1 / 12

Crime on the Internet: A Network Service Provider’s View

Crime on the Internet: A Network Service Provider’s View. Presentation to InfraGard, Phoenix Chapter, April 19, 2004. Crime on the Internet. AGENDA. Introduction How Did We Get Into This Position? What Are the Actual Threats, and Who Is Doing This? What Are We Currently Doing?

azia
Download Presentation

Crime on the Internet: A Network Service Provider’s View

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Crime on the Internet: A Network Service Provider’s View Presentation to InfraGard, Phoenix Chapter, April 19, 2004.

  2. Crime on the Internet • AGENDA • Introduction • How Did We Get Into This Position? • What Are the Actual Threats, and Who Is Doing This? • What Are We Currently Doing? • What Else Can Be Done?

  3. Ajigaura Tokyo Nagoya Osaka Shima Hong Kong Tseung Kwan O Legend Landing Points Cities Connected Connecting Systems IP POP Kuantan Singapore Global Crossing Asia/Pacific – Dedicated Internet Access/IP Transit

  4. Stockholm Oslo Aberdeen Copenhagen Edinburgh Glasgow Sylt Dublin Liverpool Beverwijk Hamburg Berlin Hannover Wexford Kilmore Quay London Bristol Dusseldorf Amsterdam Bude Cologne Dresden Rotterdam Leipzig Antwerp Frankfurt Whitesands Brussels Nuremberg Strasbourg Munich Stuttgart Paris Zurich Geneva Lyon Milan Turin Legend Marseilles Landing Points Cities Connected Connecting Systems IP POP Barcelona Madrid Global Crossing Europe – Dedicated Internet Access/IP Transit

  5. Legend Landing Points Cities Connected Connecting Systems IP POP Aberdeen Glasgow Edinburgh Newcastle Carlisle Middlesbrough York Preston Dublin Leeds Liverpool Sheffield Derby Beverwijk Nottingham Manchester Peterborough Norwich Kilmore Quay Birmingham Amsterdam Wexford Southend Bristol London Reading Rotterdam Antwerp Bude Dover Southampton Exeter Brighton Basingstoke Plymouth Brussels Whitesands Global Crossing UK – Dedicated Internet Access/IP Transit

  6. Legend Landing Points Cities Connected (Switch Sites) Cities Connected Connecting Systems IP POP Spokane Helena Green Bay Seattle Minneapolis Billings Montreal Toronto Rochester Portland Detroit Milwaukee Buffalo Syracuse Boston Eugene Albany Erie Des Moines Chicago Toledo Casper Cleveland Medford Omaha New York Akron Lincoln Salt Lake City Pittsburgh Newark Redding Altoona Reno Trenton Denver Columbus Chico Philadelphia Indianapolis Dayton Kansas City Baltimore Sacramento Oakland Washington DC Cincinnati San Francisco Colorado Springs Topeka Fredericksburg St. Louis Sunnyvale Louisville Richmond San Jose Chesapeake Bowling Green Salinas Nashville Greensboro Tulsa Charlotte San Luis Obispo Rocky Mount Albuquerque Chattanooga Greenville Raleigh Santa Barbara Oklahoma City Anaheim Los Angeles Phoenix Atlanta San Diego Macon Tucson Tijuana Dallas Fort Worth El Paso Mobile Baton Rouge Jacksonville Austin Tallahassee Houston New Orleans Daytona Beach San Antonio Orlando Melbourne Tampa Fort Lauderdale Miami Monterrey Mazatlan Guadalajara Mexico City Global Crossing North America – Dedicated Internet Access/IP Transit

  7. St. Croix Puerto Viejo Panama City Ft. Amador Caracas Fortaleza Lima Lurin São Paulo Santos Legend Rio De Janeiro Landing Points Cities Connected Connecting Systems IP POP Valparaiso Santiago Buenos Aires Las Toninas Global Crossing South America – Dedicated Internet Access/IP Transit

  8. Crime on the Internet • How Did We Get Into This Position? • Nature of the Internet • Vulnerabilities in Network Software • A Large Number of Non-Power Users • People Out to Make a Quick Buck

  9. Crime on the Internet • What Are the Actual Threats, and Who Is Doing This? • Spam • Viruses and Worms • Denial of Service Attacks • Convergence of Threats • Cast of Characters

  10. Crime on the Internet • What Are We Currently Doing? • Prevention: Contract/AUP, Screening, Blocking (cbl.abuseat.org), Filtering, uRPF. • Detection: Third party monitoring/aggregation, Netflow, Arbor. • Response: Termination, filtering, notification.

  11. Crime on the Internet • What Else Can Be Done? • Fix the software. Secure coding practices. • Actions by those with direct relationship with owners of compromised systems (ISPs and software manufacturers). • Actions by those with indirect relationships (NSPs, security researchers). • Actions by law enforcement.

  12. Crime on the Internet • Further Information • Composite Blocking List: http://cbl.abuseat.org • ROKSO: http://www.spamhaus.org • Bot information: http://www.lurhq.com/research.html • Jim Lippard • james.lippard@globalcrossing.com

More Related