The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline...

11
FIRST LINE OF DEFENSE The Security Considera2on for IoT Dave Larson COO & CTO © 2016 Corero www.corero.com

Transcript of The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline...

Page 1: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

TheSecurityConsidera2onforIoT

DaveLarsonCOO&CTO

©2016Corerowww.corero.com

Page 2: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

TheTbpsEra?

IoTDDoS

KrebsOVHDYN…

20+YearsofDoSACacks

First Hacktivist event: Zapatista National Liberation Army

DoS for Notoriety

MafiaBoy DDoS: Yahoo!, Amazon, Dell, CNN, Ebay, Etrade

Spammers discover botnets

Organized crime: Extortion

Estonia: Parliament, banks, media, Estonia Reform Party

1993 2013 1995 1997 1999 2001 2003 2005 2007 2009 2011

Anon hits Church of Scientology

Panix.net hit with first major DDoS

2016

Coordinated US bank attacks: Grew to 200 Gbps, and continue today

ProtonMail attack

Spamhaus attack: Reported to reach 310 Gbps

500 Gbps Hong Kong attack France swarmed after terror attack PlayStation & Xbox hit at Christmas

2017

Rio Olympics 540 Gbps

Page 3: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

Sowhatexactlyisa‘thing’?§  IntheIOTa‘thing’canbemanythings

•  Securitycamera,babymonitor,thermostat,DVR,LEDlightbulb,industrialcontroldevice,refrigerator,etc.

§  Itswhattheyhaveincommonthat’stheproblem•  Generalpurposeprocessor•  RunsLinux•  Highspeedwired/wirelesstrustedconnecXon•  OYendeployedindefaultconfiguraXon•  Rarely,ifever,patchedorevenmonitored•  LiClethoughtgiventosecurityarchitecture

©2016Corerowww.corero.com3

Page 4: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

AnatomyofaBotnetDDoSACack

©2016Corerowww.corero.com4

A6ackerinstallscodethatcreatesacommandandcontrolenXtythatautomaXcallyidenXfiesandcompromisesanarmyofbots.

CommandandControlServerexecutesthecommandsthatputthebotnettowork.

BotnetanetworkofmalwareinfecteddevicescontrolledremotelybytheaCacker.

Page 5: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

AnatomyofaBotnetDDoSACack

©2016Corerowww.corero.com5

Infecteddevicessendlargeamountsofbogustraffictotargetedserver(s)orservicesconnectedtotheInternet.

Page 6: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

DDoSalwaysevolving-“IoT”upsthechallenge§  Gartner,Inc.forecaststhatInternetconnected

thingswillreach20.8billionby2020.§  MiraicodemadeavailableinearlyOct.–malware

spreadstodeviceswithfactorydefaultorhard-codedusernamesandpasswords

§  CountlessaCackvectorsandaCacktypesoutinthewild-NewlydiscoveredCLDAPvectorwithupto55xamplificaXonfactor

§  Newtechniques,combinaXonaCacks,DDoSforhireservicescoupledwithunlimitedmoXvaXonscreateavolaXleDDoSlandscape

©2016Corerowww.corero.com6 hCp://www.gartner.com/newsroom/id/3165317

FriendorFoe?

Page 7: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

CommunityResponsibility

©2016Corerowww.corero.com7

TheCarriersthemselvesmustdomoretoenable‘cleanpipe’totheirdownstreamsubscribers—cleaningupaCacktrafficaswellasensuringthatcompromiseddevicesontheiraccessnetworkarequicklyidenXfiedandremediated

DeviceManufacturersmustputsecuritymeasuresinplace.NodeviceshouldconnecttotheInternet‘outofthebox’

OtherwisewewillhavegovernmentlegislaXonforcingCarriersandManufacturesofIoTdevicesaliketoworktowardeliminaXngtheproblem

Page 8: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

NewBreedofBigger‘Surgical’DDoSACacks

8 ©2016Corerowww.corero.com

84% OF ATTACKS ARE

LESS THAN 10 MINUTES

1.6% OF ATTACKS ARE

GREATER THAN 5 Gbps

Page 9: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

SophisXcatedMulX-LayeredACacks

9 ©2016Corerowww.corero.com

§  EnoughvolumetocrippletargetinfrastructureordesXnaXon§  AdvancedDoSaCackscraYedtoavoiddetecXon§  ShortduraXonsavoidlegacyDDoSscrubbingmiXgaXontechniques(TTM)

Ongoinglow-level,backgrounda6acks

Volumerampedto68Gbforafewminutes

Ini?alA6ackphase

Page 10: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

DDoSProtecXonRecommendaXons1.   DetermineWheretoProtectfromDDoS

•  DefeaXngDDoSwithanalways-ondeploymentatthenetworkedge,removesthethreatfromyourenvironment

•  LegacyapproachtomiXgaXoncannotkeepupwiththeevolvingthreatlandscape–(TTM)TimeToMiXgaXonandthescaleofaCacks(needtoinspecteverypacket)

•  Newapproach,protecXngyourcustomeraswellasyourinfrastructure,allowsyoutheprovider,tomoneXzetheserviceandupliYexisXngservicesrevenue

2.   ChoosetherightDDoSProtec2onServiceStrategy•  TestsoluXonsforXmetomiXgaXon,performancecapability,scalabilityacrossyour

network,andautomaXcsecuritycoverage.•  AnalyXcstoensureyoucanshowthevaluetoyourcustomerstomeettheir

requirements

10

The image part with relationship ID rId3 was not found in the file.

Page 11: The Security Consideraon for IoT - documents.grenadine.codocuments.grenadine.co/Pipeline Publishing/ICTXS... · FIRST LINE OF DEFENSE So what exactly is a ‘thing’? § In the IOT

FIRST LINE OF DEFENSE

ThankYou!DaveLarson [email protected]