Risq mark bullen - juniper (11-16-16)
-
Upload
colloquerisq -
Category
Technology
-
view
64 -
download
1
Transcript of Risq mark bullen - juniper (11-16-16)
![Page 1: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/1.jpg)
The Evolution of Secure Networks
Mark Bullen
Sr Systems Engineer
Juniper Networks
![Page 2: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/2.jpg)
RANSOMWARE
![Page 3: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/3.jpg)
Average Ransomware Payment $ 1xBitcoin ($420 USD)
Data provided by www.smartdatacollective.com/
Ransomware by the Numbers
Yearly Earnings $393M
Infection Rate 70,000/day
Average Payouts/Day 2600 (3.5%)
Daily Earnings $1.01M
![Page 4: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/4.jpg)
Propagation
![Page 5: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/5.jpg)
The Exploit Kit….
A history of the Exploit Kit Blackhole 2012 Nuclear 2012 Angler 2014-2016 Neutrino 2014- Active RIG 2014 -Active
![Page 6: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/6.jpg)
Exploit Kit Drive-by Circulations July-August 2016
Data provided by malware.dontneedcoffee.com
![Page 7: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/7.jpg)
Mitigation
![Page 8: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/8.jpg)
Deploy New Detection Mechanisms Static & Dynamic File Analysis
Examples of Static Analysis Traits Examples of Dynamic Analysis Actions
![Page 9: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/9.jpg)
Machine Learning
Known Bad Traits
Known Good Traits
![Page 10: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/10.jpg)
Evasive Behaviors
![Page 11: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/11.jpg)
Removing the Silo’s Exchange and Consume Global Threat Information
Enforce Collect Share
![Page 12: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/12.jpg)
Software-Defined Secure Network (SDSN)
Leverage entire network and ecosystem for threat intelligence and detection
Utilize any point of the network as a point of enforcement
Dynamically execute policy across all network elements including third party devices
Your Enterprise Network
Threat Intelligence
Enforcement
Detection
Enforcement
Detection
Cloud-based Threat Defense
Dynamic and Adaptive Policy Engine
Policy
Campus
&
Branch
DC Public
Cloud Private
Cloud
![Page 13: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/13.jpg)
Merci / thank You!
![Page 14: Risq mark bullen - juniper (11-16-16)](https://reader034.fdocuments.us/reader034/viewer/2022042706/587270011a28ab31498b6763/html5/thumbnails/14.jpg)
References
forums.juniper.net/t5/Security-Now www.krebsonsecurity.com www.malwarebytes.com malware.dontneedcoffee.com www.smartdatacollective.com www.symantec.com www.trendmicro.com www.verizonenterprise.com/verizon-insights-lab/dbir/ cyboxproject.github.io stixproject.github.io taxiiproject.github.io