1 / 53

Voluntary action against cybercrime

Voluntary action against cybercrime. Measuring and increasing its impact. Tyler Moore Lyle School of Engineering, Southern Methodist University, Dallas, TX, USA Michel van Eeten Faculty of Technology, Policy and Management , Delft University of Technology, NL

koren
Download Presentation

Voluntary action against cybercrime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Voluntary action against cybercrime Measuring and increasing its impact Tyler Moore Lyle School of Engineering, Southern Methodist University, Dallas, TX, USA Michel van Eeten Faculty of Technology, Policy and Management , Delft University of Technology, NL Talk describes joint work with Johannes M. Bauer (Michigan State), Hadi Asghari (TU Delft), Richard Clayton (Cambridge), Shirin Tabatabaie (TU Delft), and Marie Vasek (SMU) Contact: tylerm@smu.edu London Action Plan Meeting, Montreal 22 October 2013

  2. Motivation and context • Wicked content and actors pervade cyberspace • Websites (distribute malware, host phishing,…) • End-user machines (botnets,…) • Most cleanup carried out by private actors voluntarily • Incentives of Internet intermediaries to cooperate largely determines effectiveness of response • Victim • Requesting party (often the victim, security cos.) • Party receiving notice (e.g., ISPs, hosting providers)

  3. Agenda • Empirical investigation of efforts to combat online wickedness • Notice and take-down regimes for cleaningwebsites • End-user machine infections and ISPs’ response • Mechanisms to improve cleanup • Reputation metrics to encourage ISP action • Notifications to remove malware from webservers • Future opportunities and experiments to improve notification-driven voluntary action

  4. Agenda • Empirical investigation of efforts to combat online wickedness • Notice and take-down regimes for cleaning websites • End-user machine infections and ISPs’ response • Mechanisms to improve cleanup • Reputation metrics to encourage ISP action • Notifications to remove malware from webservers • Future opportunities and experiments to improve notification-driven voluntary action

  5. Phishing websites

  6. Comparing takedown speed by hosting method (phishing)

  7. Fake-escrow websites

  8. Fake-escrow websites

  9. Mule-recruitment websites

  10. Mule-recruitment websites

  11. Mule-recruitment websites

  12. Comparing takedown speeds by scam

  13. Takeaways from comparing website takedown efforts • Incentive on the party requesting content removal matters most • Banks are highly motivated to remove phishing websites • Banks overcome many international jurisdictions and no clear legal framework to remove phishing pages • Banks' incentives remain imperfect: they only remove websites directly impersonating their brand, while overlooking mule-recruitment websites • Lack of data sharing substantially hampers cleanup speed • Technology chosen by attacker has small impact • Full details: http://lyle.smu.edu/~tylerm/weis08takedown.pdf

  14. Agenda • Empirical investigation of efforts to combat online wickedness • Notice and take-down regimes for cleaning websites • End-user machine infections and ISPs’ response • Mechanisms to improve cleanup • Reputation metrics to encourage ISP action • Notifications to remove malware from webservers • Future opportunities and experiments to improve notification-driven voluntary action

  15. Research questions on end-user infections • To what extent are legitimate ISPs critical control points for infected machines? • To what extent do they perform differently relative to each other, in terms of the number of infected machines in their networks? • How do countries perform compared to each other? • Which intermediary incentives work for and against security?

  16. Methodology • Using different longitudinal data sources of infected machines, each with several hundred million IP addresses • Spam trap data • Dshield IDS data • Conficker sinkhole data • For each IP address, look up country and ASN • Map ASNs to ISPs (and non-ISPs) in 40 countries (~200 ISPs cover ~90% market share in wider OECD) • Connect data on infected machines with economic data (e.g., # subscribers of ISP) • Compensate for known measurement issues

  17. Research questions on end-user infections • To what extent are legitimate ISPs critical control points for infected machines? • To what extent do they perform differently relative to each other, in terms of the number of infected machines in their networks? • How do countries perform compared to each other? • Which intermediary incentives work for and against security?

  18. <18>

  19. Percentage of all infected machines worldwide located in top infected ISP networks (2009) <19>

  20. Percentage of all infected machines worldwide located in top infected ISP networks (2010) <20>

  21. Number and location of infected machines over time (2010, spam data)

  22. Findings (1) – ISPs are control points • Data confirms that ISPs are key intermediaries • Over 80% of infected machines in wider OECD were located within networks of ISPs • Concentrated pattern: just 50 ISPs control ~50% of all infected machines worldwide • In sum: leading, legitimate ISPs have the bulk of infected machines in their networks, not ‘rogue’ providers

  23. Research questions • To what extent are legitimate ISPs critical control points for infected machines? • To what extent do they perform differently relative to each other, in terms of the number of infected machines in their networks? • How do countries perform compared to each other? • Which intermediary incentives work for and against security?

  24. Infected machines vs subscribers per ISP (spam) <24>

  25. Findings (2) – ISPs differ significantly • ISPs of similar size vary by as much as two orders of magnitude in number of infected machines • Even ISPs of similar size in the same country can differ by one order of magnitude or more • These differences are quite stable over time and across different data sources

  26. Stability of most infected ISPs over time 30 ISPs are in the top 50 in all four years Overlap of the 50 ISPs with the highest number of infected machines(2008-2011, spam data)

  27. Stability of most infected ISPs over time 24 ISPs are in the top 50 in all four years Overlap of the 50 ISPs with the highest number of infected machines per subscriber(2008-2011, spam data)

  28. Most infected ISPs across all datasets 26 ISPs are in the top 50 most infected networks in all three data sources Overlap of the top 50 ISPs with the highest number of infected machines across datasets (2010, absolute metrics)

  29. Research questions • To what extent are legitimate ISPs critical control points for infected machines? • To what extent do they perform differently relative to each other, in terms of the number of infected machines in their networks? • How do countries perform compared to each other? • Which intermediary incentives work for and against security?

  30. Infection rates of ISPs per country (spam data) NL <30>

  31. Research questions • To what extent are legitimate ISPs critical control points for infected machines? • To what extent do they perform differently relative to each other, in terms of the number of infected machines in their networks? • How do countries perform compared to each other? • Which intermediary incentives work for and against security?

  32. What explains the huge variation in infection rates? • Even good ISPs tackle only a fraction of the bots in their network • Evidence from recent study of the Dutch market suggests ISPs contact less than 10% of the customers that are infected at any point in time – this is after Dutch ISPs signed the Anti-Botnet Treaty • This discrepancy is partially because ISPs do not widely collect data on infected machines in their networks • This situation is similar or worse in many other countries

  33. contacting / quarantining ~ 900 customers (~5%) contacting / quarantining ~ 1000 customers (~6%) <33>

  34. Impact of telco regulation on security • Engagement of ISPs by telecom regulators and law enforcement improves security • For example, countries where regulators participate in London Action Plan (LAP) have lower infection rates Notes: Statistical significance at 1% (***) and 5% (**); n.a.: not available.

  35. Impact of competition on security

  36. Agenda • Empirical investigation of efforts to combat online wickedness • Notice and take-down regimes for cleaning websites • End-user machine infections and ISPs’ response • Mechanisms to improve cleanup • Reputation metrics to encourage ISP action • Notifications to remove malware from webservers • Future opportunities and experiments to improve notification-driven voluntary action

  37. Reputation metrics as incentives • Market for security is hampered by information asymmetry between intermediaries and customers • We often can’t tell which intermediaries are performing better than their peers/competitors • This weakens the incentives to invest in security • Reliable reputation metrics might change this • Example: poor security ranking of Germany as a country led to Botfrei

  38. Reputation metrics as incentives • NL government commissioned TU Delft to develop reputation metrics on botnet infections for the Dutch market, in collaboration with the ISPs • NL government also asked us to not make the results public, but share them only with the group of ISPs working in the anti-botnet treaty • Did the metrics have an impact? • Looking at the worst performer in mid 2010

  39. Infection rates at main Dutch providers, before and after reputation metrics <39>

  40. More information on TU Delft work “Economics of Malware” (OECD, 2008)http://goo.gl/6HS4d “Role of ISPs in Botnet Mitigation” (OECD, 2010)http://goo.gl/4UZQF “ISPs and Botnet Mitigation: A Fact-Finding Study on the Dutch Market (Dutch government, 2011) http://goo.gl/etFZj

  41. Agenda • Empirical investigation of efforts to combat online wickedness • Notice and take-down regimes for cleaning websites • End-user machine infections and ISPs’ response • Mechanisms to improve cleanup • Reputation metrics to encourage ISP action • Notifications to remove malware from webservers • Future opportunities and experiments to improve notification-driven voluntary action

  42. Cleanup of hacked websites distributing malware is coordinated and carried out by volunteers Security companies Search engines Non-profit organizations Web hosts and site owners Malware cleanup process Detect a website distributing malware Notify the website owner and hosting provider of infection if compromised, or hosting provider and registrar if purely malicious Search engines might block results until malware is removed Voluntary cleanup of webservers distributing malware

  43. “SBW Best Practices For Badware Reporting” We designed an experiment to assess the effectiveness of malware notices in remediating malware Investigated malware URLs submitted to StopBadware’s Community Feed 10—12/2011 Randomly assigned URLs to 3 groups Control: no report Minimal report: URL, IP, short description of malware, date/time detected Full Report: detailed description of malware (specific bad code, special information needed to deliver malware) Follow up 1, 2, 4, 8, 16 days after initial report day Do malware notices work?

  44. Example minimal notice

  45. Everything in the minimal notice plus detailed evidence of infection Example detailed notice

  46. Results for cleanup after 16 days

  47. Tracking cleanup over time

  48. Takeaways from malware notification experiment • Reporting works • 40% cleaned up 1 day after receiving full report, vs. 18% w/o notice • Fuller reports better than concise reports • But only the first report matters • Concise reports a waste of time • Experimental design could serve as a template for evaluating other notification regimes • Full details: http://lyle.smu.edu/~tylerm/cset12.pdf

  49. Agenda • Empirical investigation of efforts to combat online wickedness • Notice and take-down regimes for cleaning websites • End-user machine infections and ISPs’ response • Mechanisms to improve cleanup • Reputation metrics to encourage ISP action • Notifications to remove malware from webservers • Future opportunities and experiments to improve notification-driven voluntary action

  50. How can we further improve cleanup of infected end-user machines? • What we’ve learned so far • ISPs are crucial intermediary with huge variation in infection rates • Incentive on requesting party is key • Incident data is a prerequisite for cleanup • Most intermediaries don’t have strong incentive to look hard for more comprehensive incident data • Many collaborative data-sharing efforts and notification experiments • Pull vs. push mechanisms for notification • Countries (e.g., US, NL, AU, DE) trying different approaches

More Related