Collaborative Security for Protection
 of Financial Critical Infrastructures




             Roberto Baldoni
                CoMiFin
             baldoni@dis.uniroma1.it
Financial Critical Infrastructures
• Financial critical infrastructures are more
  exposed to a variety of coordinated and
  massive cyber attacks
    – Attacks against financial services that supported WikiLe
      aks (2010)
    – Payment card fraud (2008): coordinated
      attackers retrieved 9 million of US dollars
• Risks for financial institutions (FIs)
    – Cost of downtime of an e-service is around 6 millions
      dollars per day
    – Damage to reputation
    – Loss of personal information about customers

 Amsterdam July 5th 2011   Roberto Baldoni                    2
CoMiFin Essential
                     contract
                      contract
                       contract


                   Agre
                       ed        infor
                                       matio
                                            n
 Organization 1
                          warn
                              in      gs
                                                      Collaborative
           ....




                                                       Processing
                                                         System
                                gs
                            rnin
                         wa

                                                n
                                         t io
                                     rma              Internet
Organization M               I   n fo
                        reed
                   Ag


   Amsterdam July 5th 2011                          Roberto Baldoni   3
CoMiFin Essential: sense-and-
 response applications

■ Monitoring
■ Continuous Control
■ Command and Control
■ Mashup Services
■ Business intelligence

 Amsterdam July 5th 2011   Roberto Baldoni   4
CoMiFin Essentials: The notion of
  semantic room
■ Contract
    ■ set of processing and data
        sharing services provided by
        the SR along with the data
        protection, privacy, isolation,
        trust, security, dependability,
        performance requirements.


    ■ The contract also contains the hardware and software requirements a
        member has to provision in order to be admitted into the SR.
■ Objective
   ■ each SR has one strategic objective to meet (e.g, large-scale stealthy scans
        detection, detecting Man-In-The-Middle attacks)
■ Deployment
   ■ highly flexible to accommodate the use of different technologies for the
        implementation of the processing and sharing within the SR (i.e., the
        implementation of the SR logic or functionality).
  Amsterdam July 5th 2011                 Roberto Baldoni                           5
CoMiFin Essentials: Deploying a Semantic
Room

 ■ Private cloud
     ■ Deployment of the semantic room
         through the federation of
         computing and storage
         capabilities at each member
     ■ Each member brings a private
         cloud to federate




                                              Ap
■ Public Cloud



                                                pl
                                                   ica ve
                                                      tio l
 ■ Deployment of the semantic room on



                                                       Le

                                                         n
                                           Co
    a third party cloud provider

                                             lla
                                                            bo Le
 ■ The third party owns all computing
                                                              ra ve
                                                                t io l
    and storage capabilities
■ Hybrid approach                                                   n
                                                          In
                                                            te
                                                              rn
                                                                et
                                                                   Le
                                                                     ve
                                                                       l
   Amsterdam July 5th 2011             Roberto Baldoni                     6
Comifin Essentials: Business
  Vision
• CoMiFin platform can be potentially useful for addressing the following
  business use cases
    – Monitoring and reaction to cyber threats. We have semantic rooms deployment
      for:
           Man-in-the-Browser (privacy preserving)
           Man-in-the-Middle,
           Botnet detection,
           stealthy inter-domain port scan
    – Monitoring and reaction to frauds. We have semantic room deployment for:
           Counterfeit Euros
           Tampered ATM
           Unauthorized POS
    – Anti money laundering monitoring (Sapienza – Italian Intelligence)
    – Interconnection of semantic rooms. We have deployment for:
           stealthy inter-domain port scan semantic room output feeds man-in-the-middle semantic room to
           increase accuracy detection


• Four FAB meeting evaluation sessions (UBS, INTESA SAN PAOLO, SWIFT, ABI)
  that have highlighted its possible business value in real financial use cases.
  Amsterdam July 5th 2011                  Roberto Baldoni                                             7
CoMiFin: Major Achievements

• COMIFIN Architecture&Portal (semantic room
  lifecycle)
• Distributed platform hadoop-based for
  complex event processing : AGILIS
• Esper-Based semantic room platform for
  massive event processing incoming from
                            • EPTS (Event Processing
                              Technical Society) innovation
  trustworthy partners        award 2011
• Developments of           • IBM Faculty Award 2011 for
                                      research in Distributed Massive
     –4    Semantic rooms detecting cyber processing
                                      event attacks
     –1    Semantic room for fraud detection
                                   • TR35 Innovation award 2011
     –1    interconnection of semantic(Giorgia Lodi)
                                       rooms

Amsterdam July 5th 2011      Roberto Baldoni                      8
CoMiFin: Major Achievements (i) -
AGILIS
• Distributed platform hadoop-based for complex event
  processing :
     – AGILIS




Amsterdam July 5th 2011   Roberto Baldoni               9
CoMiFin, Semantic Room I: preventing
inter-domain stealthy scan
    Attacker performs port scanning simultaneously at
    multiple sites trying to identify TCP/UDP ports that
    have been left open. Those ports can then be used
    as the attack vectors

 • Added value of collaboration:
      – Ability to identify an attacker trying to conceal his/her
        activity by accessing only a small number of ports within
        each individual domain
 • Action taken:
      – black list IP addresses
      – update historical records
Amsterdam July 5th 2011     Roberto Baldoni                         10
CoMiFin, Semantic Room I: preventing
inter-domain stealthy scan




Amsterdam July 5th 2011   Roberto Baldoni   11
CoMiFin, Semantic Room I: preventing
inter-domain stealthy scan




Amsterdam July 5th 2011   Roberto Baldoni   12
CoMiFin: Major Achievements – MEF Semantic
Room for Frauds detection and correlation

• Find out possible (spatial/temporal) correlation patterns among
  single isolated applications
          They do not exchange information with each other
          Data are apparently uncorrelated
          Sipaf: Credit card frauds
          Sirfe: Counterfeit banknotes
• From the two applications we extracted three main data flows
  concerning
          Counterfeit Euros (from Sirfe)
          Tampered ATM (from Sipaf)
          Unauthorized POS (from Sipaf)
• We did not consider unauthorized credit card transactions
          due to unavailability of important data such as Italian location



 Amsterdam July 5th 2011             Roberto Baldoni                         13
MEF Semantic Room data processing
• We have identified the following possible
  correlations
    – Mainly based on geo-localization on the entire Italy
           GeoAggregation
                Identifies “hot areas”, i.e., areas (1 Km x 1 Km approximately)
                characterized by a high number of crime episodes of the three
                previously mentioned types
                Data from Sirfe and Sipaf are correlated based on the location
                Scores are assigned to the three data flow types and a threshold
                mechanism is used to identify red (high concentration), yellow
                (medium concentration) and green areas (low concentration)
           Crime Entropy
                Identifies areas characterized by a high number of different crime
                episodes
                Data from Sirfe and Sipaf are correlated based on the location
                  » White areas correspond to high entropy and then high number of
                    different episodes

  Amsterdam July 5th 2011           Roberto Baldoni                                14
MEF Semantic Room: data processing
architecture
                                                    <<ESPER CEP Engine>>


Counterfeit
                  SR gateway                   I/O socket

  euros        adapter         I/O
                              socket


                                                  <<Main Engine>>

 Tampered         SR gateway                             EPL Query
   ATM                         I/O
                adapter
                              socket
                                                                                  alerts
                                                                alert



                  SR gateway
Unauthorized                                      <<invoke>>         <<invoke>>
    POS        adapter         I/O
                              socket




                                                                                            Services
                                                                                            Cloud
                                                                        <<use>>

                                                 subscribers
                      Semantic Room
    Amsterdam July 5th 2011            Roberto Baldoni                                     15
MEF Semantic Room: Counterfeit
Banknotes
Semantic Room: Counterfeit
Banknotes - speculations



                       Day vs. multiplicity V55605030341

More Related Content

PDF
Bic effectplus ws
PDF
Funcion renal
PPT
The french language
PPT
DeMolay Conclave Opening
PPT
HIPS Brochure
PDF
Nessos cluster meeting
PDF
Assert4soa 2nd cluster meeting
PPTX
Yehyounewest2
Bic effectplus ws
Funcion renal
The french language
DeMolay Conclave Opening
HIPS Brochure
Nessos cluster meeting
Assert4soa 2nd cluster meeting
Yehyounewest2

Viewers also liked (7)

PPT
Parcial power point herram web 2.0 25 jul
PDF
NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013
PDF
Effectsplus july event report
PPTX
The super 6
PDF
Wsanacip tampres cluster meeting
PPTX
Presentacion en power point 2
PDF
Отчет по коммуникационной политике банков в Интернете, 2012H1
Parcial power point herram web 2.0 25 jul
NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013
Effectsplus july event report
The super 6
Wsanacip tampres cluster meeting
Presentacion en power point 2
Отчет по коммуникационной политике банков в Интернете, 2012H1
Ad

Similar to Comifin cluster meeting (20)

PDF
ComiFin a_dingsor
PPTX
AGILIS: an on-line map reduce environment for collaborative security
PDF
FIWARE Global Summit - Creating Secured Value Chains for Smart Industries
PPTX
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
PPT
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
PDF
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
PDF
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
PDF
Bro Policy Assignment
PDF
The Security Of Cloud Computing
PDF
PaloAlto Enterprise Security Solution
PDF
Meetup7 integration microservices_machine_learning
PDF
Alleantia LeWeb Paris 2012 Startup Comp preliminary
PPTX
Regin
PDF
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
PDF
Enterprise Of The Future
PDF
Icann Ppt Re New G Tld Eoi Nairobi (2595320)
PDF
Nt2580 Unit 7 Chapter 12
PDF
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
PDF
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
PDF
20180115 Mobile AIoT Networking-ftsai
ComiFin a_dingsor
AGILIS: an on-line map reduce environment for collaborative security
FIWARE Global Summit - Creating Secured Value Chains for Smart Industries
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
Bro Policy Assignment
The Security Of Cloud Computing
PaloAlto Enterprise Security Solution
Meetup7 integration microservices_machine_learning
Alleantia LeWeb Paris 2012 Startup Comp preliminary
Regin
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Enterprise Of The Future
Icann Ppt Re New G Tld Eoi Nairobi (2595320)
Nt2580 Unit 7 Chapter 12
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
20180115 Mobile AIoT Networking-ftsai
Ad

More from fcleary (20)

PDF
Viking vi cisi
PDF
T&s roadmap slides ams
PDF
Effect splus systems-and-network-cluster-results-draft-v1
PDF
Wsanacip tampres cluster meeting
PDF
Vis sense cluster meeting
PDF
Endorse cluster meeting
PDF
Posecco cluster meeting
PDF
Assert4soa cluster meeting
PDF
Nessos securechange cluster meeting
PDF
Massif cluster meeting
PPTX
VIKING cluster meeting 1
PDF
Models Workshop Objectives
PDF
U trustit_cluster meeting
PDF
Massif road mapping_20110704
PDF
Syssec
PDF
Nessos
PDF
Tdl
PDF
Workshop summary software assurance and trust
PDF
Aniketos 2nd cluster meeting
PDF
Posecco clustering meeting
Viking vi cisi
T&s roadmap slides ams
Effect splus systems-and-network-cluster-results-draft-v1
Wsanacip tampres cluster meeting
Vis sense cluster meeting
Endorse cluster meeting
Posecco cluster meeting
Assert4soa cluster meeting
Nessos securechange cluster meeting
Massif cluster meeting
VIKING cluster meeting 1
Models Workshop Objectives
U trustit_cluster meeting
Massif road mapping_20110704
Syssec
Nessos
Tdl
Workshop summary software assurance and trust
Aniketos 2nd cluster meeting
Posecco clustering meeting

Recently uploaded (20)

PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Advancing precision in air quality forecasting through machine learning integ...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
Improvisation in detection of pomegranate leaf disease using transfer learni...
Comparative analysis of machine learning models for fake news detection in so...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Module 1 Introduction to Web Programming .pptx
sbt 2.0: go big (Scala Days 2025 edition)
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Convolutional neural network based encoder-decoder for efficient real-time ob...
Data Virtualization in Action: Scaling APIs and Apps with FME
Advancing precision in air quality forecasting through machine learning integ...
MuleSoft-Compete-Deck for midddleware integrations
Co-training pseudo-labeling for text classification with support vector machi...
4 layer Arch & Reference Arch of IoT.pdf
future_of_ai_comprehensive_20250822032121.pptx
Custom Battery Pack Design Considerations for Performance and Safety

Comifin cluster meeting

  • 1. Collaborative Security for Protection of Financial Critical Infrastructures Roberto Baldoni CoMiFin [email protected]
  • 2. Financial Critical Infrastructures • Financial critical infrastructures are more exposed to a variety of coordinated and massive cyber attacks – Attacks against financial services that supported WikiLe aks (2010) – Payment card fraud (2008): coordinated attackers retrieved 9 million of US dollars • Risks for financial institutions (FIs) – Cost of downtime of an e-service is around 6 millions dollars per day – Damage to reputation – Loss of personal information about customers Amsterdam July 5th 2011 Roberto Baldoni 2
  • 3. CoMiFin Essential contract contract contract Agre ed infor matio n Organization 1 warn in gs Collaborative .... Processing System gs rnin wa n t io rma Internet Organization M I n fo reed Ag Amsterdam July 5th 2011 Roberto Baldoni 3
  • 4. CoMiFin Essential: sense-and- response applications ■ Monitoring ■ Continuous Control ■ Command and Control ■ Mashup Services ■ Business intelligence Amsterdam July 5th 2011 Roberto Baldoni 4
  • 5. CoMiFin Essentials: The notion of semantic room ■ Contract ■ set of processing and data sharing services provided by the SR along with the data protection, privacy, isolation, trust, security, dependability, performance requirements. ■ The contract also contains the hardware and software requirements a member has to provision in order to be admitted into the SR. ■ Objective ■ each SR has one strategic objective to meet (e.g, large-scale stealthy scans detection, detecting Man-In-The-Middle attacks) ■ Deployment ■ highly flexible to accommodate the use of different technologies for the implementation of the processing and sharing within the SR (i.e., the implementation of the SR logic or functionality). Amsterdam July 5th 2011 Roberto Baldoni 5
  • 6. CoMiFin Essentials: Deploying a Semantic Room ■ Private cloud ■ Deployment of the semantic room through the federation of computing and storage capabilities at each member ■ Each member brings a private cloud to federate Ap ■ Public Cloud pl ica ve tio l ■ Deployment of the semantic room on Le n Co a third party cloud provider lla bo Le ■ The third party owns all computing ra ve t io l and storage capabilities ■ Hybrid approach n In te rn et Le ve l Amsterdam July 5th 2011 Roberto Baldoni 6
  • 7. Comifin Essentials: Business Vision • CoMiFin platform can be potentially useful for addressing the following business use cases – Monitoring and reaction to cyber threats. We have semantic rooms deployment for: Man-in-the-Browser (privacy preserving) Man-in-the-Middle, Botnet detection, stealthy inter-domain port scan – Monitoring and reaction to frauds. We have semantic room deployment for: Counterfeit Euros Tampered ATM Unauthorized POS – Anti money laundering monitoring (Sapienza – Italian Intelligence) – Interconnection of semantic rooms. We have deployment for: stealthy inter-domain port scan semantic room output feeds man-in-the-middle semantic room to increase accuracy detection • Four FAB meeting evaluation sessions (UBS, INTESA SAN PAOLO, SWIFT, ABI) that have highlighted its possible business value in real financial use cases. Amsterdam July 5th 2011 Roberto Baldoni 7
  • 8. CoMiFin: Major Achievements • COMIFIN Architecture&Portal (semantic room lifecycle) • Distributed platform hadoop-based for complex event processing : AGILIS • Esper-Based semantic room platform for massive event processing incoming from • EPTS (Event Processing Technical Society) innovation trustworthy partners award 2011 • Developments of • IBM Faculty Award 2011 for research in Distributed Massive –4 Semantic rooms detecting cyber processing event attacks –1 Semantic room for fraud detection • TR35 Innovation award 2011 –1 interconnection of semantic(Giorgia Lodi) rooms Amsterdam July 5th 2011 Roberto Baldoni 8
  • 9. CoMiFin: Major Achievements (i) - AGILIS • Distributed platform hadoop-based for complex event processing : – AGILIS Amsterdam July 5th 2011 Roberto Baldoni 9
  • 10. CoMiFin, Semantic Room I: preventing inter-domain stealthy scan Attacker performs port scanning simultaneously at multiple sites trying to identify TCP/UDP ports that have been left open. Those ports can then be used as the attack vectors • Added value of collaboration: – Ability to identify an attacker trying to conceal his/her activity by accessing only a small number of ports within each individual domain • Action taken: – black list IP addresses – update historical records Amsterdam July 5th 2011 Roberto Baldoni 10
  • 11. CoMiFin, Semantic Room I: preventing inter-domain stealthy scan Amsterdam July 5th 2011 Roberto Baldoni 11
  • 12. CoMiFin, Semantic Room I: preventing inter-domain stealthy scan Amsterdam July 5th 2011 Roberto Baldoni 12
  • 13. CoMiFin: Major Achievements – MEF Semantic Room for Frauds detection and correlation • Find out possible (spatial/temporal) correlation patterns among single isolated applications They do not exchange information with each other Data are apparently uncorrelated Sipaf: Credit card frauds Sirfe: Counterfeit banknotes • From the two applications we extracted three main data flows concerning Counterfeit Euros (from Sirfe) Tampered ATM (from Sipaf) Unauthorized POS (from Sipaf) • We did not consider unauthorized credit card transactions due to unavailability of important data such as Italian location Amsterdam July 5th 2011 Roberto Baldoni 13
  • 14. MEF Semantic Room data processing • We have identified the following possible correlations – Mainly based on geo-localization on the entire Italy GeoAggregation Identifies “hot areas”, i.e., areas (1 Km x 1 Km approximately) characterized by a high number of crime episodes of the three previously mentioned types Data from Sirfe and Sipaf are correlated based on the location Scores are assigned to the three data flow types and a threshold mechanism is used to identify red (high concentration), yellow (medium concentration) and green areas (low concentration) Crime Entropy Identifies areas characterized by a high number of different crime episodes Data from Sirfe and Sipaf are correlated based on the location » White areas correspond to high entropy and then high number of different episodes Amsterdam July 5th 2011 Roberto Baldoni 14
  • 15. MEF Semantic Room: data processing architecture <<ESPER CEP Engine>> Counterfeit SR gateway I/O socket euros adapter I/O socket <<Main Engine>> Tampered SR gateway EPL Query ATM I/O adapter socket alerts alert SR gateway Unauthorized <<invoke>> <<invoke>> POS adapter I/O socket Services Cloud <<use>> subscribers Semantic Room Amsterdam July 5th 2011 Roberto Baldoni 15
  • 16. MEF Semantic Room: Counterfeit Banknotes
  • 17. Semantic Room: Counterfeit Banknotes - speculations Day vs. multiplicity V55605030341