How to counter web-based attacks on the Internet in Korea

advertisement
Global Standards Collaboration (GSC) 14
DOCUMENT #:
GSC14-GTSC-026
FOR:
Presentation
SOURCE:
TTA
AGENDA ITEM:
GTSC 4.2
CONTACT(S):
hyyoum@sch.ac.kr
How to counter web-based attacks on the
Internet in Korea
Heung Youl YOUM
Chairman of Korea ITU-T SG17
Committee, TTA
Geneva, 13-16 July 2009
Fostering worldwide interoperability
What is web-based attacks?
It is very surprise if you realize that just
visiting your favorite web site can either
lead to malware to be silently installed on
your computer without your knowledge or
clicking anything, or being annoyed by
misleading applications, such as fake
antivirus software.
What is web-based attacks?
A type of attacks in which the attackers try to
compromise the legitimate websites resulting
in malicious code to be injected which in turn
can be used to infect a user’s computer visiting
those web sites.
Geneva, 13-16 July 2009
Fostering worldwide interoperability
2
Web-based attacks
According to Google survey released in May
2007,
one in 10 web sites contained malicious codes
which were capable of launching so-called
“drive-by download” type web-based attacks.
In the web-based attacks:
The administrators are not aware that they are
hacked, have resulted injecting the malicious
codes and used to disseminate malicious codes;
Users also are not aware that their computers
get infected by malicious codes from the sites
they have visited;
Installing anti-virus S/W can prevent some
incidents, but, they are not providing ultimate
solutions.
Geneva, 13-16 July 2009
Fostering worldwide interoperability
3
Top Web Threats for 2008
In the Symantic threats Report-2008:
Drive-by downloads from mainstream Web site are
increasing;
Attacks are heavily obfuscated and dynamically
changing making traditional antivirus solutions
ineffective ;
Attacks are targeting browser plug-ins;
SQL injection attacks are being used to infect
mainstream Web sites;
Mal advertisements are redirecting users to
malicious Web sites;
Explosive growth in unique and targeted malware
samples;
Geneva, 13-16 July 2009
Fostering worldwide interoperability
4
Typical scenarios for web-based
attack in Korea
1,000 legitimate web sites
1. Compromise the legitimate web sites.
<iframe> … </iframe>
attacker
6. Personal information such
as ID/Password is
transferred to attacker.
2. Visit their favorite
web sites.
3. Redirect users to the malicious
web site.
5. 92,000 PCs with MS06-014
Vul. infected by malicious
code.
Users
Geneva, 13-16 July 2009
4. Attempts to attack the PCs
using 620,000 IPs.
Malicious code
injected web
site
Fostering worldwide interoperability
5
Korea use case: MC-finder scheme(1/2)
MC-finder scheme
Developed by KISA (Korea Information
Security Agency) and put in place since 2006.
A scheme to search for the malicious codeinjected web sites, malicious web site, and the
web sites which redirect users to the malicious
injected code, the transit web site.
More than 140,000 sites in Korea are being
monitored by MC-finder scheme, as of June
30, 2009.
During 2008, in Korea,
1,324 web sites founded as malicious code
injected web sites, 7,654 web sites turned up
as the transit web sites redirecting users to the
malicious injected web sites.
Geneva, 13-16 July 2009
Fostering worldwide interoperability
6
Korea use case: MC-finder scheme(2/2)
Web sites to be monitored:
Major web sites for enterprise/orgs, etc. sites,
Top 20,000 sites according to number of
visiting users;
Sites which have already experienced the web
pages’ defacement.
Inspect web documents to check whether
an malicious code is injected.
List up the infected URLs.
It has provided the following services;
Inform the administrators by SMS, e-mail, or
phone to take necessary actions;
Maintain and track the history of the MCinfected sites;
Geneva, 13-16 July 2009
Fostering worldwide interoperability
7
Challenges
Nearly impossible to search for all global
web sites therefore, it needs to develop a
global collaboration framework. However,
Lack of framework for sharing security
information;
Lack of globally interoperable framework or
technologies;
No standardization activity on how to
counter this web-based attacks.
Therefore, it needs to;
Identify various web-based attack scenarios,
the requirements and generic framework;
Identify the relevant information exchange
format;
Geneva, 13-16 July 2009
Fostering worldwide interoperability
8
Next Steps/Actions
Korea continue to upgrade the MC-finder scheme
to reflect the fast changing attack environments.
Need for a globally interoperable framework and
technologies which can combat the web-based
attacks effectively;
ITU-T and global SDOs are required to develop
standards or guideline for a globally interoperable
scheme against the web-based attacks on the
Internet.
TTA plans to contribute to launching the
standardization activities on the countering
scheme against the web-based attacks in the
near future.
Geneva, 13-16 July 2009
Fostering worldwide interoperability
9
Proposed Resolution
Generally needs to reaffirm the existing
Resolution GSC11/13.
However, update is required as follows;
In recognizing clause, item i);
that new cyber attacks such as phishing, pharming,
“web-based attacks” and Botnets are emerging and
spreading rapidly;
In Resolves clause, item 4);
work with the ITU and others to develop standards or
guidelines to protect against Botnet attacks “and
web-based attacks” and facilitate tracing the source
of an attack;
Geneva, 13-16 July 2009
Fostering worldwide interoperability
10
Download