presentatie professor hartel dialogues house, 28 mrt 2012

36
1 On the future of Cyber-crime Pieter Hartel University of Twente

Upload: thesocialreporters

Post on 17-Jan-2015

355 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Presentatie professor Hartel Dialogues House, 28 mrt 2012

1

On the future of Cyber-crime

Pieter Hartel

University of Twente

Page 2: Presentatie professor Hartel Dialogues House, 28 mrt 2012

2

Queensland hacker jailed for revenge sewage attacks

Page 3: Presentatie professor Hartel Dialogues House, 28 mrt 2012

3

Russian hacker jailed for porn on video billboard

Page 4: Presentatie professor Hartel Dialogues House, 28 mrt 2012

DigiNotar Hackers suspected of spying on Iranian gmail

4

http://www.youtube.com/user/foxitsoc?feature=watch

Page 5: Presentatie professor Hartel Dialogues House, 28 mrt 2012

Online banking fraud

2010: € 9,8 M

2011: € 35 M

2012: € 125M?

Page 6: Presentatie professor Hartel Dialogues House, 28 mrt 2012

6

Engineers ignored the human element

Page 7: Presentatie professor Hartel Dialogues House, 28 mrt 2012

7

Once a happy family dedicated to universal packet carriage

Page 8: Presentatie professor Hartel Dialogues House, 28 mrt 2012

8

Keeping honest people honest with the netiquette

Page 9: Presentatie professor Hartel Dialogues House, 28 mrt 2012

9

Explosive growth of the Internet from 1995 .. 2005

Year

Mill

ions

of

Use

rs

Page 10: Presentatie professor Hartel Dialogues House, 28 mrt 2012

10

Everyone invited to the party and crime was here to stay

Page 11: Presentatie professor Hartel Dialogues House, 28 mrt 2012

11

Uptake of security technology slow

Page 12: Presentatie professor Hartel Dialogues House, 28 mrt 2012

12

The offender simply skirts around your defenses..

Page 13: Presentatie professor Hartel Dialogues House, 28 mrt 2012

13

The human element: People are the weakest linkTwo examples...

Page 14: Presentatie professor Hartel Dialogues House, 28 mrt 2012

14

Example 1 : Simulated laptop theft experiment

Page 15: Presentatie professor Hartel Dialogues House, 28 mrt 2012

62 simulated offences of which 31 succeeded

Steps Succeeded Failed

Enter building 61 1(locked door)

Enter office 47(1×cleaner)

14

Unlock Kensington

31(5×bolt cutter)

16

Leave building

62(1×emergency exit)

0

15

Page 16: Presentatie professor Hartel Dialogues House, 28 mrt 2012

Results

Social engineering works

30 out of 47 attempts with social engineering succeeded

1 out of 15 attempts without social engineering succeeded

Managers more likely to prevent attack than the target

Offender masquerading as ICT staff twice as likely to be successful

16

[Dim12] T. Dimkov, Alignment of Organizational Security Policies -- Theory and Practice. PhD thesis, University of Twente, http://dx.doi.org/10.3990/1.9789036533317

Page 17: Presentatie professor Hartel Dialogues House, 28 mrt 2012

17

Example 2 : The failure of DigiNotar

Page 18: Presentatie professor Hartel Dialogues House, 28 mrt 2012

18

Certificate

The binding

of a public key

and an identity

signed by a

certification

authority

Page 19: Presentatie professor Hartel Dialogues House, 28 mrt 2012

What went wrong?

No anti virus and weak passwords

Offenders hacked the system and issued rogue certificates

DigiNotar has been hacked before (2009)

No backup certificates

False certificates still accepted by browsers that have not been

patched...

DigiNotar now bankrupt.

19

Page 20: Presentatie professor Hartel Dialogues House, 28 mrt 2012

20

How to deal with the human element?

Focus on the offender

Focus on the offence

[Fel10a] M. Felson. What every mathematician should know about modelling crime. European J. of Applied Mathematics, 21(Special Double Issue 4-5):275-281, 2010. http://dx.doi.org/10.1017/S0956792510000070

Page 21: Presentatie professor Hartel Dialogues House, 28 mrt 2012

21

[Hec06] J. J. Heckman. Skill formation and the economics of investing in disadvantaged children. Science, 312(5782):1900-1902, 2006. http://dx.doi.org/10.1038/428598a

Page 22: Presentatie professor Hartel Dialogues House, 28 mrt 2012

22

Situational crime prevention focuses on the offence

1. A theoretical foundation.

2. A standard methodology based on action research.

3. A set of opportunity-reducing techniques.

4. A body of evaluated practice including studies of displacement.

Page 23: Presentatie professor Hartel Dialogues House, 28 mrt 2012

1. Routine Activity Approach

23

Capable Guardian

Motivated Offender

SuitableTarget

crime

Page 24: Presentatie professor Hartel Dialogues House, 28 mrt 2012

24

2. Methodology: Action Research

1. collection of data about the nature of problem

2. analysis of the situational conditions

3. systematic study of means of blocking opportunities

4. implementation of the most promising means

5. monitoring of results and dissemination of experience.

1

2,3

4

5

Years

# ofVehiclesStolen

First car theft index published

Page 25: Presentatie professor Hartel Dialogues House, 28 mrt 2012

25

3. A set of opportunity-reducing techniques.

http://www.popcenter.org/25techniques/

Page 26: Presentatie professor Hartel Dialogues House, 28 mrt 2012

26

Page 27: Presentatie professor Hartel Dialogues House, 28 mrt 2012

27

4. A body of evaluated practiceExample: Phishing case study

Page 28: Presentatie professor Hartel Dialogues House, 28 mrt 2012

28

How can we use the 25 techniques to fight Phishing?

Increase the effort

1. Target Hardening : Train users to be vigilant

2. Control access to facilities : Control inbox & account

5. Control weapons and tools : Keep your PC up to date

Reduce Rewards

11.Conceal targets : Conceal the email address

14.Disrupt markets : Control Mule recruitment

Remove Excuses

22.Post Instructions : “No phishing”

Page 29: Presentatie professor Hartel Dialogues House, 28 mrt 2012

29

1. Target Hardening

Training: Anti-phishing Phil

http://cups.cs.cmu.edu/antiphishing_phil/new/

Page 30: Presentatie professor Hartel Dialogues House, 28 mrt 2012

30

The message of the training

1. Ignore email asking to update personal info

2. Ignore threatening email

3. Ignore email from bank that is not yours

4. Ignore email/url with spelling errors

5. Ignore a url with an ip address

6. Check a url using Google

7. Type a url yourself, don’t click on it

[Dow06] J. S. Downs, M. B. Holbrook, and L. F. Cranor. Decision strategies and susceptibility to phishing. In 2nd Symp. on Usable privacy and security (SOUPS), pages 79-90, Pittsburgh, Pennsylvania, Jul 2006. ACM. http://dx.doi.org/10.1145/1143120.1143131

Page 31: Presentatie professor Hartel Dialogues House, 28 mrt 2012

31

How well does training work?

515 volunteers out of 21,351 CMU staff+stududents.

172 in the control group, no training

172 single training, day 0 training

171 double training, day 0 and day 14 training

3 legitimate + 7 spearphish emails in 28 days

No real harvest of ID

[Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), Article 3, Mountain View, California, Jul 2009. ACM. http://dx.doi.org/10.1145/1572532.1572536

Page 32: Presentatie professor Hartel Dialogues House, 28 mrt 2012

Good but could be better

On day 0 about 50% of participants fell

Constant across demographic

Control group remains constant

Single training reduces clicks

Multiple training reduces clicks more

Unfortunately:

Participants were self selected...

No indication that this reduces crime...

32

Page 33: Presentatie professor Hartel Dialogues House, 28 mrt 2012

5. Control weapons and tools

Is it a good idea to:

Let people surf the Internet

without a license ?

Allow manufacturers to sell the

anti-virus of a PC as an optional

extra ?

Expect people to maintain their

own anti-virus, fire wall, OS ?

Is it a good idea to:

Let people drive on the road

without a license ?

Allow manufacturers to sell the

brakes of a car as an optional

extra ?

Expect people to maintain their

own car ?

Page 34: Presentatie professor Hartel Dialogues House, 28 mrt 2012

An idea that we would like to test

1. User pays the ISP an “Insurance” premium

2. Security vendor serves the user with updates

3. Security vendor notifies an ISP when user does not update

4. ISP ensures that non-compliant user does not endanger others

5. ISP remunerates vendor

6. Government controls ISPs and vendors

Page 35: Presentatie professor Hartel Dialogues House, 28 mrt 2012

35

?

Page 36: Presentatie professor Hartel Dialogues House, 28 mrt 2012

36

Conclusions

Crime Science approach:

Gives a human perspective on all things technical

Might have come up with new ideas

Avoids experimental flaws

An ounce of prevention is worth a pound of cure

[Har10] P. H. Hartel, M. Junger, and R. J. Wieringa. Cyber-crime science = crime science + information security. Technical Report TR-CTIT-10-34, CTIT, University of Twente, Oct 2010. http://eprints.eemcs.utwente.nl/18500/