:50 - 124:53of folks are looking at when you try to
move it back to meet space and the place -
124:53 - 124:57where law enforcement usually operates
in a more productive way and better -
124:57 - 125:04than most information security folks and there
has been a lot more work on follow the money -
125:04 - 125:07and use that angle for the
attribution side of this. -
125:07 - 125:12I mean some of the recent things you may
have seen from spam campaigns to phishing -
125:12 - 125:15and mal-code distribution
and those sorts of things. -
125:15 - 125:20Some recent work actually by Steph and
Savage and some of the folks at UCSB -
125:20 - 125:25and was particularly enlightening in that
area for those of you that haven't seen that. -
125:25 - 125:28And I know that law enforcement is certainly
taking note and very good at those kind -
125:28 - 125:37of things and so, I suspect that
being aware of that and seeing more -
125:37 - 125:40on that side I would follow the
money and work on the attribution -
125:40 - 125:45and the prosecution associated with malicious
activity, that sort is certainly something -
125:45 - 125:49that we're going to see more of
from a prosecution perspective. -
125:49 - 125:53>> Brian: And the FBI has had
some big take downs recently. -
125:53 - 125:57There was one in [inaudible]
early this year, late last year. -
125:57 - 125:59>> Last year.
-
125:59 - 126:00>> Brian: Thank you.
-
126:00 - 126:02I've got two questions from online,
-
126:02 - 126:05I'll go to one of them first
and then come back to the room. -
126:05 - 126:09From Vanda [phonetic] the reality
that people don't think it will happen -
126:09 - 126:11with them is a fact here too.
-
126:11 - 126:18So how can I convince people that they
need to take preventative measures? -
126:18 - 126:19
-
126:19 - 126:20Jillian?
-
126:20 - 126:25>> Jillian: Sure, so I don't know
what "here" means in that sentence -
126:25 - 126:30but nonetheless I would say in
thinking about how to convince people, -
126:30 - 126:36there is a wealth of information on what sort
of attacks occurred and who they've targeted -
126:36 - 126:40and one of the things that this
Berkman Center study found was -
126:40 - 126:43that there's really no associated
ideology with attacks. -
126:43 - 126:49There's one example where some
conservative Muslim groups outside -
126:49 - 126:52of the U.S. were attacking
U.S. Conservative website. -
126:52 - 126:57The U.S. Conservative Groups were then attacking
these Muslim websites outside the U.S. And so on -
126:57 - 127:02and so forth and sort of in a circle
and so, anyone can be a victim. -
127:02 - 127:07Any type of group, any type ideology and
so I think that's where we start looking -
127:07 - 127:13at previous attacks and educating people
about those various desperate targets, -
127:13 - 127:15that's another way that we can raise awareness.
-
127:15 - 127:20And then like I said just sort of thinking
about risk assessments not an easy thing -
127:20 - 127:26in these cases and like I said with having
desperate ideologies be the target of attacks, -
127:26 - 127:31it's not easy to really assess what
your actual risk is and so to assume -
127:31 - 127:34that you could potentially be a target
of an attack is the first thing. -
127:34 - 127:41But then to sort of weigh your risk and figure
out what you might want to think about in terms -
127:41 - 127:44of what's important to you
and keeping your site up. -
127:44 - 127:46>> Brian: Sure, Miguel.
-
127:46 - 127:49>> Miguel: Thank you Brian.
-
127:49 - 127:55What the question refers to is sort of how
to make the business case for protection -
127:55 - 127:58or mitigation against this kind of a threat.
-
127:58 - 128:04Danny actually talked about some of these
things previously in the conversation in terms -
128:04 - 128:08of really evaluating your
infrastructure and your needs and kind -
128:08 - 128:13of asking yourself some basic questions.
-
128:13 - 128:20What would it mean to you if your, let's
say for example your website was down? -
128:20 - 128:24What are some of the things that could
potentially happen if that was the case -
128:24 - 128:26and what would the impact to you be
-
128:26 - 128:30if your infrastructure was
down for 12 hours for example? -
128:30 - 128:33I'll use some private sector examples
to just kind of illustrate this. -
128:33 - 128:37Maybe obviously there's potentially
the revenue component. -
128:37 - 128:39Maybe you're making money off your website
-
128:39 - 128:46so there's some tangible result
in terms of not having revenue. -
128:46 - 128:51But from a customer service perspective for
example, what happens if your website is -
128:51 - 128:53down for a certain amount of time?
-
128:53 - 128:58Maybe your call center gets
flooded, gets into code red. -
128:58 - 129:03People are waiting an hour-and-a-half
to have the phone answered. -
129:03 - 129:07Maybe your email boxes start getting flooded
and maybe it's going to take weeks potentially -
129:07 - 129:11to dig yourself out of that hole.
-
129:11 - 129:17Another thing to kind of think about is,
as you make the business case for this -
129:17 - 129:25or to have some kind of a plan to mitigate the
attacks is how long would it actually take you -
129:25 - 129:30to get your core infrastructure or the
infrastructure you need to be online, -
129:30 - 129:34back online if something like this happened?
-
129:34 - 129:38Potentially it would take you a
significant amount of time just to figure -
129:38 - 129:44out what's actually happening let alone figuring
out what the path is going to be in terms -
129:44 - 129:47of what the best strategy is to deal
with the problem when it happens. -
129:47 - 129:51And then on top of that, after that
is once you actually know what to do, -
129:51 - 129:55actually putting the plan
in place to do what needs -
129:55 - 129:57to be done to get the threat under control.
-
129:57 - 130:01So when you start asking yourself
some of these fundamental questions -
130:01 - 130:04and it's not just a private
sector thing where you're worried -
130:04 - 130:08about your revenue potentially
or your brand equity. -
130:08 - 130:11You know the public sector faces this as well
-
130:11 - 130:14because it obviously, there's
some tangible stuff. -
130:14 - 130:20It looks really bad when a government website
is down or a free speech NGO website is down. -
130:20 - 130:23So there are fundamental questions
that you can start asking yourself -
130:23 - 130:28and when you start asking yourself
these question and really look -
130:28 - 130:31at what the impact is going to
be, both short-term and long-term, -
130:31 - 130:34you really have to think about
the long-term impact too. -
130:34 - 130:40At that point you start to look at that
and the business case for DDoS protection -
130:40 - 130:45or for having a plan in place to deal
with this particular issue if it happens, -
130:45 - 130:50it starts to become quite apparent that
this something that is worth doing. -
130:50 - 130:54>> Brian: Sounds like good common
sense, anybody else, yeah, Damian. -
130:54 - 131:01>> Damian: So I want to highlight like in
addition to just the business financial impact, -
131:01 - 131:03there is a very strong PR impact to going down.
-
131:03 - 131:09We saw user comments during the bank
attacks, you know comments and articles -
131:09 - 131:13of our users saying things like, if
my bank can't handle a dos attack, -
131:13 - 131:16how do I trust that they
know how to secure my money? -
131:16 - 131:20They're completely unrelated things but
the average person doesn't understand that -
131:20 - 131:24and so there can be a significant PR impact
to your organization if it goes down even -
131:24 - 131:29if it doesn't directly affect
them like with banking yes, -
131:29 - 131:32some people couldn't do online banking
for a day, ATMs were still fine. -
131:32 - 131:40Like there was no actual real risk there but I
also want to point out that I think the going -
131:40 - 131:43down is actually a viable option.
-
131:43 - 131:48We're all talking about it as if
the ultimate goal is to stay online, -
131:48 - 131:52but economically that might
not make sense for you and even -
131:52 - 131:54from a PR standpoint it may not make sense.
-
131:54 - 131:59If you're a human rights organization and
you can get an article in New York Times -
131:59 - 132:02about how you went down due to a dos attack,
-
132:02 - 132:04that's the best publicity
you can possibly imagine. -
132:04 - 132:09Nobody is thinking about human
rights until they see this article. -
132:09 - 132:16So, it's something to keep in mind, staying up
at all costs isn't necessarily the end goal. -
132:16 - 132:17>> Brian: Yeah, Danny.
-
132:17 - 132:21>> Danny: So I was going to add a little
bit to both of what they said actually, -
132:21 - 132:24and to Vanda's question, how
do sort of get ahead of these. -
132:24 - 132:27One of the comments that I made
earlier is somewhere between 80% -
132:27 - 132:31and 85% of IT securities span
goes toward regulatory compliance. -
132:31 - 132:36Things you have to do just to check boxes
like these fire suppression systems right, -
132:36 - 132:42and this is the sort of thing where most of the
traditional controls that are on our network, -
132:42 - 132:48the 100s and 100s that we have are about keeping
private information private and more and more -
132:48 - 132:50so many organizations, particularly
for internet facing services, -
132:50 - 132:54the availability of those services,
as opposed to just the confidentiality -
132:54 - 132:58of the data contained therein
is more and more of an issue -
132:58 - 133:02and so making sure you understand
that, to Miguel's point. -
133:02 - 133:07Risk management 101, basic business resilience
says take the asset, take what one minute -
133:07 - 133:14of downtime with that asset may cost you,
talk about how long a particular outage may be -
133:14 - 133:17and then you come up with
your single lost expectancy -
133:17 - 133:19and then take how many times this
may occur in a year something known -
133:19 - 133:25as annualize loss expectancy and you
multiply annualize rate of occurance -
133:25 - 133:27with single loss expectancy
and you know in a year, -
133:27 - 133:30this much downtime could cost you
this much in your organization. -
133:30 - 133:34And if you don't do that, and then say okay
what are we willing to invest in proactively -
133:34 - 133:40to get residual risk to some level
that we [inaudible] or go buy insurance -
133:40 - 133:42or ignore it and hope that it doesn't happen.
-
133:42 - 133:44And so you really need to think about this.
-
133:44 - 133:49Actually, I'll reference again the
internet security lines documents. -
133:49 - 133:53It's a little hefty but it's a really great
read for folks asking just that question. -
133:53 - 133:59It's a CFO's guide to cyber risk and it sort
of talks about some of these sorts of things. -
133:59 - 134:04I definitely recommend that you have a
look at that and try to get ahead of it. -
134:04 - 134:06So, I'm done now so--
-
134:06 - 134:08>> Brian: Okay do we have other
questions from inside the room? -
134:08 - 134:10Please, okay.
-
134:10 - 134:18>> You were talking about the PR aspect of
it and I took Jill's comment to heart earlier -
134:18 - 134:22about she doesn't think it's
a good idea and we know -
134:22 - 134:27that Pirate Bay went anonymous
[inaudible] the whole Pirate Bay came -
134:27 - 134:33out against it saying they were for free
speech and this was against it and I wonder -
134:33 - 134:40about how much embarrassment and the moral
argument and basically if you've got governments -
134:40 - 134:43who are doing it, can there be kind
of treaties between governments -
134:43 - 134:46that say this is not acceptable behavior.
-
134:46 - 134:50And in the activist world,
also the same kind of thing -
134:50 - 134:57so [inaudible] technical solutions
are where social solutions? -
134:57 - 135:01>> Jillian: Sure so I'll just give my quick
two cents because I'm actually more curious -
135:01 - 135:03to hear others responses to this.
-
135:03 - 135:08So using our example of Mordor and not getting
into real life, let's say that the governor -
135:08 - 135:12of Mordor was partly behind
the attacks against Genovia. -
135:12 - 135:17And so in cases like that,
it's really difficult. -
135:17 - 135:21I'm assuming that Mordor also
prosecutes citizens for hacking -
135:21 - 135:27and for their own DDoS perpitrations and
so it's really difficult to look at that -
135:27 - 135:31and say that Mordor has any
moral ground to stand -
135:31 - 135:34on when it does prosecute its own
citizens for being behind those attacks. -
135:34 - 135:37And I think that we have seen,
I'm sure you're aware of them, -
135:37 - 135:39real life examples where this exists.
-
135:39 - 135:42Where you know governments are doing one thing
with one hand and something with the other. -
135:42 - 135:50But to the point about [inaudible] example
is a great one and I agreed with them -
135:50 - 135:53and I think John Perry Barlow one of the
founders of [inaudible] said the same thing -
135:53 - 135:57that DDoS attacks are essentially
an attack on free expression. -
135:57 - 136:00I do agree with that.
-
136:00 - 136:05Like I said I think that there are some
circumstances where it's much more difficult -
136:05 - 136:09to condemn and those are circumstances
where you're up against a government -
136:09 - 136:15that is stifling its own citizens free
expression and so you're getting into sort -
136:15 - 136:21of irregular warfare, online warfare in those
cases, but generally speaking I do think -
136:21 - 136:26that it would be a lot easier if
we all viewed this as something -
136:26 - 136:28that was not morally acceptable
in terms of free expression. -
136:28 - 136:32It would certainly be a lot easier
to go after the actual bad guys. -
136:32 - 136:34>> Brian: Others, Jeff?
-
136:34 - 136:39>> Jeff: I would say I think that
there are things that can be improved -
136:39 - 136:43through international cooperation,
potentially international treaties. -
136:43 - 136:47There's a pretty healthy debate over
whether that's even possible and enforceable -
136:47 - 136:51and I think we at least have to try.
-
136:51 - 136:55Maybe some of that will filter down
into day-to-day conduct with people, -
136:55 - 136:59but people still commit crimes all
the time even though they're illegal -
136:59 - 137:05so I think there's a limitation to how far
that will go to stop the groups that think -
137:05 - 137:08that they're above the law or independent of law
-
137:08 - 137:11or have a separate obligation
that's different to it. -
137:11 - 137:16But I think you will see more
effort in the future to try -
137:16 - 137:23out some negotiated agreements remains to
be seen if they're actually verifiable. -
137:23 - 137:25>> Brian: We have an interesting
question from online. -
137:25 - 137:27I know we've got another
couple from in the room. -
137:27 - 137:29This one is from Mikey.
-
137:29 - 137:37What about a global simulation of cyber event
with a goal of beginning to build a global, -
137:37 - 137:40who can I call for immediate
help type mechanism? -
137:40 - 137:46I know that in certain countries table
top exercises take place with a number -
137:46 - 137:50of different participants that create
scenarios, what about this idea -
137:50 - 137:53of a global simulated cyber event?
-
137:53 - 137:55Is the feasible, would that be helpful?
-
137:55 - 137:59
-
137:59 - 138:01Ram-- oh sorry, Danny.
-
138:01 - 138:11>> Ram: I was just going to; I think
it was Miguel that quoted Mike Tyson. -
138:11 - 138:19All the simulations are great but reality is
often very different so, we'd have to think -
138:19 - 138:22about whether the simulation
is actually helpful. -
138:22 - 138:25Certainly it helps to get people to be aware
-
138:25 - 138:29of who they should be contacting
and who to work with. -
138:29 - 138:34But the real life scenario is
probably going to be fairly different. -
138:34 - 138:36>> Brian: Fair enough, Danny.
-
138:36 - 138:38>> Danny: Yeah this is working now.
-
138:38 - 138:43I would just add there are some multinational
simulations today, everything from cyber storm -
138:43 - 138:47to you name it, lots of national
level exercises, -
138:47 - 138:50international exercises that sort of thing.
-
138:50 - 138:54I think from a global scale
perspective, we have those every day, -
138:54 - 138:57[Laughter] so I'm not sure we actually need one.
-
138:57 - 139:03Certainly we're on the receiving
end of a lot of love and so I think -
139:03 - 139:17that exercising [audio issue] and
understanding those sorts of things, -
139:17 - 139:22but [audio issue] final turn of attack vectors.
-
139:22 - 139:25>> Brian: Okay in the room, I
think we have at least 3 more. -
139:25 - 139:28Okay come on up to the mic-- oh
is that one working now Joley? -
139:28 - 139:29>> Joley: No.
-
139:29 - 139:31>> Brian: Okay come on up to the mic please
-
139:31 - 139:33and if you'd introduce yourself
before the question please. -
139:33 - 139:41>> My name is Anthony Bargese [phonetic] and
I'm from John J College of Criminal Justice. -
139:41 - 139:48You guys covered some of the parties that
DDoS and users and also the government, -
139:48 - 139:54and also the providers and how
to be responsible and proactive. -
139:54 - 140:00But what about software vendors or some of
the vendors that are putting their products -
140:00 - 140:06out there with all these security holes
and that's where it starts and ends -
140:06 - 140:08with the NS providers, the ISP providers
-
140:08 - 140:18who sometimes host these command
control servers for these DDoS attack. -
140:18 - 140:21Should there be a change
of mentality on their side? -
140:21 - 140:29I know that Google does something that's
called bug bounties; they offer you money -
140:29 - 140:32if you find a bug on their software.
-
140:32 - 140:39Should this be applied across the
board for all the software vendors -
140:39 - 140:41and of these providers of products?
-
140:41 - 140:43>> Brian: [inaudible]
-
140:43 - 140:47>> Damian: I guess I have to start.
-
140:47 - 140:57So we do find-- what he was referring to is
Google has a program where we actually pay -
140:57 - 141:03for people to find bugs in our
products so for security critical bugs. -
141:03 - 141:08So we found that there's a lot of college
kids or independent security researchers -
141:08 - 141:12who are very interested in
looking for security holes -
141:12 - 141:19and when they previously basically had no
option but they could give it to us privately, -
141:19 - 141:24hope that we'd fix it or to
whatever vendor of the software was. -
141:24 - 141:28It could be Microsoft or Adobe,
and hope that they would fix it, -
141:28 - 141:34but then if the company could just
take no action and they could just wait -
141:34 - 141:38and let this vulnerability remain
and eventually this kid might say, -
141:38 - 141:42the security researcher would
say why am I waiting on this? -
141:42 - 141:46Everyone is vulnerable to this thing
and they would publish this exploit -
141:46 - 141:51and then you could see lots
of attacks targeting that. -
141:51 - 141:58So what Google has done is basically start
offering money for bugs to compensate their time -
141:58 - 142:04in finding them so, if you compromise, if
you find a vulnerability in Google Chrome, -
142:04 - 142:10the web browser, we'll pay you for information
on that vulnerability with the agreement -
142:10 - 142:13that you're going to keep it quiet until
we fix it which could take a few days. -
142:13 - 142:22And that way we're able to protect everyone
and also compensate the security researcher. -
142:22 - 142:25>> Brian: Interesting, Miguel.
-
142:25 - 142:29>> Miguel: The thing that kind of complicates
this a little bit also is that there is a lot -
142:29 - 142:36of the internet runs on open source software
which is it gets a little bit more difficult -
142:36 - 142:40to be able to put these mechanisms in place.
-
142:40 - 142:47With the recent bank attacks,
we saw vulnerabilities exploited -
142:47 - 142:51with open source content management
systems that are widely deployed -
142:51 - 142:55like a [inaudible] etcetera at word press.
-
142:55 - 143:02These are open source software that is
out there that is used significantly -
143:02 - 143:05and so it gets a little bit harder.
-
143:05 - 143:11Unfortunately it's difficult for operators
necessarily to control the content that is -
143:11 - 143:18on their system, especially the shared hosting
operators etcetera and it's hard to push people -
143:18 - 143:24to update their software and as for
software developers, as much as they'll try -
143:24 - 143:29to make things as secure as they can, there's
always going to be some kind of a bug, -
143:29 - 143:37you can't get it all and it's the fact that
there's so much open source software out there, -
143:37 - 143:41it's not like you can point a
figure and you are responsible. -
143:41 - 143:43It's quite difficult to do.
-
143:43 - 143:45>> Brian: Yeah, Ram.
-
143:45 - 143:46
-
143:46 - 143:53>> Ram: You know one thing that software
manufacturers and the developers of software, -
143:53 - 143:59some of them have to start thinking about
and changing their mindset is due to come -
143:59 - 144:04to the understanding that many of the devices
-
144:04 - 144:09on which the software is running are
always on and they're always online. -
144:09 - 144:15There's still a lot of software that
does not incorporate automatic updating -
144:15 - 144:18and regular downloads of patches.
-
144:18 - 144:24That should be the baseline, that should be
the very fundamental thing and that's the kind -
144:24 - 144:29of thing that ought to be taught in schools
for folks learning how to write code. -
144:29 - 144:35It's not enough to just learn to do the
code, but to have that mechanism in there. -
144:35 - 144:38It ought to be trivial and
it ought to become regular. -
144:38 - 144:45Unfortunately, it's more the exception than
the norm today and I think if you'd get -
144:45 - 144:51to that point that will solve some
part of the problem significantly. -
144:51 - 144:52>> Brian: Danny.
-
144:52 - 144:56>> Danny: So yeah I think I would be
remiss in not mentioning Versign's, -
144:56 - 145:00I Defense Vulnerability Contribution Program
as well and we do something very similar -
145:00 - 145:06for any vulnerability that fall within a very
broad spectrum that are multivendor and try -
145:06 - 145:10and do responsible disclosure
associated with those. -
145:10 - 145:15To the topic in general, I think bounties are
certainly valuable things in general for people -
145:15 - 145:21that want to apply exploits in a positive way
and contribute in a positive way to industry. -
145:21 - 145:25I think anybody that's paying
attention certainly realizes a lot -
145:25 - 145:30of the commercial vendors while they're
always going to be a long way to go, -
145:30 - 145:34are leaps and bounds from where
we were with worm able systems -
145:34 - 145:40or even patch management systems of that
we were vulnerable of a few years ago. -
145:40 - 145:43And so I think Microsoft is an
example, but lots of others as well, -
145:43 - 145:50and so I think we are making progress
but, secure coding practices, application, -
145:50 - 145:53software security, those things and all
the fundamentals are certainly thing -
145:53 - 145:56that we're going to have to
continue to do a much better job at. -
145:56 - 145:59>> Brian: Thank you, I know we've
got two more questions in the room. -
145:59 - 146:06Go here first and then please identify yourself.
-
146:06 - 146:08>> [Inaudible] New York Technology Council.
-
146:08 - 146:10I was wondering if you could
put this perspective. -
146:10 - 146:17Are DDoS attacks the one thing we should be
focusing, are there other like SYN floods, -
146:17 - 146:24other attacks that are similar in nature that
there should be conferences on and keep you -
146:24 - 146:30up at night or is this where
most of your energy goes? -
146:30 - 146:38>> Ram: Yeah this, the single biggest
thing that keeps me up at night. -
146:38 - 146:48Lots of other things end up becoming part
of this much larger stream and it used to be -
146:48 - 146:53that it was a dos attack and then it became a
DDoS attack and then you had command and control -
146:53 - 146:59and then you have crowd sourced, it's evolving,
it's not the same beast as was many years ago. -
146:59 - 147:04So the definitions from multiple
years ago, is not what it is today. -
147:04 - 147:12What really scares me about this is the
asymmetric nature of the ability for an attacker -
147:12 - 147:18to mount a significant attack in a very
short amount of time and keep it sustained -
147:18 - 147:23for a long period of time and really
drain you on the responding side -
147:23 - 147:28of your critical attention resources.
-
147:28 - 147:33That really worries me and I think you
look at SYN floods or any of those things; -
147:33 - 147:39those kind of are subsumed into
the larger scale of this phenomenon -
147:39 - 147:47that left unchecked I think has
a significant negative impact. -
147:47 - 147:48>> Brian: Anyone else?
-
147:48 - 147:49Yes Jillian.
-
147:49 - 147:53>> Jillian: Yeah just I actually
agree with what Ram just said. -
147:53 - 147:58I would add to that to say just say,
and if you're thinking about the scale, -
147:58 - 148:01the most recent stat that I
have off the top of my head is -
148:01 - 148:08that in 2010 Arbor Networks was detecting
roughly 1300 attacks per day and I guessing -
148:08 - 148:13that it's much higher than that, the real
number and so I do think this is a big concern -
148:13 - 148:15because of the impact that it has.
-
148:15 - 148:22I mean there are certainly plenty of other
types of attacks but the sort of inability -
148:22 - 148:28to protect oneself, coupled with everything that
Ram just said, makes this a much bigger issue -
148:28 - 148:33than some of the other things
that we're looking at. -
148:33 - 148:38>> Danny: I was going to add that DDoS
the two primary vectors volumetric, -
148:38 - 148:41in other words attacks are getting
bigger, more frequent, longer duration, -
148:41 - 148:47so forth but the sophistication of those as well
where the right query string could drive a lot -
148:47 - 148:50of backend transactions on the right
piece of [inaudible] those sorts of things -
148:50 - 148:55from a denial service perspective
is the availability side -
148:55 - 148:57of the information security [inaudible].
-
148:57 - 149:03The other two sides are the integrity
of the information on the infrastructure -
149:03 - 149:08and the confidentiality and
I think certainly for anyone -
149:08 - 149:13in the information security field
persistent attackers, advance attackers, -
149:13 - 149:19even general attackers and mobile devices
and bring your own device and sort -
149:19 - 149:24of a squishy perimeter and soft
under belly inside an enterprise -
149:24 - 149:25or at Starbucks or whatever.
-
149:25 - 149:29All those things for information leakage
and so forth certainly is something -
149:29 - 149:33that you should be concerned with as well
but the availability side for a lot of folks -
149:33 - 149:37that are in the network services business is
a very big piece of that but also the sort -
149:37 - 149:42of more concerted attackers that might want
to control the right keyboard as opposed -
149:42 - 149:47to simply disabling is also something
that has some pretty far reaching effects. -
149:47 - 149:48>> Brian: Damian.
-
149:48 - 149:51>> Damian: So I wanted to say
from a defender standpoint, -
149:51 - 149:57yeah DDoS is sort of the largest concern
right now but from a global view, -
149:57 - 150:02I think dos attacks are really a symptom of a
larger problem which is that there are a lot -
150:02 - 150:04of infected machines on the internet.
-
150:04 - 150:09I think at one point I heard an ISP say is they
estimated 10% of their customers are infected. -
150:09 - 150:15So when you take that into account, if we could
actually stop having so many infected machines -
150:15 - 150:18on the internet or so many
vulnerable machines at least, -
150:18 - 150:23then that would largely reduce
the scope of these dos attacks -
150:23 - 150:26and for that we basically
need what Ram was saying -
150:26 - 150:29of automatic updates have
to be the normal thing. -
150:29 - 150:33You should never have any client side
software that doesn't automatically update. -
150:33 - 150:34Brian: Thanks, Miguel.
-
150:34 - 150:41Miguel: Just adding to one thing that Damian
is saying, I absolutely agree with all of that -
150:41 - 150:47in terms of automatic updates and especially for
end user computers which form a significant part -
150:47 - 150:50of the botnet paradigm these days.
-
150:50 - 150:54When it comes to enterprises, it
gets a little bit more difficult. -
150:54 - 151:06I think as much as I would love to say
automatically update my production software, -
151:06 - 151:11unfortunately, especially for a large-scale
operators, they're running infrastructure -
151:11 - 151:15that services a lot of people, you
don't really know what's going to happen -
151:15 - 151:19when you make an update potentially and
that has to be very carefully controlled, -
151:19 - 151:20it's got to be regression tested.
-
151:20 - 151:27It's got to go through extensive QA and are we
ever going to get to a point where it's going -
151:27 - 151:34to be easy for enterprises to be
able to push out security fixes? -
151:34 - 151:40The idealist in me says I hope so, but I'm
skeptical that that's going to be the case -
151:40 - 151:47because the day-to-day aspects of ensuring
business operations, continuity and making sure -
151:47 - 151:52that assets are available are most likely for
the foreseeable future, going to trump the need -
151:52 - 151:55to push out updates as quickly as possible.
-
151:55 - 151:58Brian: Actually we do have two more questions.
-
151:58 - 152:01This gentleman here first and we do
have time for two more questions. -
152:01 - 152:06So will you come up please?
-
152:06 - 152:07>> I am [inaudible].
-
152:07 - 152:10I run a software company called QCD Systems.
-
152:10 - 152:13So the question is actually
very similar to the previous one -
152:13 - 152:15but I'll go a little more in detail.
-
152:15 - 152:21So when it comes to security, [inaudible]
security off of just data itself. -
152:21 - 152:25So there's an attack to intellectual
property and then we've heard of cases -
152:25 - 152:28that intellectual property got
stolen [inaudible] of that. -
152:28 - 152:32Movie companies always have their trailers
leaked and pieces of movies leaked, -
152:32 - 152:35so that's one kind of attack out there.
-
152:35 - 152:38Then there's other things;
like the phishing kind of thing -
152:38 - 152:39like [inaudible] scams and all that.
-
152:39 - 152:43I'm talking about things that
effect users and companies. -
152:43 - 152:50And then there's also the risk that your
bank account may have been compromised, -
152:50 - 152:53your passwords might have been
stolen or is easy to guess. -
152:53 - 152:58So in the scheme of all these different things,
where will you place the denial of service -
152:58 - 153:02for a company or for a consumer because
they have plenty of things to deal -
153:02 - 153:05with right now when it comes to security?
-
153:05 - 153:11So I was just trying to get a perspective
on where this distributed denial service, -
153:11 - 153:16where it fits into the larger scheme of things
and how relevant it is and the other part is -
153:16 - 153:19where do you see things going
let's say five years from now? -
153:19 - 153:23Is this going to be the single biggest thing
to worry about or do we have other things also -
153:23 - 153:26that we should be concerned about?
-
153:26 - 153:27
-
153:27 - 153:29>> Brian: Thanks.
-
153:29 - 153:34>> Danny: I would just say that you
know for your organization it's going -
153:29 - 153:29Danny.
-
153:34 - 153:36to be specific to your organization.
-
153:36 - 153:38You're going to say here's our
risk tolerance for these things, -
153:38 - 153:43for these internet facing properties,
this information security or data privacy -
153:43 - 153:47or data retention, or digital rights management,
whatever it is you're concerned with. -
153:47 - 153:51I don't think that there's a one size fits
all, I think it's all about risk management -
153:51 - 153:53for your organization because
if you don't have a lot -
153:53 - 153:56of internet facing services,
it may not be a problem. -
153:56 - 153:59More than likely you have some things today.
-
153:59 - 154:01You wouldn't be here if you weren't
relying on the internet in some way -
154:01 - 154:03so what does that mean to your business?
-
154:03 - 154:07As opposed to some piece of information
from either your personal bank records -
154:07 - 154:12or your corporate information being actually
traded to the wrong person what would that mean? -
154:12 - 154:17So I think it all goes back to what are
the critical assets your organization, -
154:17 - 154:21what enables those and how do
you balance risk to those assets? -
154:21 - 154:22>> Brian: Yeah, Ram.
-
154:22 - 154:29>> Ram: So the way I advise folks or provide
some suggestion is, you really have to think -
154:29 - 154:32about this and look at it as a matrix.
-
154:32 - 154:35You have to think about, which is
further to what Danny is saying, -
154:35 - 154:41you have to worry about confidentiality,
or integrity, or availability and you have -
154:41 - 154:45to figure out which of those
matter more for you. -
154:45 - 154:51You can't have one versus the other, in many
cases you want to have all of the above, -
154:51 - 154:57but you have to decide which of those matter
more for you, and then devote your time, -
154:57 - 155:00effort and resources towards that.
-
155:00 - 155:03But picking just one, just
having great availability, -
155:03 - 155:09DDoS mitigation ensure availability
but if you have a site that is running -
155:09 - 155:12on software has not been updated and is prone
-
155:12 - 155:15to buffer overflow attacks then
all the availability is going -
155:15 - 155:18to be fantastic for you to get hacked.
-
155:18 - 155:23[Laughter] So you have to figure out
where it is on the spectrum and devote it. -
155:23 - 155:31One reality is that no matter what the budget
that is allocated, if you're a corporation, -
155:31 - 155:34if you're an entity, the
budget that is allocated to it, -
155:34 - 155:40it seems that it remains the
same, it suddenly doesn't reduce -
155:40 - 155:44and you simply reallocate the pie depending
-
155:44 - 155:49on what you think your biggest
vulnerability is, your biggest risk is. -
155:49 - 155:50>> Brian: Anybody else, Jeff.
-
155:50 - 155:54>> Jeff: I would just say you know you asked
about what's important to a crump company -
155:54 - 155:56or [inaudible], I mean it totally depends.
-
155:56 - 156:01I think Brian talked about some guy from
Ohio, more likely to have a problem, -
156:01 - 156:04it may be inconvenienced by DDoS because
they can't get to whatever website, -
156:04 - 156:06but they're more likely to
have their computer compromised -
156:06 - 156:08or identity stolen or other activity.
-
156:08 - 156:14That's going to hit them deeper and for a
longer period so it's totally situational. -
156:14 - 156:19In terms of where we going in 5 years,
-
156:19 - 156:24my guess is that we'll see new
nefarious uses for the same old tools. -
156:24 - 156:29There's some new stuff out there but
it's a lot of variations on a theme -
156:29 - 156:35and just find a new creative bad ways
to use them for bad purposes or profit. -
156:35 - 156:40So I think the down service attacks are here to
stay but how they're used will probably morph -
156:40 - 156:45and change and cycle back,
what's old is new again. -
156:45 - 156:46>> Brian: Miguel.
-
156:46 - 156:48>> Miguel: The thing that troubles me a
little bit about the future when it comes -
156:48 - 156:55to DDoS attack is that there is because
it's been in the news a little bit more -
156:55 - 156:59because it's been publicized a little
bit more, you look at what happened -
156:59 - 157:04on the bank attacks lately, there's kind
of a blueprint now that is out there -
157:04 - 157:09that people can potentially follow
to launch these large-scale attacks. -
157:09 - 157:14You've got what happened with the banks
recently it's at least at a high level, -
157:14 - 157:22its public knowledge how it was sort of done
from a high level, that information is out there -
157:22 - 157:26and those attacks kind of
proved yes, it's possible. -
157:26 - 157:31They provide a blueprint for people to
follow for doing it again and the fact -
157:31 - 157:35that that was done scares the heck out of me.
-
157:35 - 157:38>> Brian: Thank you and we have one
final question from the room, please. -
157:38 - 157:41[Pause]
-
157:41 - 157:46>> Hi, it's Lucas from [inaudible].
-
157:46 - 157:51Just following up similarly to the previous
question, based on the trends that you've seen -
157:51 - 157:56to date, where do you see these attacks heading
both from like an attacker perspective as well -
157:56 - 157:57as from a mitigation perspective?
-
157:57 - 158:02Do you see one side winning
the cat versus mouse game? -
158:02 - 158:03
-
158:03 - 158:05>> Brian: Great question, Damian?
-
158:05 - 158:11>> Damian: Yeah so attacks are basically growing
exponentially I think if you look at most -
158:11 - 158:16of the data on this you'll see that the size
of the attacks roughly doubles every year. -
158:16 - 158:22I have graphs that track this back
like 8 years and it's kind of scary -
158:22 - 158:26that it's actually continuing, that exponential
growth but I think it's important to realize -
158:26 - 158:31that that's just the internet is
growing exponentially as the consumers, -
158:31 - 158:35as the end users, bandwidth
increases, their home, -
158:35 - 158:41the website bandwidth is also increasing so,
you can kind of keep up but I think that a lot -
158:41 - 158:47of what we're going to run into is a very small
website, you know especially the types of sites -
158:47 - 158:51that Jillian is worried about are
simply too small to possibly survive. -
158:51 - 158:56So they're going to be forced to combined
their resources and pool with others -
158:56 - 159:00so what I expect is probably going to happen
over the next five years is we're going -
159:00 - 159:05to start seeing organizations
consolidate into larger and larger pools -
159:05 - 159:08until eventually we're going to have
only like maybe five organizations -
159:08 - 159:12that offer DDoS mitigation
in the cloud as a service. -
159:12 - 159:16It's just my guess of where the world is headed.
-
159:16 - 159:16>> Brian: Ram.
-
159:16 - 159:23>> Ram: And my fear is that we get at that
point and then they get too big to fail. -
159:23 - 159:26>> Brian: Well, with that thought,
we're going to bring this to a close. -
159:26 - 159:27[Laughter] Well done.
-
159:27 - 159:32Fear and loathing in New York.
-
159:32 - 159:37Public Interest Registry of the New York
Technology Council, Internet Society -
159:37 - 159:39and the Internet Society's New York Chapter want
-
159:39 - 159:42to offer our sincere thanks
to the panelist today. -
159:42 - 159:45Thank you so much for your time, your dedication
-
159:45 - 159:50to helping us understand this really critical
issue and also to thank the audience here -
159:50 - 159:52and the audience online for following along.
-
159:52 - 159:57We hope that today's event has been
helpful and that the participants come away -
159:57 - 160:02with a greater appreciation of the scope
of this problem, steps that should be taken -
160:02 - 160:08to mitigate DDoS attacks, and the potential
for significant unintended consequences. -
160:08 - 160:11DDoS is a serious issue in
today's interconnect world, -
160:11 - 160:15one that is not just going
to fade away as we've heard. -
160:15 - 160:20Fortunately there are resources available to
help us confront the myriad of challenges. -
160:20 - 160:25I would like to specifically thank Joley
McFee [phonetic] from iSoc, New York, -
160:25 - 160:30Eric Grimmelman [phonetic] from New York Tech
and Paul Brigner [phonetic] from iSoc here -
160:30 - 160:33for helping us make this happen in a real sense.
-
160:33 - 160:40Along those lines, we at PIR intend to make
the recording of this event available online -
160:40 - 160:45at our website and our social media sites
and push that out and we're also going -
160:45 - 160:49to post additional background
materials and encourage anyone -
160:49 - 160:52to recommend other helpful tools and information
-
160:52 - 160:54like the CFF Guideline to
keeping your site alive. -
160:54 - 160:57So again thank you to everyone
for joining us today. -
160:57 - 160:59Thank you so much.
-
160:59 - 161:01[ Applause ]
-
161:01 -
- Title:
- Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape
- Description:
-
Distributed Denial of Service (DDoS) attacks are an all-too-common reality in today's Internet landscape and are an escalating global problem. Whether a DDoS attack is motivated by criminal intent, like cyber extortion, or is executed as an extreme form of free expression, the resulting service interruptions can have wide-ranging effects. This program will address the motives behind and targets of DDoS attacks. It will also explore the various ways attacks are carried out, as well as mitigation techniques and the risks of "unintended consequences." The goal is to foster a discussion and provide a platform for developing a framework of best practices to mitigate DDoS attacks.
Presented by the Public Interest Registry (PIR), Internet Society's New York Chapter (ISOC-NY) and the New York Technology Council (NYTECH) at the AMA Executive Conference Center NYC on December 5 2012.
Wednesday December 5, 2012, 10:00 AM
MODERATOR
Brian Cute - CEO, Public Interest Registry (PIR)SPEAKERS
Jeff Greene - Senior Policy Counsel, Symantec
Ram Mohan - EVP & Chief Technology Officer, Afilias
Damian Menscher -- Security Engineer, Google
Miguel Ramos - Senior Product Manager, Neustar
Danny McPherson - Chief Security Officer, Verisign
Jillian York - Director for International Freedom of Expression, Electronic Frontier Foundation (EFF)http://www.pir.org/why/security/ddos
- Video Language:
- English
- Duration:
- 02:41:04
![]() |
ISOC-NY edited English subtitles for Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape | |
![]() |
ISOC-NY added a translation | |
![]() |
Amara Bot edited English subtitles for Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape | |
![]() |
Amara Bot added a translation |