attacking internet … hannu h. kari

46
National Defence University, www.mpkk.fi professor Hannu H. Kari Page 1/45 Attacking Internet … Hannu H. Kari professor, research director National Defence University

Upload: shayla

Post on 15-Jan-2016

56 views

Category:

Documents


0 download

DESCRIPTION

Attacking Internet … Hannu H. Kari. National Defence University. professor, research director. Technical solutions. Solution alternatives. Legislations. Policies. History. Technology enhancements. ~100+ years. ( www.daimler.co.uk ). ( decorateyourgarage.com ). - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 1/45

Attacking Internet …

Hannu H. Kari

professor, research director

National Defence University

Page 2: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 2/45

Solution alternatives

Technical solutions

Policies

Legislations

Page 3: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 3/45

History

Page 4: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 4/45

Technology enhancements

(www.daimler.co.uk) (decorateyourgarage.com)

(www.macarthurcoal.com.au)

~100+ years

Page 5: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 5/45

Technology enhancements

(www.route79.com) (www2.jsonline.com)

(www.openfire.us) (www.eia.doe.gov)

(www.pennways.com)

(en.wikipedia.org)

Page 6: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 6/45

Technology enhancements

The same thing has happened in Internet in 10…15 years!

Page 7: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 7/45

Doomsday’s prophecy

Page 8: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 8/45

Prediction 28.5.2004:Future does not look very good!

• V. 2003: Increase of garbage– The dramatic increase of viruses and junk mail

• V. 2004: Deterioration of network infrastructure– Attacks on infrastructure has increased

• V. 2005: Manipulation of content– Systematic manipulation of content in Internet

• V. 2006: Internet collapses– People and companies do not tolerate any more the load of garbage– We don’t trust on the content on the net– Malicious attacks on the network infrastructure deteriorate the usability

of Internet Internet will cease to be place to make business We go 10...20 years back before the time of computer networks

Page 9: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 9/45

Internet collapses?

• What I meant by ”Internet collapses by 2006?”– Not a sudden and total breakdown, but

• more and more problems, e.g.:– viruses, junk mail, DoS attacks, network criminals, forged mails/WWW-

pages, utilization of vulnerabilities of commercial programs/operating systems, phishing attacks

• more and more ”protection money”– firewalls, virusprotection SW updates, operating system updates, junk-

mail filters, backup routes/systems, training• unreliability of the network

– works, doesn’t work, works, ...

If your business depends on Internet, you must be prepared

• Risk for major problems is imminent

Page 10: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 10/45

Holmlund: Verkkohyökkäys voi uhata rahaliikennettä

{10.11.2008: MPK 187:n avajaiset} • YETTS: yhteiskunnan elintärkeät toiminnot tulee

turvata kaikissa tilanteissa• Myyrmanni, Jokela & Kauhajoki:

* syrjäytyminen sisäisen turvallisuutemme suurin uhka * monia ei-toivottuja kehitystrendejä

• Tarkoituksellisin verkkohyökkäyksin saatetaan heikentää valtion päätöksentekojärjestelmien tai esimerkiksi rahaliikenteen toimivuutta

• Ikävät tapahtumat tulevat eteemme aina jossain määrin yllätyksenä* varautumisesta ja riskianalyyseista huolimatta.

Asymmetrinen maailma, asymmetriset arvot ja motiivit Kaikki uhkat eivät välttämättä tule ulkoa

Page 11: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 11/45

Scenario ”20xx”

Page 12: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 12/45

Scenario “3/2011”

• Election in a small EU countrya country famous on ICT usage, including electronic voting

• During the election days, a massive DDoS attack is launched against the election system

Electronic voting system is unavailable for several hours

As a back up alternative, people will use ”traditional paper voting system”

No harm done????

Page 13: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 13/45

Scenario “3/2011”

• Report for the Council of Europe: Internet voting in the March 2007 Parliamentary Elections in Estonia

– Internet attacks, such as DDoS (Distributed Denial of Service) attacks, could have hampered the ability to run the e-voting application. An extension of the e-voting period could potentially make it more difficult to launch such attacks.

• ... But will anyone really seriously think electronic voting as a viable alternative for paper voting after this???

• NO! We have lost the game permanently

Page 14: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 14/45

Threats

Page 15: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 15/45

Main threats of Internet

1. We loose our confidence

2. Internet does not work

3. We loose data/money with Internet

Page 16: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 16/45

Who and Why?

WHY

Motivations:1.Social behavior2.Vandalism3.Money4. Ideology5.Military strategic

interests

WHO

Amateurs are just tip of the iceberg• Hackers: Fun, can-I-do-it?,

show-up, ... (1, 2)

The real problem: Professionals• Mafia, organized crime (3)• Industrial espionage,

competitors (3)• Cyber terrorists (2, 4)• Terrorist-countries (4, 5)• Military (5)

Page 17: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 17/45

Internet problems

Page 18: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 18/45

Security problems in Internet, samplesOctober 2002, Scientific American

”9 out of 13 root DNS –servers were

crippled by DDoS attack”

November 2004, Damages caused by

worms/viruses, Mikko Hyppönen/F-Secure

Slammer: Intranet of nuclear power plant in Ohio downBank of America ATM network down

Blaster:

Electric power network down in NY, USA

Several SCADA systems down

Sasser:

All train traffic halted in Australia

Two hospitals in Sweden infected

January 2005, FBI/Tsunami

”Net criminals used fake web pages of American

Red Cross to get credit card data”

September 2006, Scientific American

”Attack on DNS (Domain Name System)

allows cybercriminal to hijack ordinary

netbanking sessions”

January 2007, www.idg.se

”Almost 1 Million € stolen from a

Scandinavian bank by a Russian hacker

with a trojan distributed with spam mail”

”The biggest so far..”

January 2005, BBC News”Internet gambling hit hard by the attacks.Extortionists are targeting net-based bettingfirms and threatening to cripple their websiteswith deluges of data unless a ransom is paid.”

May 2007, IT-Viikko

”Attacks on Estonian governmental and commercial net sites”

Page 19: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 19/45

Security problems in Internet, samplesDDoS attacks

Design flawsDoS, DDoS attacksCriminal intentions

Viruses, worms, mallwareCriminal intentions

DNS attacks

Design flaws

DoS, DDoS attacks

Design flaws

Phishing

Users’ stupidity

Scams

Users’ stupidity

Page 20: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 20/45

Why Internet is so buggy?

Page 21: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 21/45

Internet design criterion• Primary goals

– Multiplexing of channel– Various network archtectures– Administrative boundaries– Packet switching– Gateways (routers) between networks

• Secondary goals– Robustness (loss of routers and links)– Multiple services (reliable or realtime data)– Usage of various networks– Distributed management– Cost efficient implementation– Simple attachement to network– Resource usage monitoring

Based on David D. Clark:”The Design Philosophy of the DARPA Internet Protocols”

Page 22: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 22/45

Implicit Internet design criterion

• Silent assumptions– Benevolence– Openness– Low level of dynamicity– No mobility– Limited computation capacity– High cost of crypto algorithms

– Limited bandwidth

AS

SU

MP

TIO

NS

NO

T

VA

LID

AN

Y M

OR

E !

!!

STILL VALID, IN SOME CASES !!!

Page 23: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 23/45

Modern problems

• Today we have– Internal problems– Eavesdropping– Packet manipulation– Privacy problems– Viruses– Network criminals– ...

Page 24: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 24/45

Internet design flaws

• Original design principles: The enemy is out there!– ”Everybody can send anything to anybody”– Security measures are introduced afterwards

• The new design principles: The enemy is among us!– We must be prepared to pay for security/reliability

• in form of computation power, bandwidth, energy, etc.

– Strong security as the fundamental building block– Legal sanctions against malevolent entities

Every packet must have an owner!

Page 25: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 25/45

Solution alternatives

Page 26: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 26/45

Four security domains

2. End-to-end secured communication(Data integrity and confidentiality)

3. Content integrity/authenticity/timelyness(information sharing)

1. Reliable operation of the critical network infrastructure

PGP, S/MIME

Restricted caller groups

IPsec, TLS

PLA, MPLS, Physical protection

4. Virtual communities(Knowledge sharing)

Page 27: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 27/45

Four security domains

2. End-to-end secured communication(Data integrity and confidentiality)

3. Content integrity/authenticity/timelyness(information sharing)

1. Reliable operation of the critical network infrastructure

PGP, S/MIME

Restricted caller groups

IPsec, TLS

Partial solutions: MPLS, Physical protection

4. Virtual communities(Knowledge sharing)

GOOD

“BRAND”

MANAGEMENT

IS M

OST IMPORTANT

Page 28: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 28/45

Weakest point: Infrastructure

• Info-bulimia– Flooding, DoS/DDos, Smurf, Sync, ...

• Info-anemia– Link breakage, data corruption, rerouting

packet, router attacks, DNS-attacks, ...We don’t get vital information in time

We can’t make decisions or we do decisions with incomplete information

Reliably operating network is a MUST

Page 29: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 29/45

Society and warfighting

Page 30: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 30/45

(R)evolution of War

Evolution of societies and their relations with war

?

AGRARIANSOCIETY

INDUSTRIALIZED SOCIETY

INFORMATIONSOCIETY

The war is fought for/with/against the most valuable assets of the society

VALUESOCIETY ?

Page 31: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 31/45

The dilemma is that the military have to cope with all the different types of conflict at the same time some of which they are not suited to do.

Definition of War and Enemy?

Rhizomethic War

“WAR” and “ENEMY” in the future?

Page 32: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 32/45

unmanned weapon ?

Managing Military Transformation and Future Soldier

Page 33: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 33/45

4 Warfighting strata

Page 34: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 34/45

4 Strata: Physical

PHYSICAL

GROUND

AIR

SEA

SPACE

Page 35: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 35/45

4 Strata: Cyber-space

PHYSICAL

GROUND

AIR

SEA

SPACE

CYBER-SPACE

”INTERNET”

Page 36: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 36/45

4 Strata: Mental

PHYSICAL

GROUND

AIR

SEA

SPACE

CYBER-SPACE

”INTERNET”

MENTAL

VALUES

ATTITUDES

BRAND

TRUST

BELIEVES

OPINIONS

Page 37: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 37/45

4 Strata: Time

PHYSICAL

GROUND

AIR

SEA

SPACE

CYBER-SPACE

”INTERNET”

MENTAL

VALUES

ATTITUDES

BRAND

BELIEVES

OPINIONS

TIME

YESTERDAY

NOW

TOMORROW

2030

Page 38: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 38/45

OODA-loop

Page 39: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 39/45

Decision making based on OODA-loop

OODA-loop by Colonel John Boyd – Model for human

decision making

Right information delivered to right place at right time

Page 40: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 40/45

OODA-loop

WE Others

To disturb and slow downTo protect and speed up

Page 41: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 41/45

Internal decision making

Externalworld

Wrong info

Old info

Missing info

Info bulimia

Compromized source of info

Tender points

Attacking decision making process

Page 42: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 42/45

War of values

CulturalTraditions

ORIENT-phase

GeneticHeritage

Newinformation

Previousexperience

Analysis & Synthesis

OBSERVE-phase

DECIDE-phase

VALUES

Page 43: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 43/45

Systems of Systems

Page 44: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 44/45

CAP

Page 45: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 45/45

Management of Information

Availability(saatavuus)

Consistency(eheys/ajankohtaisuus)

Privacy(yksityisyys)

C&A-P

C&P-A

A&P-C

Pick two out of three(C,A,P)

=> 3rd is unmanageable

Page 46: Attacking Internet … Hannu H. Kari

National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 46/45

NATIONAL DEFENCE UNIVERSITY

”Do the work that has a meaning” Thank you for your Questions? attention!