SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Design of Indonesia Malware Attack
    g
        Monitorin Center
                ng

                   7th Ma 2012
                        ay
      Indonesia Security Conference 2012
                       y
                Markassar Indonesia
                        r,


    Charles Lim, Msc., ECSA ECSP, ECIH, CEH, CEI
                          A,
      Indonesia Honeynet Project Chapter Lead
AGEN
                 NDA

Problem Statement
Honeynet – capturin autonomous
                  ng
spreading malware
Distributed Honeynet Sensors
System Architecture
                  e
National Monitoring Center
                  g
Conclusion and Rec
                 commendation



                    2
Problem S
                    Statement
IDSIRTII has experime t d with h
         h        i ented ith honeypot
                                     t
using nepenthes and ddionaea


Swiss German Univers  sity, independently, has
also experimented hon neypot using nepenthes
and dionaea for at leas 2 years
                      st


No existing grand des
                    sign to place sensors
around Indonesia and monitor actual malware
attacks around Indone
                    esia


                      3
Hone
                   eynet
Honeynet is a collectio of honeypots
                      on


“Is a decoy that is use to lured malware or
                      ed
attacker (hacker).”
         (hacker) ”


“It is a computer that h
                       have no production
value, so if it is compr
                       romised or destroyed
should not affect the aactivities of the
companies.”
      p



                      4
Honeypot Based on Interaction
                   d


Two kinds of honeypo :
                   ot

  Low Interaction Honeypo
                        ot


  High Interaction Honeyp
                        pot




                         5
Low Interactio Honeypot
                    on

Do not implements actual service
Disguise as a real s
                   system
Good for finding known attack and
               g
expected behavior
Usually automated
Lower cost needed
Example : Nepenthe Amun, Dionaea
                 es,



                    6
High Interaction Honeypot

It is a “real” system usually with
                    m
different configuration than the real
                g
system.
Riskier than Low-Interacti it d e to
             Lo Interactivity due
“Allow all” configur
                   ration
Difficult to maintain and manually
                    n
configure
Higher cost needed
Example : Physical HIH, Virtual HIH

                     7
Table of Co
                               omparison

                         Low-inte
                                eraction      High-interaction

Degree of interaction           Lo
                                 ow                 High


Real operating system           No
                                N                    Yes


        Risk                    Lo
                                 ow                 High


   Knowledge gain        Connectio
                                 on/Request       Everything


 Can be conquered               No
                                N                    Yes


  Maintenance time              Lo
                                 ow                 High



                                  8
SGU Honeynet Project
        y




          9
SGU Honeynet Report
        y




         10
SGU Honeynet Report
        y




         11
SGU Honeynet Report
        y




         12
Distributed Hon
              neynet Sensors




        Indonesia Honeynet
        Malwar Repository
              re

              13
System Ar
        rchitecture




 In Progress
National Monitoring Center
Design for National Mo
                     onitoring Center for
Malware Attack proposal is work in progress


KEMKOMINFO has committed to the work and
the first pilot will invol about 10 nodes
                         lve
within this year in diffeerent cities in Indonesia
National Conference
1st Academy CERT on Malware Research
  http://www.sgu.ac.id/aca
                         ademy cert meeting
                         ademy-cert-meeting
2nd Academy CSIRT on Malware Lab Setup
                   n
  http://www.slideshare.net/ h l li /
  htt //      lid h      et/charles.lim/workshop-on-
                                           k h
  setting-up-malware-lab
3rd A d
  d Academy CSIRT on M l
                   n Malware Reporting
                             R    ti
  To be held on 30th May t 2nd June 2012,
                         to
  http://csirt.itmaranatha.o
                           org/event/201205/
International Conference
SecureAsia 2011, Jaka
                    arta, Indonesia
  http://www.informationse
                         ecurityasia.com/2011/confere
  nce/agenda.html
FIRST 2012 Conferenc Bali, Indonesia
                   ce,
  http://event.idsirtii.or.id/w
                              wp-
  content/uploads/2011/10     0/FIRST-TC-PROGRAMS-
  LATEST-UPDATE1.pdf
Thank You
Th k Y
Questions
    t




    19

Contenu connexe

En vedette

IPv6 Fundamentals & Securities
IPv6 Fundamentals & SecuritiesIPv6 Fundamentals & Securities
IPv6 Fundamentals & Securities
Don Anto
 
Mobile security-an-introduction - za
Mobile security-an-introduction - zaMobile security-an-introduction - za
Mobile security-an-introduction - za
idsecconf
 
Linux kernel-rootkit-dev - Wonokaerun
Linux kernel-rootkit-dev - WonokaerunLinux kernel-rootkit-dev - Wonokaerun
Linux kernel-rootkit-dev - Wonokaerun
idsecconf
 

En vedette (20)

Turning tl mr 3020 into automate wireless attacker
Turning tl mr 3020 into automate wireless attackerTurning tl mr 3020 into automate wireless attacker
Turning tl mr 3020 into automate wireless attacker
 
Analisa kejahatan menggunakan jaringan gsm
Analisa kejahatan menggunakan jaringan gsm Analisa kejahatan menggunakan jaringan gsm
Analisa kejahatan menggunakan jaringan gsm
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Doan P. Sinaga, Alex F. Manihuruk, Kevin G.A.T. Pardosi - Securing SCADA Syst...
Doan P. Sinaga, Alex F. Manihuruk, Kevin G.A.T. Pardosi - Securing SCADA Syst...Doan P. Sinaga, Alex F. Manihuruk, Kevin G.A.T. Pardosi - Securing SCADA Syst...
Doan P. Sinaga, Alex F. Manihuruk, Kevin G.A.T. Pardosi - Securing SCADA Syst...
 
Hollywood style decryption
Hollywood style decryptionHollywood style decryption
Hollywood style decryption
 
Secure Data Center on Cloud Environment, Case Study on GamaBox Cloud Infrastr...
Secure Data Center on Cloud Environment, Case Study on GamaBox Cloud Infrastr...Secure Data Center on Cloud Environment, Case Study on GamaBox Cloud Infrastr...
Secure Data Center on Cloud Environment, Case Study on GamaBox Cloud Infrastr...
 
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
 
Various way of protecting your cloud server port - Abdullah
Various way of protecting your cloud server port - AbdullahVarious way of protecting your cloud server port - Abdullah
Various way of protecting your cloud server port - Abdullah
 
IPv6 Fundamentals & Securities
IPv6 Fundamentals & SecuritiesIPv6 Fundamentals & Securities
IPv6 Fundamentals & Securities
 
Mobile security-an-introduction - za
Mobile security-an-introduction - zaMobile security-an-introduction - za
Mobile security-an-introduction - za
 
Distributed Cracking
Distributed CrackingDistributed Cracking
Distributed Cracking
 
BGP Vulnerability
BGP VulnerabilityBGP Vulnerability
BGP Vulnerability
 
Linux kernel-rootkit-dev - Wonokaerun
Linux kernel-rootkit-dev - WonokaerunLinux kernel-rootkit-dev - Wonokaerun
Linux kernel-rootkit-dev - Wonokaerun
 
Penetration Tool Berbasis Sistem Terdistribusi untuk Analisa Vulnerability Pa...
Penetration Tool Berbasis Sistem Terdistribusi untuk Analisa Vulnerability Pa...Penetration Tool Berbasis Sistem Terdistribusi untuk Analisa Vulnerability Pa...
Penetration Tool Berbasis Sistem Terdistribusi untuk Analisa Vulnerability Pa...
 
Riko Rahmada - Sertifikat dan Tanda Tangan Digital Indonesia
Riko Rahmada - Sertifikat dan Tanda Tangan Digital IndonesiaRiko Rahmada - Sertifikat dan Tanda Tangan Digital Indonesia
Riko Rahmada - Sertifikat dan Tanda Tangan Digital Indonesia
 
Danang Jaya, Query Adika Rezylana - Steganografi DCT dengan Memanfaatkan Apli...
Danang Jaya, Query Adika Rezylana - Steganografi DCT dengan Memanfaatkan Apli...Danang Jaya, Query Adika Rezylana - Steganografi DCT dengan Memanfaatkan Apli...
Danang Jaya, Query Adika Rezylana - Steganografi DCT dengan Memanfaatkan Apli...
 
Network & Computer Forensic
Network & Computer Forensic Network & Computer Forensic
Network & Computer Forensic
 
Code review and security audit in private cloud - Arief Karfianto
Code review and security audit in private cloud - Arief KarfiantoCode review and security audit in private cloud - Arief Karfianto
Code review and security audit in private cloud - Arief Karfianto
 
Web & Wireless Hacking
Web & Wireless HackingWeb & Wireless Hacking
Web & Wireless Hacking
 
Pendekatan secure by design pada cluster resource allocation untuk pusat data
Pendekatan secure by design pada cluster resource allocation untuk pusat dataPendekatan secure by design pada cluster resource allocation untuk pusat data
Pendekatan secure by design pada cluster resource allocation untuk pusat data
 

Similaire à Design of Indonesia Malware Attack Monitoring Center - Charles Lim

Alexandros Papanikolaou PROmis
Alexandros Papanikolaou PROmisAlexandros Papanikolaou PROmis
Alexandros Papanikolaou PROmis
Ignite_Athens
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN
 

Similaire à Design of Indonesia Malware Attack Monitoring Center - Charles Lim (20)

Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
HoneyPots.pptx
HoneyPots.pptxHoneyPots.pptx
HoneyPots.pptx
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Workshop on Setting up Malware Lab
Workshop on Setting up Malware LabWorkshop on Setting up Malware Lab
Workshop on Setting up Malware Lab
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Alexandros Papanikolaou PROmis
Alexandros Papanikolaou PROmisAlexandros Papanikolaou PROmis
Alexandros Papanikolaou PROmis
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
 

Plus de idsecconf

Plus de idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Design of Indonesia Malware Attack Monitoring Center - Charles Lim

  • 1. Design of Indonesia Malware Attack g Monitorin Center ng 7th Ma 2012 ay Indonesia Security Conference 2012 y Markassar Indonesia r, Charles Lim, Msc., ECSA ECSP, ECIH, CEH, CEI A, Indonesia Honeynet Project Chapter Lead
  • 2. AGEN NDA Problem Statement Honeynet – capturin autonomous ng spreading malware Distributed Honeynet Sensors System Architecture e National Monitoring Center g Conclusion and Rec commendation 2
  • 3. Problem S Statement IDSIRTII has experime t d with h h i ented ith honeypot t using nepenthes and ddionaea Swiss German Univers sity, independently, has also experimented hon neypot using nepenthes and dionaea for at leas 2 years st No existing grand des sign to place sensors around Indonesia and monitor actual malware attacks around Indone esia 3
  • 4. Hone eynet Honeynet is a collectio of honeypots on “Is a decoy that is use to lured malware or ed attacker (hacker).” (hacker) ” “It is a computer that h have no production value, so if it is compr romised or destroyed should not affect the aactivities of the companies.” p 4
  • 5. Honeypot Based on Interaction d Two kinds of honeypo : ot Low Interaction Honeypo ot High Interaction Honeyp pot 5
  • 6. Low Interactio Honeypot on Do not implements actual service Disguise as a real s system Good for finding known attack and g expected behavior Usually automated Lower cost needed Example : Nepenthe Amun, Dionaea es, 6
  • 7. High Interaction Honeypot It is a “real” system usually with m different configuration than the real g system. Riskier than Low-Interacti it d e to Lo Interactivity due “Allow all” configur ration Difficult to maintain and manually n configure Higher cost needed Example : Physical HIH, Virtual HIH 7
  • 8. Table of Co omparison Low-inte eraction High-interaction Degree of interaction Lo ow High Real operating system No N Yes Risk Lo ow High Knowledge gain Connectio on/Request Everything Can be conquered No N Yes Maintenance time Lo ow High 8
  • 13. Distributed Hon neynet Sensors Indonesia Honeynet Malwar Repository re 13
  • 14. System Ar rchitecture In Progress
  • 15. National Monitoring Center Design for National Mo onitoring Center for Malware Attack proposal is work in progress KEMKOMINFO has committed to the work and the first pilot will invol about 10 nodes lve within this year in diffeerent cities in Indonesia
  • 16. National Conference 1st Academy CERT on Malware Research http://www.sgu.ac.id/aca ademy cert meeting ademy-cert-meeting 2nd Academy CSIRT on Malware Lab Setup n http://www.slideshare.net/ h l li / htt // lid h et/charles.lim/workshop-on- k h setting-up-malware-lab 3rd A d d Academy CSIRT on M l n Malware Reporting R ti To be held on 30th May t 2nd June 2012, to http://csirt.itmaranatha.o org/event/201205/
  • 17. International Conference SecureAsia 2011, Jaka arta, Indonesia http://www.informationse ecurityasia.com/2011/confere nce/agenda.html FIRST 2012 Conferenc Bali, Indonesia ce, http://event.idsirtii.or.id/w wp- content/uploads/2011/10 0/FIRST-TC-PROGRAMS- LATEST-UPDATE1.pdf
  • 19. Questions t 19