Analyzing and Modeling Longitudinal Security Data: Promises and Pitfalls. Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest, and Michel van Eeten

Size: px
Start display at page:

Download "Analyzing and Modeling Longitudinal Security Data: Promises and Pitfalls. Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest, and Michel van Eeten"

Transcription

1 Analyzing and Modeling Longitudinal Security Data: Promises and Pitfalls Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest, and Michel van Eeten

2 What security interventions have a long-term impact on malicious activity?

3 Security Research Vulnerabilities, Defenses, and Measurement ACSAC Vulnerabilities 34 Defenses 13 Measurement

4 Analysis of a Long-term Problem: Spam Nearly 40 year old problem $20B-$50B cost to US companies 1 > 50% of messages sent in Major vector for malicious activity Malware Phishing (Target breach) 1 2 Rao and Reiley. The Economics of Spam 2012 Kaspersky 2015 Q3 Spam Report

5 Spam Interventions Botnet Takedowns Real-time Adaptive Blacklisting Value Chain Interventions

6 Global Data: The Spam Trap 10 Years Data 2 Billion Messages 440 Million Source IPs 659 Autonomous Systems 260 ISPs 80% of Broadband Market 60 Countries OECD and EU

7 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses

8 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical BGP lookup (pyasn) 659 Autonomous Systems

9 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical BGP lookup (pyasn) 659 Autonomous Systems Manual inspection of historical WHOIS Administering Entity

10 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical BGP lookup (pyasn) 260 ISPs 659 Autonomous Systems Manual inspection of historical WHOIS Manual inspection of media reports Administering Entity

11 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical BGP lookup (pyasn) 659 Autonomous Systems Manual inspection of historical WHOIS 260 ISPs Manual inspection of media reports Administering Entity Telegeography GlobalComms Database Quarterly Customers

12 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical MaxMind GeoIP Database Historical BGP lookup (pyasn) 659 Autonomous Systems Manual inspection of historical WHOIS 260 ISPs Manual inspection of media reports Administering Entity Telegeography GlobalComms Database Quarterly Customers 60 Countries

13 Wickedness: A Comparable Metric Wi(t)= Ai(t)/Ci(t) Ai(t): IP Addresses for ISP i at time t Ci(t): Customers for ISP i at time t

14 Global Wickedness

15 Features of Global Wickedness Highly Autoregressive High Variance 800x increase from 1 week to the next (April 2011, Pakistan) 0 to 80% in individual ISPs % to 0.33% Globally Pitfall: Difficult to distinguish significant changes from typical changes.

16 Controlling for Wickedness Risk Factors Demographic Factors GDP Unemployment Education Geographic Factors Regional Clustering ISP Connectivity Topological Features Traffic Dynamics

17 ISP Network Construction

18 ISP Network Construction

19 ISP Network Construction

20 ISP Network Construction

21 A sample of topological measures correlating with wickedness.

22 Traffic Dynamics and Geographic Homogeneity Wicked Traffic Gravity Model of Traffic Flow ri,j = CiCj / di,j2 Ci Regional Clustering Average Regional Wickedness Cj

23 Surprisingly strong correlations throughout time

24 A Simple Model of Wickedness For each ISP i at time t Autoregression Risk Factors Different Qualitative Eras ln(wi,y(t)) = 0,y 3,y ln(wi(t-1)) + ln(ei(t)) + 1,y ln(ri(t-1)) + P (t) + 4,y i 5,y 2,y ln(gi(t-1)) + ln(di(t))

25 Qualitative Changes in Wickedness

26 Identifying Changes in Spam Dynamics For all possible divisions of the data into 1, 2 or 3 eras Fit maximum likelihood estimate (MLE) for i for each era Calculate Akaike Information Criteria (AIC) of the model Select model with the minimum AIC

27 Spam in 3 Eras Era 2 Era 3 Era 1

28 Autoregressive Model: MLE Fits Era 1 Era 2 Era 3 Jan Dec 2010 Dec 2010-Jun 2012 Jun 2012-Dec 2014 log Prev Wickedness log Prev Wicked Traffic log Prev Region Wickedness log GDP per capita Shortest Path Length Variable Weighted Degree R2

29 Botnet Takedowns For each takedown k Bk(t-j) = 1 takedown occurred j weeks ago 0 otherwise { ln(wi,y(t)) = 0,y ln(wi(t-1)) + 1,y ln(ri(t-1)) + ln(ei(t)) + 4,y Pi(t) + k j k,j Bk(t-j) 3,y 5,y 2,y ln(gi(t-1)) + ln(di(t)) +

30 Takedown Effectiveness: Era 1 Botnet Takdown Date 1 Week Change 6 Week Change McColo Nov 11, Mariposa Dec 24, Waledac Mar 5, 2010 NS -3.5 Spamit Oct 1, 2010 NS 6.1 Bredolab/Spamit Oct 29,

31 Takedown Effectiveness: Eras 2 and 3 Botnet Date 1 Week Change 6 Week Change Rustock Mar 19, Coreflood/Rustock April 16, Kelihos Sep 17, Kelihos v2 Apr 1, 2012 NS 30.1 Hermes Jun 24, Grum/Hermes Jul 22, Virut Jan 22,

32 Global vs. Regional Effects Bots are not distributed uniformly. Economics might change between infection and takedown. Bots may migrate after a takedown.

33 Country Takedown Effect

34 Country Takedown Effect

35 Conclusions Comparable metrics establish a uniform measure of the problem Careful analysis of nonlinear, high variance data is needed. Rigorous models can identify meaningful relationships between interventions and their effects. Many factors correlate with spam levels. Takedowns are not always effective. Interventions may have different effects in different regions.

36 Future Work Corroborate results with other data sources. What makes a good takedown? Identify at-risk countries for cyber capacity building.

37 Thank You. Hadi Asghari Drew Levin George Stelle Robert Axelrod Jana Hartman Cari Martinez David Mohr Patrick Gage Kelley I ll take your questions.

Intermediaries and regulation

Intermediaries and regulation Intermediaries and regulation Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. Intermediaries and regulation BME Department of Telecommunications (Híradástechnikai

More information

Exploring the ecosystem of malicious domain registrations in the.eu TLD

Exploring the ecosystem of malicious domain registrations in the.eu TLD Exploring the ecosystem of malicious domain registrations in the.eu TLD Lieven Desmet OWASP BeNeLux Day 2017 Tilburg, NL Lieven.Desmet@cs.kuleuven.be @lieven_desmet Joint research between KU Leuven and

More information

ISE Cyber Security UCITS Index (HUR)

ISE Cyber Security UCITS Index (HUR) ISE Cyber Security UCITS Index (HUR) Why Cybersecurity is important Data breaches have become almost commonplace in the last few years Cybersecurity focuses on protecting computers, networks, programs,

More information

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm 1 Introduction How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, 2015 5:00 pm In this assignment you will investigate the spread of disease on networks. In class

More information

App Economy Market analysis for Economic Development

App Economy Market analysis for Economic Development App Economy Market analysis for Economic Development Mustapha Hamza, ISET Com Director mustapha.hamza@isetcom.tn ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis

More information

Today s Vision Tomorrow s Reality. Brian Beaulieu CEO

Today s Vision Tomorrow s Reality. Brian Beaulieu CEO Canadian Institute of Plumbing and Heating Today s Vision Tomorrow s Reality Brian Beaulieu CEO 215 Forecast Results 2 Duration 215 Forecast Result Accuracy US GDP 18 $16.632 Trillion $16.442 Trillion

More information

IBM Security Systems IBM X-Force 2012 Annual Trend and Risk Report

IBM Security Systems IBM X-Force 2012 Annual Trend and Risk Report IBM Security Systems IBM X-Force 2012 Annual Trend and Risk Report Leslie Horacek X-Force Threat Response Manager horacek@be.ibm.com April 2013 1 X-Force is the foundation for advanced security and threat

More information

No domain left behind

No domain left behind No domain left behind is Let s Encrypt democratizing encryption? M Aertsen 1, M Korzyński 2, G Moura 3 1 National Cyber Security Centre The Netherlands 2 Delft University of Technology The Netherlands

More information

The Vision Council Winds of Change

The Vision Council Winds of Change The Vision Council Winds of Change Brian Beaulieu CEO Preliminary 217 Forecast Results If you heard ITR a year ago 2 Duration Accuracy US GDP (data through Sep) 24 98.5% US Ind. Prod. (Dec) 24 96.8% Eur

More information

The Scenes of Cyber Crime

The Scenes of Cyber Crime Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES The Scenes of Cyber Crime 5 July 2011 Toralv Dirro EMEA Security Strategist, McAfee Labs Low Risk + High Profit -> Crime 500,000 Cyber

More information

Cybersecurity is a Team Sport

Cybersecurity is a Team Sport Cybersecurity is a Team Sport Cyber Security Summit at Loyola Marymount University - October 22 2016 Dr. Robert Pittman, CISM Chief Information Security Officer National Cyber Security Awareness Month

More information

Be certain. MessageLabs Intelligence: May 2006

Be certain. MessageLabs Intelligence: May 2006 Be certain MessageLabs Intelligence: May 2006 Introduction Welcome to the May edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for May 2006 to keep

More information

Automating Security Response based on Internet Reputation

Automating Security Response based on Internet Reputation Add Your Logo here Do not use master Automating Security Response based on Internet Reputation IP and DNS Reputation for the IPS Platform Anthony Supinski Senior Systems Engineer www.h3cnetworks.com www.3com.com

More information

This report is based on sampled data. Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec 28 Feb 1 Mar 8 Apr 12 May 17 Ju

This report is based on sampled data. Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec 28 Feb 1 Mar 8 Apr 12 May 17 Ju 0 - Total Traffic Content View Query This report is based on sampled data. Jun 1, 2009 - Jun 25, 2010 Comparing to: Site 300 Unique Pageviews 300 150 150 0 0 Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec

More information

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense DDoS Attacks Increasing in Size, Frequency & Complexity Arbor Networks WISR XII Largest attack

More information

Get BitDefender Client Security 2 Years 30 PCs software suite ]

Get BitDefender Client Security 2 Years 30 PCs software suite ] Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -

More information

Asia Key Economic and Financial Indicators

Asia Key Economic and Financial Indicators Quarterly Yearly Quarterly Quarterly Month-End Quarter-End Monthly (USD) Monthly Monthly Monthly Monthly Interest Daily GDP GDP per BoP CA IR External Debt Import Trade Unemployment IPI PPI CPI Rates*

More information

Privacy and Proxy Service Provider Accreditation. ICANN58 Working Meeting 11 March 2017

Privacy and Proxy Service Provider Accreditation. ICANN58 Working Meeting 11 March 2017 Privacy and Proxy Service Provider Accreditation ICANN58 Working Meeting 11 March 2017 Agenda 13:45-15:00 15:00-15:15 15:15-16:45 Timeline Check; Policy Document Update; Third- Party Requests Break PSWG

More information

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser Motivation Spam: More than Just a

More information

Smart Protection Network. Raimund Genes, CTO

Smart Protection Network. Raimund Genes, CTO Smart Protection Network Raimund Genes, CTO Overwhelmed by Volume of New Threats New unique samples added to AV-Test's malware repository (2000-2010) 20.000.000 18.000.000 16.000.000 14.000.000 12.000.000

More information

Asia Key Economic and Financial Indicators

Asia Key Economic and Financial Indicators ASEAN Brunei (BN) Cambodia (KH) Indonesia () Laos (LA) Malaysia () Myanmar (MM) Philippines () Singapore () Thailand () Vietnam () East Asia China (CN) Hong Kong (HK) Japan (JP) South Korea (KR) Taiw an

More information

software.sci.utah.edu (Select Visitors)

software.sci.utah.edu (Select Visitors) software.sci.utah.edu (Select Visitors) Web Log Analysis Yearly Report 2002 Report Range: 02/01/2002 00:00:0-12/31/2002 23:59:59 www.webtrends.com Table of Contents Top Visitors...3 Top Visitors Over Time...5

More information

Asia Key Economic and Financial Indicators

Asia Key Economic and Financial Indicators ASEAN Brunei (BN) Cambodia (KH) Indonesia () Laos (LA) Malaysia () Myanmar (MM) Philippines () Singapore () Thailand () Vietnam () East Asia China (CN) Hong Kong (HK) Japan (JP) South Korea (KR) Taiw an

More information

Temporal Correlations between Spam and Phishing Websites

Temporal Correlations between Spam and Phishing Websites Temporal Correlations between Spam and Phishing Websites, Richard Clayton and Henry Stern Center for Research on Computation and Society Harvard University USENIX LEET 09 Boston, MA April 21, 2009 Outline

More information

DMARC Continuing to enable trust between brand owners and receivers

DMARC Continuing to enable trust between brand owners and receivers DMARC Continuing to enable trust between brand owners and receivers February 2014 1 DMARC Defined DMARC stands for: Domain-based Message Authentication, Reporting & Conformance (pronounced dee-mark ) 2

More information

Latin America Emerging Markets FY2015. Value Proposition

Latin America Emerging Markets FY2015. Value Proposition Latin America Emerging Markets FY2015 Value Proposition September 2014 International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the

More information

CIMA Asia. Interactive Timetable Live Online

CIMA Asia. Interactive Timetable Live Online CIMA Asia Interactive Timetable 2017 2018 Live Online Version 1 Information last updated 09 October 2017 Please note: Information and dates in this timetable are subject to change. CIMA Cert BA Course

More information

ERS IT Portfolio Report

ERS IT Portfolio Report Administration and Operations Committee ERS IT Portfolio Report January 21 st, 2014 1 Agenda Information Technology Projects Summary 2013 End of Year Metrics Project Management Office CMERS Website Applications

More information

All King County Summary Report

All King County Summary Report September, 2016 MTD MARKET UPDATE Data Current Through: September, 2016 18,000 16,000 14,000 12,000 10,000 8,000 6,000 4,000 2,000 0 Active, Pending, & Months Supply of Inventory 15,438 14,537 6.6 6.7

More information

Underground economy. Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi. assistant professor CrySyS Lab.

Underground economy. Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi. assistant professor CrySyS Lab. Underground economy Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. Underground economy BME Department of Telecommunications (Híradástechnikai Tanszék) mfelegyhazi(atat)crysys(dot)hu

More information

Nigerian Telecommunications (Services) Sector Report Q3 2016

Nigerian Telecommunications (Services) Sector Report Q3 2016 Nigerian Telecommunications (Services) Sector Report Q3 2016 24 NOVEMBER 2016 Telecommunications Data The telecommunications data used in this report were obtained from the National Bureau of Statistics

More information

Asks for clarification of whether a GOP must communicate to a TOP that a generator is in manual mode (no AVR) during start up or shut down.

Asks for clarification of whether a GOP must communicate to a TOP that a generator is in manual mode (no AVR) during start up or shut down. # Name Duration 1 Project 2011-INT-02 Interpretation of VAR-002 for Constellation Power Gen 185 days Jan Feb Mar Apr May Jun Jul Aug Sep O 2012 2 Start Date for this Plan 0 days 3 A - ASSEMBLE SDT 6 days

More information

Characterisation of the Kelihos.B Botnet

Characterisation of the Kelihos.B Botnet Characterisation of the Kelihos.B Botnet Max Kerkers, José Jair Santanna and Anna Sperotto Design and Analysis of Communication Systems (DACS) University of Twente Enschede, The Netherlands m.kerkers@student.utwente.nl,

More information

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection Advanced Threat Defense Certification Testing Report Symantec Advanced Threat Protection ICSA Labs Advanced Threat Defense December 8, 2015 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,

More information

Mobile Connect Driving Global Economic Growth Through Secure Mobile Identity

Mobile Connect Driving Global Economic Growth Through Secure Mobile Identity Mobile Connect Driving Global Economic Growth Through Secure Mobile Identity Marta Ienco, Regulatory and Policy Director 21 st April 2016 UNCITRAL Colloquium on Legal issue Related to Identity Management

More information

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH DDoS Protector Block Denial of Service attacks within seconds Simon Yu Senior Security Consultant CISSP-ISSAP, MBCS, CEH 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012

More information

Inter-Domain Routing Trends

Inter-Domain Routing Trends Inter-Domain Routing Trends Geoff Huston gih@apnic.net APNIC March 2007 Agenda 1. Some data about the network and BGP over 2006 2. Some observations about the distribution patterns of BGP updates 3. Pointers

More information

Seattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary

Seattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary September, 2016 MTD MARKET UPDATE Data Current Through: September, 2016 (NWMLS Areas: 140, 380, 385, 390,, 701, 705, 710) Summary Active, Pending, & Months Supply of Inventory 5,000 4,500 4,000 3,500 4,091

More information

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence

More information

Traffic Types and Growth in Backbone Networks

Traffic Types and Growth in Backbone Networks Traffic Types and Growth in Backbone Networks Alexandre Gerber, Robert Doverspike AT&T Labs Research Outline Overview of a US carrier inter-city backbone optical network: Services running on ROADMs Breakdown

More information

Seattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary

Seattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary October, 2016 MTD MARKET UPDATE Data Current Through: October, 2016 (NWMLS Areas: 140, 380, 385, 390,, 701, 705, 710) Summary Active, Pending, & Months Supply of Inventory 4,500 4,000 3,500 4,197 4,128

More information

Security Trend of New Computing Era

Security Trend of New Computing Era Security Trend of New Computing Era Presented by Roland Cheung HKCERT Agenda Security Threat Overview Introduction of Botnet Impact of Botnet Fight Back Botnet Security Protection Scheme Security Threat

More information

Seattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary

Seattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary November, 2016 MTD MARKET UPDATE Data Current Through: November, 2016 (NWMLS Areas: 140, 380, 385, 390,, 701, 705, 710) Summary 4,000 3,500 3,000 2,500 2,000 1,500 1,000 500 0 Active, Pending, & Months

More information

INTRODUCING CISCO SECURITY FOR AWS

INTRODUCING CISCO SECURITY FOR AWS SESSION ID: SPO1-T08 INTRODUCING CISCO SECURITY FOR AWS Patrick Crowley CTO Cisco, Stealthwatch Cloud @p_crowley Three Main Points Use VPC Flow logs to make sure nothing is happening behind your back Use

More information

New Concept for Article 36 Networking and Management of the List

New Concept for Article 36 Networking and Management of the List New Concept for Article 36 Networking and Management of the List Kerstin Gross-Helmert, AFSCO 28 th Meeting of the Focal Point Network EFSA, MTG SEAT 00/M08-09 THE PRESENTATION Why a new concept? What

More information

Next Steps for WHOIS Accuracy Global Domains Division. ICANN June 2015

Next Steps for WHOIS Accuracy Global Domains Division. ICANN June 2015 Next Steps for WHOIS Accuracy Global Domains Division ICANN 53 24 June 2015 Agenda: Next Steps for WHOIS Accuracy Reporting System 1 2 3 Introduction and Implementation Approach Pilot Project and Lessons

More information

Advancing the Art of Internet Edge Outage Detection

Advancing the Art of Internet Edge Outage Detection Advancing the Art of Internet Edge Outage Detection ACM Internet Measurement Conference 2018 Philipp Richter MIT / Akamai Ramakrishna Padmanabhan University of Maryland Neil Spring University of Maryland

More information

Kaspersky Security for Microsoft Office 365

Kaspersky Security for Microsoft Office 365 Kaspersky for Business Kaspersky Security for Microsoft Office 365 emails are sent every second. It only takes one to bring down your business. Moving to the cloud? Secure it. With more than 100 million

More information

Telecom Sector Outlook and Spectrum Trading: the Case of Pakistan

Telecom Sector Outlook and Spectrum Trading: the Case of Pakistan Telecom Sector Outlook and Spectrum Trading: the Case of Pakistan Shahbaz Nasir Pakistan Telecommunication Authority ITU Workshop on Economic Aspects of Spectrum Management 21 st 23 rd November 2016 Tehran

More information

New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks

New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks 1 WOULD YOU OPEN THIS ATTACHMENT? Over 90% of targeted emails use malicious file attachments as the payload or infection source

More information

CIMA Asia. Interactive Timetable Live Online

CIMA Asia. Interactive Timetable Live Online CIMA Asia Interactive Timetable 2018 Live Online Information version 8 last updated 04/05/18 Please note information and dates are subject to change. Premium Learning Partner 2018 CIMA Cert BA Course Overview

More information

Tinker & The Primes 2017 Innovating Together

Tinker & The Primes 2017 Innovating Together Tinker & The Primes 2017 Innovating Together Protecting Controlled Unclassified Information Systems and Organizations Larry Findeiss Bid Assistance Coordinator Oklahoma s Procurement Technical Assistance

More information

Service Provider View of Cyber Security. July 2017

Service Provider View of Cyber Security. July 2017 Service Provider View of Cyber Security July 2017 Quick Stats Caribbean and LatAm: 3 rd largest population of Internet Users You Are Here Visualization from the Opte Project of the various routes through

More information

ThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT)

ThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT) ThaiCERT Incident Response & Phishing cases in Thailand By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT) Agenda About ThaiCERT ThaiCERT IR Phishing in Thailand About ThaiCERT Ministry

More information

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last

More information

Routing the Internet in Geoff Huston APNIC March 2007

Routing the Internet in Geoff Huston APNIC March 2007 Routing the Internet in 2006 Geoff Huston APNIC March 2007 IPv4 in 2006 Total Advertised BGP Prefixes BGP Table Growth 210000 200000 190000 BGP FIB Entries 180000 2006 170000 2005 160000 150000 Jan Feb

More information

Imputation for missing observation through Artificial Intelligence. A Heuristic & Machine Learning approach

Imputation for missing observation through Artificial Intelligence. A Heuristic & Machine Learning approach Imputation for missing observation through Artificial Intelligence A Heuristic & Machine Learning approach (Test case with macroeconomic time series from the BIS Data Bank) Byeungchun Kwon Bank for International

More information

Invincea Endpoint Protection Test

Invincea Endpoint Protection Test Invincea Endpoint Protection Test A test commissioned by Invincea and performed by AV-TEST GmbH. Date of the report: May 2 nd, 2016 Executive Summary In April 2016, AV-TEST performed a review of the Invincea

More information

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager CYBER ATTACKS DON T DISCRIMINATE Michael Purcell, Systems Engineer Manager THREAT LANDSCAPE IS HUGE AND ORGANIZED $8 TRILLION Will be cost of fighting cybercrime in 2022 (JuniperResearch) 14.5 BILLION

More information

Trends in traffic and tariffs in Europe

Trends in traffic and tariffs in Europe Trends in traffic and tariffs in Europe Regional Seminar on New Trends in Tariff Policies for CEE Countries & CIS Bratislava, Slovakia 18 20 September, 2001 P. G. TOURE (ITU) pape-gorgui.toure@itu.int

More information

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness Introduction Drowning in data but starving for information. It s a sentiment that resonates with most security analysts. For

More information

BOTNET-GENERATED SPAM

BOTNET-GENERATED SPAM BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio MIT Spam Conference 2009 www.securitycartoon.com 3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 2 1 Botnets: A Global

More information

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector Advanced Threat Defense Certification Testing Report Trend Micro Deep Discovery Inspector ICSA Labs Advanced Threat Defense July 12, 2016 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,

More information

Defending Against Known & Unknown Threats

Defending Against Known & Unknown Threats Defending Against Known & Unknown Threats Jack Walsh, New Initiatives & Mobility Programs Manager Copyright 2016 ICSA Labs Introducing ICSA Labs About ICSA Labs We re known for Providing independent 3

More information

Broadband Rate Design for Public Benefit

Broadband Rate Design for Public Benefit Broadband Rate Design for Public Benefit The transition from service-based rates to loop rates on Chelan PUD s Broadband Network Dec.19, 2016 No action required today Today s Presentation Loop Rates Final

More information

Detecting Botnets Using Cisco NetFlow Protocol

Detecting Botnets Using Cisco NetFlow Protocol Detecting Botnets Using Cisco NetFlow Protocol Royce Clarenz C. Ocampo 1, *, and Gregory G. Cu 2 1 Computer Technology Department, College of Computer Studies, De La Salle University, Manila 2 Software

More information

YTD Check Register CALDWELL ISD Sort by Check Number

YTD Check Register CALDWELL ISD Sort by Check Number YTD Register Sort by Number Page 1 of 120 000144 09-16-2015 00426 SHERRY L EDWARDS 199-00-2159.00-112-600000 D SEP WIRE MISCELLANEOUS 376.00 N 000145 09-16-2015 01442 TEXAS CHILD SUPPOR 199-00-2159.00-107-600000

More information

No domain left behind:

No domain left behind: No domain left behind: is Let s Encrypt democratizing encryption? Maarten Aertsen 1, Maciej Korczyński 2, Giovane C. M. Moura 3, Samaneh Tajalizadehkhoob 2, Jan van den Berg 2 1 National Cyber Security

More information

Japan s Measures against Spam

Japan s Measures against Spam June 22, 2, 2006 Japan s Measures against Spam Yoshichika Imaizumi Telecommunications Bureau, Ministry of Internal Affairs and Communications (MIC), Japan Characteristics of spam in Japan 1.. Media 2004

More information

Economic Outlook. William Strauss Senior Economist and Economic Advisor Federal Reserve Bank of Chicago

Economic Outlook. William Strauss Senior Economist and Economic Advisor Federal Reserve Bank of Chicago Economic Outlook Illinois Public Pension Fund Association Hoffman Estates, IL February 16, 217 William Strauss Senior Economist and Economic Advisor Federal Reserve Bank of Chicago GDP expanded by 1.9%

More information

APNIC Cooperation SIG: Anti-Abuse Community Development

APNIC Cooperation SIG: Anti-Abuse Community Development M3AAWG @ APNIC Cooperation SIG: Anti-Abuse Community Development Jesse Sowell, PhD Special Advisor to M3AAWG; Vice-Chair of Growth and Develop Directing Outreach NANOG Program Committee Cybersecurity Fellow

More information

Jordan Levesque - Keeping your Business Secure

Jordan Levesque - Keeping your Business Secure Jordan Levesque - Keeping your Business Secure Review of PCI Benefits of hosting with RCS File Integrity Monitoring Two Factor Log Aggregation Vulnerability Scanning Configuration Management and Continuous

More information

Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science

Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science 310 Million + Current Domain Names 11 Billion+ Historical Domain Profiles 5 Million+ New Domain Profiles Daily

More information

Security Reputation Metrics for Hosting Providers

Security Reputation Metrics for Hosting Providers Security Reputation Metrics for Hosting Providers @CSET 15 10 Aug. 2015 Arman Noroozian, Maciej Korzcyński, Samaneh Tajalizadehkhoob, Michel van Eeten Reputation Metrics are Hard! to make and Interpret

More information

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take

More information

2

2 May 2016 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index - Current

More information

Port 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks

Port 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks Port 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks Henrique Faulhaber, Board Member Brazilian Internet Steering Committee CGI.br Dr. Cristine Hoepers,

More information

Penetrating the Matrix Justin Z. Smith, William Gui Zupko II, U.S. Census Bureau, Suitland, MD

Penetrating the Matrix Justin Z. Smith, William Gui Zupko II, U.S. Census Bureau, Suitland, MD Penetrating the Matrix Justin Z. Smith, William Gui Zupko II, U.S. Census Bureau, Suitland, MD ABSTRACT While working on a time series modeling problem, we needed to find the row and column that corresponded

More information

Nigerian Telecommunications (Services) Sector Report Q2 2016

Nigerian Telecommunications (Services) Sector Report Q2 2016 Nigerian Telecommunications (Services) Sector Report Q2 2016 01 SEPTEMBER 2016 Telecommunications Data The telecommunications data used in this report were obtained from the National Bureau of Statistics

More information

Houston Economic Overview Presented by Patrick Jankowski, SVP Research Greater Houston Partnership

Houston Economic Overview Presented by Patrick Jankowski, SVP Research Greater Houston Partnership Houston Economic Overview Presented by Patrick Jankowski, SVP Research Greater Houston Partnership Order of the Day Order of the Day Rig count fell 80% Oil prices dropped 75% Energy layoffs spiked Office

More information

2

2 March 2016 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index -

More information

2

2 February 2015 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index

More information

Mobile Search: Techniques and Tactics for Marketers

Mobile Search: Techniques and Tactics for Marketers Mobile Search: Techniques and Tactics for Marketers Follow along using #mobileppc Eli Goodman & Mike Solomon *Note: A copy of this presentation will be sent to all attendees within 2-3 business days Our

More information

Overview of ITU capacity building activities

Overview of ITU capacity building activities Europe Centers of Excellence Steering Committee Meeting Copenhagen, Denmark 12 December 2017 Overview of ITU capacity building activities Mike Nxele Senior Human Capacity Building Officer, Human Capacity

More information

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE 2017 COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE NUMBER OF SECURITY BREACHES IS RISING AND SO IS SPEND Average number of security breaches each year 130 Average

More information

IPv6 Deployment in Africa

IPv6 Deployment in Africa IPv6 Deployment in Africa Adiel A. Akplogan CEO, AfriNIC INET Africa-2009 Spearheading Internet technology and policy development in the African Region The content IPv4 exhaustion Current situation IPv6

More information

IC B01: Internet Security Threat Report: How to Stay Protected

IC B01: Internet Security Threat Report: How to Stay Protected IC B01: Internet Security Threat Report: How to Stay Protected Piero DePaoli Director, Product Marketing IC B01: Internet Security Threat Report: How to Stay Protected 1 Topics 1 Targeted Attacks 2 Spam

More information

The CPA Exam and Requirements. Adapted and modified from material originally created by David Reinus.

The CPA Exam and Requirements. Adapted and modified from material originally created by David Reinus. The CPA Exam and Requirements Adapted and modified from material originally created by David Reinus. An extra $1,024,870 with a CPA license. Education Exam Experience Every state is unique Step 5 Step

More information

Jan Nys GM Cyber Security

Jan Nys GM Cyber Security Reporting On Cyber Risk Resilience With One Single Indicator Jan Nys GM Cyber Security Fri. September 9th 2016 2:30PM - 3:00PM 1 I Did Not Find It Either 2 KBC At A Glance Geographical spread Belgium,

More information

Dashboard. Jan 13, Jan 8, 2012 Comparing to: Site. 12,742 Visits % Bounce Rate. 00:05:26 Avg. Time on Site.

Dashboard. Jan 13, Jan 8, 2012 Comparing to: Site. 12,742 Visits % Bounce Rate. 00:05:26 Avg. Time on Site. Dashboard 3 3 15 15 Jan 17 Feb 18 Mar 22 Apr 23 May 25 Jun 26 Jul 28 Aug 29 Sep 3 Nov 1 Dec 3 Ja Site Usage 12,742 4.3% Bounce Rate 39,496 Pageviews :5:26 Avg. Time on Site 3.1 Pages/Visit 61.73% % New

More information

Is Something Wrong with Texas Home Prices?

Is Something Wrong with Texas Home Prices? Is Something Wrong with Texas Home Prices? Finding Shelter: Affordability Squeeze in a Tight Texas Housing Market Dallas Federal Reserve February 23, 2018 Constrained supply plus strong demand = accelerated

More information

Q3 FY18 Connections Update 13 April 2018

Q3 FY18 Connections Update 13 April 2018 Q3 FY18 Connections Update 13 April 218 Q3 FY18 OVERVIEW > The Q3 period to 31 March 218 was characterised by a continued slowdown in line loss, with strong broadband demand in Chorus UFB zones total fixed

More information

Expanding Cyber Security Management for Critical Infrastructure

Expanding Cyber Security Management for Critical Infrastructure Expanding Cyber Security Management for Critical Infrastructure ISSE Wednesday 15 th November 17, Brussels Dr Andrew Hutchison, Telekom Security andrew.hutchison@t-systems.com OVERVIEW Attack Surface expands

More information

BGP Issues. Geoff Huston

BGP Issues. Geoff Huston BGP Issues Geoff Huston Why measure BGP?! BGP describes the structure of the Internet, and an analysis of the BGP routing table can provide information to help answer the following questions:! What is

More information

WHOIS Accuracy Reporting System (ARS): Phase 2 Cycle 1 Results Webinar 12 January ICANN GDD Operations NORC at the University of Chicago

WHOIS Accuracy Reporting System (ARS): Phase 2 Cycle 1 Results Webinar 12 January ICANN GDD Operations NORC at the University of Chicago WHOIS Accuracy Reporting System (ARS): Phase 2 Cycle 1 Results Webinar 12 January 2016 ICANN GDD Operations NORC at the University of Chicago Webinar Agenda 1 2 3 WHOIS ARS Background Phase 2 Cycle 1:

More information

Federal Water Rights Training: Reservations of Water in Alaska

Federal Water Rights Training: Reservations of Water in Alaska Federal Water Rights Training: Reservations of Water in Alaska David W. Schade, MPA Water Resources Section Chief Kim Sager, MS Reservation of Water Specialist (NRSIII) Facts: 586,412 Square Miles of Land

More information

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY OUTLINE Advanced Threat Landscape (genv) Why is endpoint protection essential? Types of attacks and how to prevent them

More information

Electronic communications in the Czech Republic

Electronic communications in the Czech Republic Electronic communications in the Czech Republic ITSF 2006 Prague, Nov 15, 2006 Page 0 Contents Czech Republic at a glance company profile Course of liberalization Competitive landscape Mobile vs. fixed

More information

Kaspersky Security Network

Kaspersky Security Network The Kaspersky Security Network (KSN) is a complex distributed infrastructure dedicated to intelligently processing cybersecurity-related data streams from millions of voluntary participants around the

More information

INTERPOL For official use only. Fighting with friends

INTERPOL For official use only. Fighting with friends Fighting with friends Transnational Cybercrime Volume of crime Restriction in information sharing Emerging technology & ease of criminal use Legislative harmony So, what does do Analysis and on-site assistance

More information