Analyzing and Modeling Longitudinal Security Data: Promises and Pitfalls. Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest, and Michel van Eeten
|
|
- Madeline Smith
- 5 years ago
- Views:
Transcription
1 Analyzing and Modeling Longitudinal Security Data: Promises and Pitfalls Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest, and Michel van Eeten
2 What security interventions have a long-term impact on malicious activity?
3 Security Research Vulnerabilities, Defenses, and Measurement ACSAC Vulnerabilities 34 Defenses 13 Measurement
4 Analysis of a Long-term Problem: Spam Nearly 40 year old problem $20B-$50B cost to US companies 1 > 50% of messages sent in Major vector for malicious activity Malware Phishing (Target breach) 1 2 Rao and Reiley. The Economics of Spam 2012 Kaspersky 2015 Q3 Spam Report
5 Spam Interventions Botnet Takedowns Real-time Adaptive Blacklisting Value Chain Interventions
6 Global Data: The Spam Trap 10 Years Data 2 Billion Messages 440 Million Source IPs 659 Autonomous Systems 260 ISPs 80% of Broadband Market 60 Countries OECD and EU
7 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses
8 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical BGP lookup (pyasn) 659 Autonomous Systems
9 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical BGP lookup (pyasn) 659 Autonomous Systems Manual inspection of historical WHOIS Administering Entity
10 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical BGP lookup (pyasn) 260 ISPs 659 Autonomous Systems Manual inspection of historical WHOIS Manual inspection of media reports Administering Entity
11 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical BGP lookup (pyasn) 659 Autonomous Systems Manual inspection of historical WHOIS 260 ISPs Manual inspection of media reports Administering Entity Telegeography GlobalComms Database Quarterly Customers
12 Mapping IP Addresses to Autonomous Systems to ISPs 440 million IP addresses Historical MaxMind GeoIP Database Historical BGP lookup (pyasn) 659 Autonomous Systems Manual inspection of historical WHOIS 260 ISPs Manual inspection of media reports Administering Entity Telegeography GlobalComms Database Quarterly Customers 60 Countries
13 Wickedness: A Comparable Metric Wi(t)= Ai(t)/Ci(t) Ai(t): IP Addresses for ISP i at time t Ci(t): Customers for ISP i at time t
14 Global Wickedness
15 Features of Global Wickedness Highly Autoregressive High Variance 800x increase from 1 week to the next (April 2011, Pakistan) 0 to 80% in individual ISPs % to 0.33% Globally Pitfall: Difficult to distinguish significant changes from typical changes.
16 Controlling for Wickedness Risk Factors Demographic Factors GDP Unemployment Education Geographic Factors Regional Clustering ISP Connectivity Topological Features Traffic Dynamics
17 ISP Network Construction
18 ISP Network Construction
19 ISP Network Construction
20 ISP Network Construction
21 A sample of topological measures correlating with wickedness.
22 Traffic Dynamics and Geographic Homogeneity Wicked Traffic Gravity Model of Traffic Flow ri,j = CiCj / di,j2 Ci Regional Clustering Average Regional Wickedness Cj
23 Surprisingly strong correlations throughout time
24 A Simple Model of Wickedness For each ISP i at time t Autoregression Risk Factors Different Qualitative Eras ln(wi,y(t)) = 0,y 3,y ln(wi(t-1)) + ln(ei(t)) + 1,y ln(ri(t-1)) + P (t) + 4,y i 5,y 2,y ln(gi(t-1)) + ln(di(t))
25 Qualitative Changes in Wickedness
26 Identifying Changes in Spam Dynamics For all possible divisions of the data into 1, 2 or 3 eras Fit maximum likelihood estimate (MLE) for i for each era Calculate Akaike Information Criteria (AIC) of the model Select model with the minimum AIC
27 Spam in 3 Eras Era 2 Era 3 Era 1
28 Autoregressive Model: MLE Fits Era 1 Era 2 Era 3 Jan Dec 2010 Dec 2010-Jun 2012 Jun 2012-Dec 2014 log Prev Wickedness log Prev Wicked Traffic log Prev Region Wickedness log GDP per capita Shortest Path Length Variable Weighted Degree R2
29 Botnet Takedowns For each takedown k Bk(t-j) = 1 takedown occurred j weeks ago 0 otherwise { ln(wi,y(t)) = 0,y ln(wi(t-1)) + 1,y ln(ri(t-1)) + ln(ei(t)) + 4,y Pi(t) + k j k,j Bk(t-j) 3,y 5,y 2,y ln(gi(t-1)) + ln(di(t)) +
30 Takedown Effectiveness: Era 1 Botnet Takdown Date 1 Week Change 6 Week Change McColo Nov 11, Mariposa Dec 24, Waledac Mar 5, 2010 NS -3.5 Spamit Oct 1, 2010 NS 6.1 Bredolab/Spamit Oct 29,
31 Takedown Effectiveness: Eras 2 and 3 Botnet Date 1 Week Change 6 Week Change Rustock Mar 19, Coreflood/Rustock April 16, Kelihos Sep 17, Kelihos v2 Apr 1, 2012 NS 30.1 Hermes Jun 24, Grum/Hermes Jul 22, Virut Jan 22,
32 Global vs. Regional Effects Bots are not distributed uniformly. Economics might change between infection and takedown. Bots may migrate after a takedown.
33 Country Takedown Effect
34 Country Takedown Effect
35 Conclusions Comparable metrics establish a uniform measure of the problem Careful analysis of nonlinear, high variance data is needed. Rigorous models can identify meaningful relationships between interventions and their effects. Many factors correlate with spam levels. Takedowns are not always effective. Interventions may have different effects in different regions.
36 Future Work Corroborate results with other data sources. What makes a good takedown? Identify at-risk countries for cyber capacity building.
37 Thank You. Hadi Asghari Drew Levin George Stelle Robert Axelrod Jana Hartman Cari Martinez David Mohr Patrick Gage Kelley I ll take your questions.
Intermediaries and regulation
Intermediaries and regulation Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. Intermediaries and regulation BME Department of Telecommunications (Híradástechnikai
More informationExploring the ecosystem of malicious domain registrations in the.eu TLD
Exploring the ecosystem of malicious domain registrations in the.eu TLD Lieven Desmet OWASP BeNeLux Day 2017 Tilburg, NL Lieven.Desmet@cs.kuleuven.be @lieven_desmet Joint research between KU Leuven and
More informationISE Cyber Security UCITS Index (HUR)
ISE Cyber Security UCITS Index (HUR) Why Cybersecurity is important Data breaches have become almost commonplace in the last few years Cybersecurity focuses on protecting computers, networks, programs,
More informationHow Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm
1 Introduction How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, 2015 5:00 pm In this assignment you will investigate the spread of disease on networks. In class
More informationApp Economy Market analysis for Economic Development
App Economy Market analysis for Economic Development Mustapha Hamza, ISET Com Director mustapha.hamza@isetcom.tn ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis
More informationToday s Vision Tomorrow s Reality. Brian Beaulieu CEO
Canadian Institute of Plumbing and Heating Today s Vision Tomorrow s Reality Brian Beaulieu CEO 215 Forecast Results 2 Duration 215 Forecast Result Accuracy US GDP 18 $16.632 Trillion $16.442 Trillion
More informationIBM Security Systems IBM X-Force 2012 Annual Trend and Risk Report
IBM Security Systems IBM X-Force 2012 Annual Trend and Risk Report Leslie Horacek X-Force Threat Response Manager horacek@be.ibm.com April 2013 1 X-Force is the foundation for advanced security and threat
More informationNo domain left behind
No domain left behind is Let s Encrypt democratizing encryption? M Aertsen 1, M Korzyński 2, G Moura 3 1 National Cyber Security Centre The Netherlands 2 Delft University of Technology The Netherlands
More informationThe Vision Council Winds of Change
The Vision Council Winds of Change Brian Beaulieu CEO Preliminary 217 Forecast Results If you heard ITR a year ago 2 Duration Accuracy US GDP (data through Sep) 24 98.5% US Ind. Prod. (Dec) 24 96.8% Eur
More informationThe Scenes of Cyber Crime
Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES The Scenes of Cyber Crime 5 July 2011 Toralv Dirro EMEA Security Strategist, McAfee Labs Low Risk + High Profit -> Crime 500,000 Cyber
More informationCybersecurity is a Team Sport
Cybersecurity is a Team Sport Cyber Security Summit at Loyola Marymount University - October 22 2016 Dr. Robert Pittman, CISM Chief Information Security Officer National Cyber Security Awareness Month
More informationBe certain. MessageLabs Intelligence: May 2006
Be certain MessageLabs Intelligence: May 2006 Introduction Welcome to the May edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for May 2006 to keep
More informationAutomating Security Response based on Internet Reputation
Add Your Logo here Do not use master Automating Security Response based on Internet Reputation IP and DNS Reputation for the IPS Platform Anthony Supinski Senior Systems Engineer www.h3cnetworks.com www.3com.com
More informationThis report is based on sampled data. Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec 28 Feb 1 Mar 8 Apr 12 May 17 Ju
0 - Total Traffic Content View Query This report is based on sampled data. Jun 1, 2009 - Jun 25, 2010 Comparing to: Site 300 Unique Pageviews 300 150 150 0 0 Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec
More informationIoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense
IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense DDoS Attacks Increasing in Size, Frequency & Complexity Arbor Networks WISR XII Largest attack
More informationGet BitDefender Client Security 2 Years 30 PCs software suite ]
Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -
More informationAsia Key Economic and Financial Indicators
Quarterly Yearly Quarterly Quarterly Month-End Quarter-End Monthly (USD) Monthly Monthly Monthly Monthly Interest Daily GDP GDP per BoP CA IR External Debt Import Trade Unemployment IPI PPI CPI Rates*
More informationPrivacy and Proxy Service Provider Accreditation. ICANN58 Working Meeting 11 March 2017
Privacy and Proxy Service Provider Accreditation ICANN58 Working Meeting 11 March 2017 Agenda 13:45-15:00 15:00-15:15 15:15-16:45 Timeline Check; Policy Document Update; Third- Party Requests Break PSWG
More informationDetecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser Motivation Spam: More than Just a
More informationSmart Protection Network. Raimund Genes, CTO
Smart Protection Network Raimund Genes, CTO Overwhelmed by Volume of New Threats New unique samples added to AV-Test's malware repository (2000-2010) 20.000.000 18.000.000 16.000.000 14.000.000 12.000.000
More informationAsia Key Economic and Financial Indicators
ASEAN Brunei (BN) Cambodia (KH) Indonesia () Laos (LA) Malaysia () Myanmar (MM) Philippines () Singapore () Thailand () Vietnam () East Asia China (CN) Hong Kong (HK) Japan (JP) South Korea (KR) Taiw an
More informationsoftware.sci.utah.edu (Select Visitors)
software.sci.utah.edu (Select Visitors) Web Log Analysis Yearly Report 2002 Report Range: 02/01/2002 00:00:0-12/31/2002 23:59:59 www.webtrends.com Table of Contents Top Visitors...3 Top Visitors Over Time...5
More informationAsia Key Economic and Financial Indicators
ASEAN Brunei (BN) Cambodia (KH) Indonesia () Laos (LA) Malaysia () Myanmar (MM) Philippines () Singapore () Thailand () Vietnam () East Asia China (CN) Hong Kong (HK) Japan (JP) South Korea (KR) Taiw an
More informationTemporal Correlations between Spam and Phishing Websites
Temporal Correlations between Spam and Phishing Websites, Richard Clayton and Henry Stern Center for Research on Computation and Society Harvard University USENIX LEET 09 Boston, MA April 21, 2009 Outline
More informationDMARC Continuing to enable trust between brand owners and receivers
DMARC Continuing to enable trust between brand owners and receivers February 2014 1 DMARC Defined DMARC stands for: Domain-based Message Authentication, Reporting & Conformance (pronounced dee-mark ) 2
More informationLatin America Emerging Markets FY2015. Value Proposition
Latin America Emerging Markets FY2015 Value Proposition September 2014 International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the
More informationCIMA Asia. Interactive Timetable Live Online
CIMA Asia Interactive Timetable 2017 2018 Live Online Version 1 Information last updated 09 October 2017 Please note: Information and dates in this timetable are subject to change. CIMA Cert BA Course
More informationERS IT Portfolio Report
Administration and Operations Committee ERS IT Portfolio Report January 21 st, 2014 1 Agenda Information Technology Projects Summary 2013 End of Year Metrics Project Management Office CMERS Website Applications
More informationAll King County Summary Report
September, 2016 MTD MARKET UPDATE Data Current Through: September, 2016 18,000 16,000 14,000 12,000 10,000 8,000 6,000 4,000 2,000 0 Active, Pending, & Months Supply of Inventory 15,438 14,537 6.6 6.7
More informationUnderground economy. Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi. assistant professor CrySyS Lab.
Underground economy Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. Underground economy BME Department of Telecommunications (Híradástechnikai Tanszék) mfelegyhazi(atat)crysys(dot)hu
More informationNigerian Telecommunications (Services) Sector Report Q3 2016
Nigerian Telecommunications (Services) Sector Report Q3 2016 24 NOVEMBER 2016 Telecommunications Data The telecommunications data used in this report were obtained from the National Bureau of Statistics
More informationAsks for clarification of whether a GOP must communicate to a TOP that a generator is in manual mode (no AVR) during start up or shut down.
# Name Duration 1 Project 2011-INT-02 Interpretation of VAR-002 for Constellation Power Gen 185 days Jan Feb Mar Apr May Jun Jul Aug Sep O 2012 2 Start Date for this Plan 0 days 3 A - ASSEMBLE SDT 6 days
More informationCharacterisation of the Kelihos.B Botnet
Characterisation of the Kelihos.B Botnet Max Kerkers, José Jair Santanna and Anna Sperotto Design and Analysis of Communication Systems (DACS) University of Twente Enschede, The Netherlands m.kerkers@student.utwente.nl,
More informationAdvanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection
Advanced Threat Defense Certification Testing Report Symantec Advanced Threat Protection ICSA Labs Advanced Threat Defense December 8, 2015 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,
More informationMobile Connect Driving Global Economic Growth Through Secure Mobile Identity
Mobile Connect Driving Global Economic Growth Through Secure Mobile Identity Marta Ienco, Regulatory and Policy Director 21 st April 2016 UNCITRAL Colloquium on Legal issue Related to Identity Management
More informationDDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH
DDoS Protector Block Denial of Service attacks within seconds Simon Yu Senior Security Consultant CISSP-ISSAP, MBCS, CEH 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012
More informationInter-Domain Routing Trends
Inter-Domain Routing Trends Geoff Huston gih@apnic.net APNIC March 2007 Agenda 1. Some data about the network and BGP over 2006 2. Some observations about the distribution patterns of BGP updates 3. Pointers
More informationSeattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary
September, 2016 MTD MARKET UPDATE Data Current Through: September, 2016 (NWMLS Areas: 140, 380, 385, 390,, 701, 705, 710) Summary Active, Pending, & Months Supply of Inventory 5,000 4,500 4,000 3,500 4,091
More informationCurrent procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH
Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence
More informationTraffic Types and Growth in Backbone Networks
Traffic Types and Growth in Backbone Networks Alexandre Gerber, Robert Doverspike AT&T Labs Research Outline Overview of a US carrier inter-city backbone optical network: Services running on ROADMs Breakdown
More informationSeattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary
October, 2016 MTD MARKET UPDATE Data Current Through: October, 2016 (NWMLS Areas: 140, 380, 385, 390,, 701, 705, 710) Summary Active, Pending, & Months Supply of Inventory 4,500 4,000 3,500 4,197 4,128
More informationSecurity Trend of New Computing Era
Security Trend of New Computing Era Presented by Roland Cheung HKCERT Agenda Security Threat Overview Introduction of Botnet Impact of Botnet Fight Back Botnet Security Protection Scheme Security Threat
More informationSeattle (NWMLS Areas: 140, 380, 385, 390, 700, 701, 705, 710) Summary
November, 2016 MTD MARKET UPDATE Data Current Through: November, 2016 (NWMLS Areas: 140, 380, 385, 390,, 701, 705, 710) Summary 4,000 3,500 3,000 2,500 2,000 1,500 1,000 500 0 Active, Pending, & Months
More informationINTRODUCING CISCO SECURITY FOR AWS
SESSION ID: SPO1-T08 INTRODUCING CISCO SECURITY FOR AWS Patrick Crowley CTO Cisco, Stealthwatch Cloud @p_crowley Three Main Points Use VPC Flow logs to make sure nothing is happening behind your back Use
More informationNew Concept for Article 36 Networking and Management of the List
New Concept for Article 36 Networking and Management of the List Kerstin Gross-Helmert, AFSCO 28 th Meeting of the Focal Point Network EFSA, MTG SEAT 00/M08-09 THE PRESENTATION Why a new concept? What
More informationNext Steps for WHOIS Accuracy Global Domains Division. ICANN June 2015
Next Steps for WHOIS Accuracy Global Domains Division ICANN 53 24 June 2015 Agenda: Next Steps for WHOIS Accuracy Reporting System 1 2 3 Introduction and Implementation Approach Pilot Project and Lessons
More informationAdvancing the Art of Internet Edge Outage Detection
Advancing the Art of Internet Edge Outage Detection ACM Internet Measurement Conference 2018 Philipp Richter MIT / Akamai Ramakrishna Padmanabhan University of Maryland Neil Spring University of Maryland
More informationKaspersky Security for Microsoft Office 365
Kaspersky for Business Kaspersky Security for Microsoft Office 365 emails are sent every second. It only takes one to bring down your business. Moving to the cloud? Secure it. With more than 100 million
More informationTelecom Sector Outlook and Spectrum Trading: the Case of Pakistan
Telecom Sector Outlook and Spectrum Trading: the Case of Pakistan Shahbaz Nasir Pakistan Telecommunication Authority ITU Workshop on Economic Aspects of Spectrum Management 21 st 23 rd November 2016 Tehran
More informationNew Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks
New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks 1 WOULD YOU OPEN THIS ATTACHMENT? Over 90% of targeted emails use malicious file attachments as the payload or infection source
More informationCIMA Asia. Interactive Timetable Live Online
CIMA Asia Interactive Timetable 2018 Live Online Information version 8 last updated 04/05/18 Please note information and dates are subject to change. Premium Learning Partner 2018 CIMA Cert BA Course Overview
More informationTinker & The Primes 2017 Innovating Together
Tinker & The Primes 2017 Innovating Together Protecting Controlled Unclassified Information Systems and Organizations Larry Findeiss Bid Assistance Coordinator Oklahoma s Procurement Technical Assistance
More informationService Provider View of Cyber Security. July 2017
Service Provider View of Cyber Security July 2017 Quick Stats Caribbean and LatAm: 3 rd largest population of Internet Users You Are Here Visualization from the Opte Project of the various routes through
More informationThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT)
ThaiCERT Incident Response & Phishing cases in Thailand By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT) Agenda About ThaiCERT ThaiCERT IR Phishing in Thailand About ThaiCERT Ministry
More informationWeb Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates
Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last
More informationRouting the Internet in Geoff Huston APNIC March 2007
Routing the Internet in 2006 Geoff Huston APNIC March 2007 IPv4 in 2006 Total Advertised BGP Prefixes BGP Table Growth 210000 200000 190000 BGP FIB Entries 180000 2006 170000 2005 160000 150000 Jan Feb
More informationImputation for missing observation through Artificial Intelligence. A Heuristic & Machine Learning approach
Imputation for missing observation through Artificial Intelligence A Heuristic & Machine Learning approach (Test case with macroeconomic time series from the BIS Data Bank) Byeungchun Kwon Bank for International
More informationInvincea Endpoint Protection Test
Invincea Endpoint Protection Test A test commissioned by Invincea and performed by AV-TEST GmbH. Date of the report: May 2 nd, 2016 Executive Summary In April 2016, AV-TEST performed a review of the Invincea
More informationCYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager
CYBER ATTACKS DON T DISCRIMINATE Michael Purcell, Systems Engineer Manager THREAT LANDSCAPE IS HUGE AND ORGANIZED $8 TRILLION Will be cost of fighting cybercrime in 2022 (JuniperResearch) 14.5 BILLION
More informationTrends in traffic and tariffs in Europe
Trends in traffic and tariffs in Europe Regional Seminar on New Trends in Tariff Policies for CEE Countries & CIS Bratislava, Slovakia 18 20 September, 2001 P. G. TOURE (ITU) pape-gorgui.toure@itu.int
More informationSupercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness
Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness Introduction Drowning in data but starving for information. It s a sentiment that resonates with most security analysts. For
More informationBOTNET-GENERATED SPAM
BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio MIT Spam Conference 2009 www.securitycartoon.com 3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 2 1 Botnets: A Global
More informationAdvanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector
Advanced Threat Defense Certification Testing Report Trend Micro Deep Discovery Inspector ICSA Labs Advanced Threat Defense July 12, 2016 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,
More informationDefending Against Known & Unknown Threats
Defending Against Known & Unknown Threats Jack Walsh, New Initiatives & Mobility Programs Manager Copyright 2016 ICSA Labs Introducing ICSA Labs About ICSA Labs We re known for Providing independent 3
More informationBroadband Rate Design for Public Benefit
Broadband Rate Design for Public Benefit The transition from service-based rates to loop rates on Chelan PUD s Broadband Network Dec.19, 2016 No action required today Today s Presentation Loop Rates Final
More informationDetecting Botnets Using Cisco NetFlow Protocol
Detecting Botnets Using Cisco NetFlow Protocol Royce Clarenz C. Ocampo 1, *, and Gregory G. Cu 2 1 Computer Technology Department, College of Computer Studies, De La Salle University, Manila 2 Software
More informationYTD Check Register CALDWELL ISD Sort by Check Number
YTD Register Sort by Number Page 1 of 120 000144 09-16-2015 00426 SHERRY L EDWARDS 199-00-2159.00-112-600000 D SEP WIRE MISCELLANEOUS 376.00 N 000145 09-16-2015 01442 TEXAS CHILD SUPPOR 199-00-2159.00-107-600000
More informationNo domain left behind:
No domain left behind: is Let s Encrypt democratizing encryption? Maarten Aertsen 1, Maciej Korczyński 2, Giovane C. M. Moura 3, Samaneh Tajalizadehkhoob 2, Jan van den Berg 2 1 National Cyber Security
More informationJapan s Measures against Spam
June 22, 2, 2006 Japan s Measures against Spam Yoshichika Imaizumi Telecommunications Bureau, Ministry of Internal Affairs and Communications (MIC), Japan Characteristics of spam in Japan 1.. Media 2004
More informationEconomic Outlook. William Strauss Senior Economist and Economic Advisor Federal Reserve Bank of Chicago
Economic Outlook Illinois Public Pension Fund Association Hoffman Estates, IL February 16, 217 William Strauss Senior Economist and Economic Advisor Federal Reserve Bank of Chicago GDP expanded by 1.9%
More informationAPNIC Cooperation SIG: Anti-Abuse Community Development
M3AAWG @ APNIC Cooperation SIG: Anti-Abuse Community Development Jesse Sowell, PhD Special Advisor to M3AAWG; Vice-Chair of Growth and Develop Directing Outreach NANOG Program Committee Cybersecurity Fellow
More informationJordan Levesque - Keeping your Business Secure
Jordan Levesque - Keeping your Business Secure Review of PCI Benefits of hosting with RCS File Integrity Monitoring Two Factor Log Aggregation Vulnerability Scanning Configuration Management and Continuous
More informationTechnical Brief: Domain Risk Score Proactively uncover threats using DNS and data science
Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science 310 Million + Current Domain Names 11 Billion+ Historical Domain Profiles 5 Million+ New Domain Profiles Daily
More informationSecurity Reputation Metrics for Hosting Providers
Security Reputation Metrics for Hosting Providers @CSET 15 10 Aug. 2015 Arman Noroozian, Maciej Korzcyński, Samaneh Tajalizadehkhoob, Michel van Eeten Reputation Metrics are Hard! to make and Interpret
More informationFIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?
WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take
More information2
May 2016 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index - Current
More informationPort 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks
Port 25 Management in Brazil: A Multistakeholder Effort to Reduce Direct Delivery from End User Networks Henrique Faulhaber, Board Member Brazilian Internet Steering Committee CGI.br Dr. Cristine Hoepers,
More informationPenetrating the Matrix Justin Z. Smith, William Gui Zupko II, U.S. Census Bureau, Suitland, MD
Penetrating the Matrix Justin Z. Smith, William Gui Zupko II, U.S. Census Bureau, Suitland, MD ABSTRACT While working on a time series modeling problem, we needed to find the row and column that corresponded
More informationNigerian Telecommunications (Services) Sector Report Q2 2016
Nigerian Telecommunications (Services) Sector Report Q2 2016 01 SEPTEMBER 2016 Telecommunications Data The telecommunications data used in this report were obtained from the National Bureau of Statistics
More informationHouston Economic Overview Presented by Patrick Jankowski, SVP Research Greater Houston Partnership
Houston Economic Overview Presented by Patrick Jankowski, SVP Research Greater Houston Partnership Order of the Day Order of the Day Rig count fell 80% Oil prices dropped 75% Energy layoffs spiked Office
More information2
March 2016 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index -
More information2
February 2015 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index
More informationMobile Search: Techniques and Tactics for Marketers
Mobile Search: Techniques and Tactics for Marketers Follow along using #mobileppc Eli Goodman & Mike Solomon *Note: A copy of this presentation will be sent to all attendees within 2-3 business days Our
More informationOverview of ITU capacity building activities
Europe Centers of Excellence Steering Committee Meeting Copenhagen, Denmark 12 December 2017 Overview of ITU capacity building activities Mike Nxele Senior Human Capacity Building Officer, Human Capacity
More informationCOST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE
2017 COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE NUMBER OF SECURITY BREACHES IS RISING AND SO IS SPEND Average number of security breaches each year 130 Average
More informationIPv6 Deployment in Africa
IPv6 Deployment in Africa Adiel A. Akplogan CEO, AfriNIC INET Africa-2009 Spearheading Internet technology and policy development in the African Region The content IPv4 exhaustion Current situation IPv6
More informationIC B01: Internet Security Threat Report: How to Stay Protected
IC B01: Internet Security Threat Report: How to Stay Protected Piero DePaoli Director, Product Marketing IC B01: Internet Security Threat Report: How to Stay Protected 1 Topics 1 Targeted Attacks 2 Spam
More informationThe CPA Exam and Requirements. Adapted and modified from material originally created by David Reinus.
The CPA Exam and Requirements Adapted and modified from material originally created by David Reinus. An extra $1,024,870 with a CPA license. Education Exam Experience Every state is unique Step 5 Step
More informationJan Nys GM Cyber Security
Reporting On Cyber Risk Resilience With One Single Indicator Jan Nys GM Cyber Security Fri. September 9th 2016 2:30PM - 3:00PM 1 I Did Not Find It Either 2 KBC At A Glance Geographical spread Belgium,
More informationDashboard. Jan 13, Jan 8, 2012 Comparing to: Site. 12,742 Visits % Bounce Rate. 00:05:26 Avg. Time on Site.
Dashboard 3 3 15 15 Jan 17 Feb 18 Mar 22 Apr 23 May 25 Jun 26 Jul 28 Aug 29 Sep 3 Nov 1 Dec 3 Ja Site Usage 12,742 4.3% Bounce Rate 39,496 Pageviews :5:26 Avg. Time on Site 3.1 Pages/Visit 61.73% % New
More informationIs Something Wrong with Texas Home Prices?
Is Something Wrong with Texas Home Prices? Finding Shelter: Affordability Squeeze in a Tight Texas Housing Market Dallas Federal Reserve February 23, 2018 Constrained supply plus strong demand = accelerated
More informationQ3 FY18 Connections Update 13 April 2018
Q3 FY18 Connections Update 13 April 218 Q3 FY18 OVERVIEW > The Q3 period to 31 March 218 was characterised by a continued slowdown in line loss, with strong broadband demand in Chorus UFB zones total fixed
More informationExpanding Cyber Security Management for Critical Infrastructure
Expanding Cyber Security Management for Critical Infrastructure ISSE Wednesday 15 th November 17, Brussels Dr Andrew Hutchison, Telekom Security andrew.hutchison@t-systems.com OVERVIEW Attack Surface expands
More informationBGP Issues. Geoff Huston
BGP Issues Geoff Huston Why measure BGP?! BGP describes the structure of the Internet, and an analysis of the BGP routing table can provide information to help answer the following questions:! What is
More informationWHOIS Accuracy Reporting System (ARS): Phase 2 Cycle 1 Results Webinar 12 January ICANN GDD Operations NORC at the University of Chicago
WHOIS Accuracy Reporting System (ARS): Phase 2 Cycle 1 Results Webinar 12 January 2016 ICANN GDD Operations NORC at the University of Chicago Webinar Agenda 1 2 3 WHOIS ARS Background Phase 2 Cycle 1:
More informationFederal Water Rights Training: Reservations of Water in Alaska
Federal Water Rights Training: Reservations of Water in Alaska David W. Schade, MPA Water Resources Section Chief Kim Sager, MS Reservation of Water Specialist (NRSIII) Facts: 586,412 Square Miles of Land
More informationADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY
ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY OUTLINE Advanced Threat Landscape (genv) Why is endpoint protection essential? Types of attacks and how to prevent them
More informationElectronic communications in the Czech Republic
Electronic communications in the Czech Republic ITSF 2006 Prague, Nov 15, 2006 Page 0 Contents Czech Republic at a glance company profile Course of liberalization Competitive landscape Mobile vs. fixed
More informationKaspersky Security Network
The Kaspersky Security Network (KSN) is a complex distributed infrastructure dedicated to intelligently processing cybersecurity-related data streams from millions of voluntary participants around the
More informationINTERPOL For official use only. Fighting with friends
Fighting with friends Transnational Cybercrime Volume of crime Restriction in information sharing Emerging technology & ease of criminal use Legislative harmony So, what does do Analysis and on-site assistance
More information