SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
ACDC 
General 
Overview 
Michel 
van 
Eeten, 
TU 
Del7 
(Work 
Package 
Leader)
Quick 
Facts 
ACDC 
– 
Advanced 
Cyber 
Defence 
Centre 
• Project 
type: 
European 
Pilot 
Project 
under 
CIP-­‐PSP 
programme 
• Project 
duraMon: 
30 
months 
(Feb 
2013 
-­‐ 
Jul 
2015) 
• Project 
Volume: 
15,5M 
EUR, 
co-­‐funded 
by 
the 
European 
Commission. 
• 28 
Partners 
from 
14 
European 
Countries 
• Project 
Lead: 
eco 
e.V. 
-­‐ 
AssociaMon 
of 
the 
German 
Internet 
Industry 
• Unique 
consorMum 
unites: 
• CERTs 
• Internet 
Service 
Providers 
• AnMvirus 
and 
IT-­‐Security 
Companies 
• Academia 
and 
Research 
• Industry 
(CriMcal 
Infrastructure 
Providers, 
Financial 
InsMtuMons) 
• Law 
Enforcement 
ACDC 
General 
Overview 
2
Project 
Goals 
• Cross-­‐border 
fight 
against 
Botnets 
(and 
other 
threats) 
• End-­‐to-­‐End 
approach 
against 
Botnets 
• 1 
Central 
Database 
(Centralized 
Data 
Clearing 
House) 
• 1 
Community 
Portal 
• 8 
NaMonal 
AnM-­‐Botnet-­‐Support 
Centre 
• 5 
Experiments 
as 
a 
Proof 
of 
Concept 
• Open 
ACDC 
Community 
for 
external 
Stakeholders 
and 
Partners 
• Sustainability 
Plan 
for 
ConMnuaMon 
of 
the 
Project 
• PrevenMon 
strategies 
& 
Awareness 
raising 
to 
End-­‐users 
• Free 
MiMgaMon 
tools 
and 
service 
for 
End-­‐users 
across 
Europe 
ACDC 
General 
Overview 
3
ACDC 
– 
a 
service 
approach 
Detec1on 
Spam 
campaign 
Stolen 
credenMals 
Drive-­‐by-­‐ 
download 
DDoS 
traffic 
detected 
Centralised 
reports 
of 
botnet 
behaviour 
Centralised 
Data 
Clearing 
House 
Support 
– 
no1fying 
affected 
customer 
Mi1ga1on 
– 
helping 
affected 
customer 
Security 
vendor 
HosMng 
provider 
Mobile 
network 
provider 
Bank 
of 
customer 
Standardized 
report 
findings 
Redirect 
to 
boBree.eu
Internet 
Service 
Providers 
ACDC 
– 
central 
Data 
Clearing 
House 
Central 
Data 
Clearing 
House 
Sensor 
Sensor 
Concentrator 
Concentrator 
Sensor 
Sensor 
Sensor 
Sensor 
Sensor 
Sensor 
ACDC 
NaMonal 
Support 
Centres 
Anonymisa1on 
Research 
Industry 
Law 
Enforcement 
Agencies 
Detec1on 
Suppor1ng
ACDC 
– 
Central 
Data 
Clearing 
House 
Central 
Data 
Clearing 
House 
Sensor 
Sensor 
Concentrator 
Concentrator 
Sensor 
Sensor 
Sensor 
Sensor 
Sensor 
Sensor 
Detec1on 
ü Sensors 
delivering 
data 
directly 
or 
through 
concentrators 
ü Sensors 
can 
request 
addiMonal 
feeds 
to 
work 
with 
ü Data 
input 
in 
any 
format 
ü Data 
output 
in 
JSON 
or 
YAML 
ü Central 
Clearing 
House 
facility 
correlates 
data 
ü Data 
flagging 
for 
special 
purposes 
q Experiments, 
q Research 
or 
q InvesMgaMons
ACDC 
Community 
Portal 
ACDC 
General 
Overview 
7 
• Entry 
point 
to 
ACDC 
• Handling 
of 
Data 
Sharing 
Policies 
• Connects 
users 
to 
soluMons 
• Inter-­‐connecMng 
stakeholders 
to 
fight 
botnets 
• Plahorm 
to 
create 
and 
deploy 
soluMons 
• Open 
Knowledge 
Exchange 
Plahorm 
• Open 
RegistraMon 
to 
intl. 
stakeholders 
https://communityportal.acdc-project.eu
(NaMonal) 
Support 
Centres 
ACDC 
General 
Overview 
8 
• Bohree.eu 
as 
central 
point 
of 
entry 
• 8 
NaMonal 
End-­‐User 
Support 
Centres 
• DE, 
BE, 
IT, 
ES, 
RO, 
PT, 
HR, 
FR 
• Three 
columns 
of 
support 
• Prevent 
• Clean 
• Inform 
• Free 
miMgaMon 
tools 
like 
• EU-­‐Cleaner 
by 
Avira 
• Check-­‐and-­‐Secure.com 
• Twijer, 
Blogs, 
Forum, 
Email-­‐Support
Does 
it 
really 
help? 
ACDC 
General 
Overview 
9 
• Similar 
intervenMons 
are 
being 
tried 
everywhere: 
• naMonal 
support 
centers 
• data 
clearing 
houses 
• ISP 
customer 
noMficaMons 
• global 
C&C 
takedowns 
• Resources 
are 
limited 
in 
Mme 
and 
magnitude 
• Which 
of 
these 
measures 
are 
most 
effecMve? 
• This 
requires 
robust 
compara1ve 
botnet 
metrics 
and 
careful 
staMsMcal 
analysis 
• Metrics 
also 
inform 
all 
stakeholders 
how 
well 
(or 
poorly) 
network 
operators 
are 
performing 
in 
miMgaMng 
botnet 
threats 
• Metrics 
incenMvize 
miMgaMon 
and 
reward 
the 
efforts 
of 
good 
ISPs
Global 
takedown 
of 
Zeus 
C&C 
Zeus source code leakage
QuesMons? 
Project 
Website: 
hjps://acdc-­‐project.eu 
Community 
Portal: 
hjps://communityportal.acdc-­‐project.eu 
Support 
Centres: 
hjps://bohree.eu 
Twijer: 
hjps://twijer.com/AnMBotnet 
Facebook: 
hjps://www.facebook.com/bohree.eu 
ACDC 
General 
Overview 
11 
ACDC 
Main 
contact: 
Peter 
Meyer, 
eco 
e.V. 
(peter.meyer@eco.de) 
Project 
Coordinator 
– 
ACDC

Contenu connexe

En vedette

Cyberdéfense-Eldorado-Emplois-Reconversion-v2r0
Cyberdéfense-Eldorado-Emplois-Reconversion-v2r0Cyberdéfense-Eldorado-Emplois-Reconversion-v2r0
Cyberdéfense-Eldorado-Emplois-Reconversion-v2r0Eric DUPUIS
 
Bilan et avenir du Réseau : le Réseau Cyber-base national (2008)
Bilan et avenir du Réseau : le Réseau Cyber-base national (2008)Bilan et avenir du Réseau : le Réseau Cyber-base national (2008)
Bilan et avenir du Réseau : le Réseau Cyber-base national (2008)Ardesi Midi-Pyrénées
 
Cyber-attaques : Comment les combattre ? Gérer les risques connus, anticiper ...
Cyber-attaques : Comment les combattre ? Gérer les risques connus, anticiper ...Cyber-attaques : Comment les combattre ? Gérer les risques connus, anticiper ...
Cyber-attaques : Comment les combattre ? Gérer les risques connus, anticiper ...EY
 
Cycle de renseignement
Cycle de renseignementCycle de renseignement
Cycle de renseignementJerry Derlet
 
Des systèmes critiques au coeur des enjeux de cyberdefense
Des systèmes critiques au coeur des enjeux de cyberdefenseDes systèmes critiques au coeur des enjeux de cyberdefense
Des systèmes critiques au coeur des enjeux de cyberdefenseNRC
 
BSides Huntsville Keynote - Active Cyber Defense Cycle
BSides Huntsville Keynote - Active Cyber Defense CycleBSides Huntsville Keynote - Active Cyber Defense Cycle
BSides Huntsville Keynote - Active Cyber Defense CycleRobert M. Lee
 
L'année 2014 de la cyberdéfense
L'année 2014 de la cyberdéfenseL'année 2014 de la cyberdéfense
L'année 2014 de la cyberdéfensencaproni
 
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesCyber Security Alliance
 
Cyber [crime|war deepsec
Cyber [crime|war deepsecCyber [crime|war deepsec
Cyber [crime|war deepsecIftach Ian Amit
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...Risk Analysis Consultants, s.r.o.
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
Cours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts ClésCours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts ClésFranck Franchin
 
The science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagementThe science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagementIBM Analytics
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cybersurveillance : Risques & opportunités
Cybersurveillance : Risques & opportunitésCybersurveillance : Risques & opportunités
Cybersurveillance : Risques & opportunitésThierry Pertus
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Sécurité des systèmes d'information
Sécurité des systèmes d'informationSécurité des systèmes d'information
Sécurité des systèmes d'informationFranck Franchin
 

En vedette (20)

Cyberdéfense-Eldorado-Emplois-Reconversion-v2r0
Cyberdéfense-Eldorado-Emplois-Reconversion-v2r0Cyberdéfense-Eldorado-Emplois-Reconversion-v2r0
Cyberdéfense-Eldorado-Emplois-Reconversion-v2r0
 
Bilan et avenir du Réseau : le Réseau Cyber-base national (2008)
Bilan et avenir du Réseau : le Réseau Cyber-base national (2008)Bilan et avenir du Réseau : le Réseau Cyber-base national (2008)
Bilan et avenir du Réseau : le Réseau Cyber-base national (2008)
 
Cyber-attaques : Comment les combattre ? Gérer les risques connus, anticiper ...
Cyber-attaques : Comment les combattre ? Gérer les risques connus, anticiper ...Cyber-attaques : Comment les combattre ? Gérer les risques connus, anticiper ...
Cyber-attaques : Comment les combattre ? Gérer les risques connus, anticiper ...
 
Cycle de renseignement
Cycle de renseignementCycle de renseignement
Cycle de renseignement
 
Practical Cyber Defense
Practical Cyber DefensePractical Cyber Defense
Practical Cyber Defense
 
Des systèmes critiques au coeur des enjeux de cyberdefense
Des systèmes critiques au coeur des enjeux de cyberdefenseDes systèmes critiques au coeur des enjeux de cyberdefense
Des systèmes critiques au coeur des enjeux de cyberdefense
 
BSides Huntsville Keynote - Active Cyber Defense Cycle
BSides Huntsville Keynote - Active Cyber Defense CycleBSides Huntsville Keynote - Active Cyber Defense Cycle
BSides Huntsville Keynote - Active Cyber Defense Cycle
 
L'année 2014 de la cyberdéfense
L'année 2014 de la cyberdéfenseL'année 2014 de la cyberdéfense
L'année 2014 de la cyberdéfense
 
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
 
Cyber [crime|war deepsec
Cyber [crime|war deepsecCyber [crime|war deepsec
Cyber [crime|war deepsec
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Cours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts ClésCours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts Clés
 
Principes de bon sens pour une gouvernance cyber sécurité efficiente
Principes de bon sens pour une gouvernance cyber sécurité efficientePrincipes de bon sens pour une gouvernance cyber sécurité efficiente
Principes de bon sens pour une gouvernance cyber sécurité efficiente
 
The science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagementThe science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagement
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybersurveillance : Risques & opportunités
Cybersurveillance : Risques & opportunitésCybersurveillance : Risques & opportunités
Cybersurveillance : Risques & opportunités
 
Cyber Sécurité : Connaître son adversaire pour mieux parer les attaques
Cyber Sécurité : Connaître son adversaire pour mieux parer les attaquesCyber Sécurité : Connaître son adversaire pour mieux parer les attaques
Cyber Sécurité : Connaître son adversaire pour mieux parer les attaques
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Sécurité des systèmes d'information
Sécurité des systèmes d'informationSécurité des systèmes d'information
Sécurité des systèmes d'information
 

Similaire à HSB - Advanced Cyber Defense Center - Michel van Eeten

Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsLionel Briand
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareTzar Umang
 
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...PROIDEA
 
CrimiNee!
CrimiNee!CrimiNee!
CrimiNee!Esri
 
Phishing trends and Collaborative Efforts to Fight Cybercrime
Phishing trends and Collaborative Efforts to Fight CybercrimePhishing trends and Collaborative Efforts to Fight Cybercrime
Phishing trends and Collaborative Efforts to Fight CybercrimeAPNIC
 
SmartData Webinar Slides: How to analyze 72 billion messages a day to find tr...
SmartData Webinar Slides: How to analyze 72 billion messages a day to find tr...SmartData Webinar Slides: How to analyze 72 billion messages a day to find tr...
SmartData Webinar Slides: How to analyze 72 billion messages a day to find tr...DATAVERSITY
 
MLSEV Virtual. One Platform to Rule Them All
MLSEV Virtual. One Platform to Rule Them AllMLSEV Virtual. One Platform to Rule Them All
MLSEV Virtual. One Platform to Rule Them AllBigML, Inc
 
How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ HiveMQ
 
Hyperledger Overview - 20181024
Hyperledger Overview - 20181024Hyperledger Overview - 20181024
Hyperledger Overview - 20181024Arnaud Le Hors
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtechSvetlanaUsikava
 
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBMLéo Lemordant
 
Harnessing Big Data_UCLA
Harnessing Big Data_UCLAHarnessing Big Data_UCLA
Harnessing Big Data_UCLAPaul Barsch
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
SocIoTal: Creating a Citizen - Centric Internet of Things
SocIoTal: Creating a Citizen - Centric Internet of ThingsSocIoTal: Creating a Citizen - Centric Internet of Things
SocIoTal: Creating a Citizen - Centric Internet of ThingsDunavNET
 
Data center and industrial IT infrastructure monitoring practices
Data center and industrial IT infrastructure monitoring practicesData center and industrial IT infrastructure monitoring practices
Data center and industrial IT infrastructure monitoring practicesTibbo
 

Similaire à HSB - Advanced Cyber Defense Center - Michel van Eeten (20)

Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
 
CrimiNee!
CrimiNee!CrimiNee!
CrimiNee!
 
Phishing trends and Collaborative Efforts to Fight Cybercrime
Phishing trends and Collaborative Efforts to Fight CybercrimePhishing trends and Collaborative Efforts to Fight Cybercrime
Phishing trends and Collaborative Efforts to Fight Cybercrime
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
 
SmartData Webinar Slides: How to analyze 72 billion messages a day to find tr...
SmartData Webinar Slides: How to analyze 72 billion messages a day to find tr...SmartData Webinar Slides: How to analyze 72 billion messages a day to find tr...
SmartData Webinar Slides: How to analyze 72 billion messages a day to find tr...
 
MLSEV Virtual. One Platform to Rule Them All
MLSEV Virtual. One Platform to Rule Them AllMLSEV Virtual. One Platform to Rule Them All
MLSEV Virtual. One Platform to Rule Them All
 
How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ
 
Hyperledger Overview - 20181024
Hyperledger Overview - 20181024Hyperledger Overview - 20181024
Hyperledger Overview - 20181024
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtech
 
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
 
DC_OC15_mo
DC_OC15_moDC_OC15_mo
DC_OC15_mo
 
Harnessing Big Data_UCLA
Harnessing Big Data_UCLAHarnessing Big Data_UCLA
Harnessing Big Data_UCLA
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
SocIoTal: Creating a Citizen - Centric Internet of Things
SocIoTal: Creating a Citizen - Centric Internet of ThingsSocIoTal: Creating a Citizen - Centric Internet of Things
SocIoTal: Creating a Citizen - Centric Internet of Things
 
Data center and industrial IT infrastructure monitoring practices
Data center and industrial IT infrastructure monitoring practicesData center and industrial IT infrastructure monitoring practices
Data center and industrial IT infrastructure monitoring practices
 

Plus de Splend

Fiber Vakdag 2019 - Gerben Roseboom - MapXact
Fiber Vakdag 2019 - Gerben Roseboom - MapXactFiber Vakdag 2019 - Gerben Roseboom - MapXact
Fiber Vakdag 2019 - Gerben Roseboom - MapXactSplend
 
Fiber Vakdag 2019 - Lex Wils - FCA
Fiber Vakdag 2019 - Lex Wils - FCAFiber Vakdag 2019 - Lex Wils - FCA
Fiber Vakdag 2019 - Lex Wils - FCASplend
 
Martin Pels - NLNog ring
Martin Pels - NLNog ringMartin Pels - NLNog ring
Martin Pels - NLNog ringSplend
 
Wido den Hollander - IPv6
Wido den Hollander - IPv6Wido den Hollander - IPv6
Wido den Hollander - IPv6Splend
 
Pim van Stam - BGP
Pim van Stam - BGPPim van Stam - BGP
Pim van Stam - BGPSplend
 
Bart Lageweg - Ansible/Cobbler
Bart Lageweg - Ansible/CobblerBart Lageweg - Ansible/Cobbler
Bart Lageweg - Ansible/CobblerSplend
 
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
6projects - Eyle Brinkhuis - SURFnet - Virtuele NetwerkfunctiesSplend
 
HSB15 - Dr. Michel van Eeten - TU Delft
HSB15 - Dr. Michel van Eeten - TU DelftHSB15 - Dr. Michel van Eeten - TU Delft
HSB15 - Dr. Michel van Eeten - TU DelftSplend
 
HSB15 - Xander Jansen - SURFnet
HSB15 - Xander Jansen - SURFnetHSB15 - Xander Jansen - SURFnet
HSB15 - Xander Jansen - SURFnetSplend
 
HSB15 - 0xDUDE
HSB15 - 0xDUDEHSB15 - 0xDUDE
HSB15 - 0xDUDESplend
 
HSB15 - Pavel Minarik - INVEATECH
HSB15 - Pavel Minarik - INVEATECHHSB15 - Pavel Minarik - INVEATECH
HSB15 - Pavel Minarik - INVEATECHSplend
 
HSB15 - Aiko Pras - TU Twente
HSB15 - Aiko Pras - TU TwenteHSB15 - Aiko Pras - TU Twente
HSB15 - Aiko Pras - TU TwenteSplend
 
HSB15 - Lennert den Teuling - ISPConnect
HSB15 - Lennert den Teuling - ISPConnectHSB15 - Lennert den Teuling - ISPConnect
HSB15 - Lennert den Teuling - ISPConnectSplend
 
HSB15 - Thijs Bosschert - Radically Open Security
HSB15 - Thijs Bosschert - Radically Open SecurityHSB15 - Thijs Bosschert - Radically Open Security
HSB15 - Thijs Bosschert - Radically Open SecuritySplend
 
HSB15 - Richard Bosboom - HackerOne
HSB15 - Richard Bosboom - HackerOneHSB15 - Richard Bosboom - HackerOne
HSB15 - Richard Bosboom - HackerOneSplend
 
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?Splend
 
DHPA Techday 2015 - Patrick Savalle - Disruptive Technology
DHPA Techday 2015 - Patrick Savalle - Disruptive TechnologyDHPA Techday 2015 - Patrick Savalle - Disruptive Technology
DHPA Techday 2015 - Patrick Savalle - Disruptive TechnologySplend
 
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into PuppetDHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into PuppetSplend
 
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...Splend
 
DHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP MobilityDHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP MobilitySplend
 

Plus de Splend (20)

Fiber Vakdag 2019 - Gerben Roseboom - MapXact
Fiber Vakdag 2019 - Gerben Roseboom - MapXactFiber Vakdag 2019 - Gerben Roseboom - MapXact
Fiber Vakdag 2019 - Gerben Roseboom - MapXact
 
Fiber Vakdag 2019 - Lex Wils - FCA
Fiber Vakdag 2019 - Lex Wils - FCAFiber Vakdag 2019 - Lex Wils - FCA
Fiber Vakdag 2019 - Lex Wils - FCA
 
Martin Pels - NLNog ring
Martin Pels - NLNog ringMartin Pels - NLNog ring
Martin Pels - NLNog ring
 
Wido den Hollander - IPv6
Wido den Hollander - IPv6Wido den Hollander - IPv6
Wido den Hollander - IPv6
 
Pim van Stam - BGP
Pim van Stam - BGPPim van Stam - BGP
Pim van Stam - BGP
 
Bart Lageweg - Ansible/Cobbler
Bart Lageweg - Ansible/CobblerBart Lageweg - Ansible/Cobbler
Bart Lageweg - Ansible/Cobbler
 
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
6projects - Eyle Brinkhuis - SURFnet - Virtuele Netwerkfuncties
 
HSB15 - Dr. Michel van Eeten - TU Delft
HSB15 - Dr. Michel van Eeten - TU DelftHSB15 - Dr. Michel van Eeten - TU Delft
HSB15 - Dr. Michel van Eeten - TU Delft
 
HSB15 - Xander Jansen - SURFnet
HSB15 - Xander Jansen - SURFnetHSB15 - Xander Jansen - SURFnet
HSB15 - Xander Jansen - SURFnet
 
HSB15 - 0xDUDE
HSB15 - 0xDUDEHSB15 - 0xDUDE
HSB15 - 0xDUDE
 
HSB15 - Pavel Minarik - INVEATECH
HSB15 - Pavel Minarik - INVEATECHHSB15 - Pavel Minarik - INVEATECH
HSB15 - Pavel Minarik - INVEATECH
 
HSB15 - Aiko Pras - TU Twente
HSB15 - Aiko Pras - TU TwenteHSB15 - Aiko Pras - TU Twente
HSB15 - Aiko Pras - TU Twente
 
HSB15 - Lennert den Teuling - ISPConnect
HSB15 - Lennert den Teuling - ISPConnectHSB15 - Lennert den Teuling - ISPConnect
HSB15 - Lennert den Teuling - ISPConnect
 
HSB15 - Thijs Bosschert - Radically Open Security
HSB15 - Thijs Bosschert - Radically Open SecurityHSB15 - Thijs Bosschert - Radically Open Security
HSB15 - Thijs Bosschert - Radically Open Security
 
HSB15 - Richard Bosboom - HackerOne
HSB15 - Richard Bosboom - HackerOneHSB15 - Richard Bosboom - HackerOne
HSB15 - Richard Bosboom - HackerOne
 
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
DHPA Techday 2015 - Patrick Savalle - Are you out of your mind?
 
DHPA Techday 2015 - Patrick Savalle - Disruptive Technology
DHPA Techday 2015 - Patrick Savalle - Disruptive TechnologyDHPA Techday 2015 - Patrick Savalle - Disruptive Technology
DHPA Techday 2015 - Patrick Savalle - Disruptive Technology
 
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into PuppetDHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
DHPA Techday 2015 - Ger Apeldoorn - Deep dive into Puppet
 
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
 
DHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP MobilityDHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP Mobility
 

Dernier

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Dernier (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

HSB - Advanced Cyber Defense Center - Michel van Eeten

  • 1. ACDC General Overview Michel van Eeten, TU Del7 (Work Package Leader)
  • 2. Quick Facts ACDC – Advanced Cyber Defence Centre • Project type: European Pilot Project under CIP-­‐PSP programme • Project duraMon: 30 months (Feb 2013 -­‐ Jul 2015) • Project Volume: 15,5M EUR, co-­‐funded by the European Commission. • 28 Partners from 14 European Countries • Project Lead: eco e.V. -­‐ AssociaMon of the German Internet Industry • Unique consorMum unites: • CERTs • Internet Service Providers • AnMvirus and IT-­‐Security Companies • Academia and Research • Industry (CriMcal Infrastructure Providers, Financial InsMtuMons) • Law Enforcement ACDC General Overview 2
  • 3. Project Goals • Cross-­‐border fight against Botnets (and other threats) • End-­‐to-­‐End approach against Botnets • 1 Central Database (Centralized Data Clearing House) • 1 Community Portal • 8 NaMonal AnM-­‐Botnet-­‐Support Centre • 5 Experiments as a Proof of Concept • Open ACDC Community for external Stakeholders and Partners • Sustainability Plan for ConMnuaMon of the Project • PrevenMon strategies & Awareness raising to End-­‐users • Free MiMgaMon tools and service for End-­‐users across Europe ACDC General Overview 3
  • 4. ACDC – a service approach Detec1on Spam campaign Stolen credenMals Drive-­‐by-­‐ download DDoS traffic detected Centralised reports of botnet behaviour Centralised Data Clearing House Support – no1fying affected customer Mi1ga1on – helping affected customer Security vendor HosMng provider Mobile network provider Bank of customer Standardized report findings Redirect to boBree.eu
  • 5. Internet Service Providers ACDC – central Data Clearing House Central Data Clearing House Sensor Sensor Concentrator Concentrator Sensor Sensor Sensor Sensor Sensor Sensor ACDC NaMonal Support Centres Anonymisa1on Research Industry Law Enforcement Agencies Detec1on Suppor1ng
  • 6. ACDC – Central Data Clearing House Central Data Clearing House Sensor Sensor Concentrator Concentrator Sensor Sensor Sensor Sensor Sensor Sensor Detec1on ü Sensors delivering data directly or through concentrators ü Sensors can request addiMonal feeds to work with ü Data input in any format ü Data output in JSON or YAML ü Central Clearing House facility correlates data ü Data flagging for special purposes q Experiments, q Research or q InvesMgaMons
  • 7. ACDC Community Portal ACDC General Overview 7 • Entry point to ACDC • Handling of Data Sharing Policies • Connects users to soluMons • Inter-­‐connecMng stakeholders to fight botnets • Plahorm to create and deploy soluMons • Open Knowledge Exchange Plahorm • Open RegistraMon to intl. stakeholders https://communityportal.acdc-project.eu
  • 8. (NaMonal) Support Centres ACDC General Overview 8 • Bohree.eu as central point of entry • 8 NaMonal End-­‐User Support Centres • DE, BE, IT, ES, RO, PT, HR, FR • Three columns of support • Prevent • Clean • Inform • Free miMgaMon tools like • EU-­‐Cleaner by Avira • Check-­‐and-­‐Secure.com • Twijer, Blogs, Forum, Email-­‐Support
  • 9. Does it really help? ACDC General Overview 9 • Similar intervenMons are being tried everywhere: • naMonal support centers • data clearing houses • ISP customer noMficaMons • global C&C takedowns • Resources are limited in Mme and magnitude • Which of these measures are most effecMve? • This requires robust compara1ve botnet metrics and careful staMsMcal analysis • Metrics also inform all stakeholders how well (or poorly) network operators are performing in miMgaMng botnet threats • Metrics incenMvize miMgaMon and reward the efforts of good ISPs
  • 10. Global takedown of Zeus C&C Zeus source code leakage
  • 11. QuesMons? Project Website: hjps://acdc-­‐project.eu Community Portal: hjps://communityportal.acdc-­‐project.eu Support Centres: hjps://bohree.eu Twijer: hjps://twijer.com/AnMBotnet Facebook: hjps://www.facebook.com/bohree.eu ACDC General Overview 11 ACDC Main contact: Peter Meyer, eco e.V. (peter.meyer@eco.de) Project Coordinator – ACDC