SlideShare a Scribd company logo
No  Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling John S. Quarterman Gretchen K. Phillips InternetPerils 1 August 2006 Metricon Vancouver, BC
A Month's Phishing Infestation
Multiple Servers and Targets Both red and green nodes are phishing servers Some churn in ongoing infestation Multiple targets, e.g., paypal and ebay No single target would know this Phishers use leverage of Internet: can't counter that alone Lists of phishing servers from APWG repository Topology & performance data & visualization by InternetPerils Give to collaborate: report phishing to APWG; focus nodes to monitoring companies; etc.;  iterate for collective action
Know Your Network Neighborhood
Hurricane Ivan Meets Cayman Islands
No Substitute ISPs won't tell you (competitive info.; embarrassment) ISPs can't tell you: don't know outside their network Running forensic tools yourself is not enough Need early warning: need independent 3 rd  party data  Need real data for  baselines + longitudinal + ongoing Already watching when events occur + frequent scans to catch event + specific focus + wide view to see related Quantify + visualize for pattern recognition and presentation Tell a story!
Contact Information John S. Quarterman [email_address] Gretchen K. Phillips www.internetperils.com book:  Risk Management Solutions

More Related Content

Viewers also liked (9)

PDF
Electronic Lock with connectivity to alarm system
Jens Ove Albertsen
 
PDF
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
IJMER
 
PDF
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
amiable_indian
 
PPS
Reverse Engineering for exploit writers
amiable_indian
 
PDF
Cisco IOS Attack & Defense - The State of the Art
amiable_indian
 
PDF
Phishing As Tragedy of the Commons
amiable_indian
 
PPS
Workshop on Wireless Security
amiable_indian
 
PDF
Secrets of Top Pentesters
amiable_indian
 
PPS
Workshop on BackTrack live CD
amiable_indian
 
Electronic Lock with connectivity to alarm system
Jens Ove Albertsen
 
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
IJMER
 
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
amiable_indian
 
Reverse Engineering for exploit writers
amiable_indian
 
Cisco IOS Attack & Defense - The State of the Art
amiable_indian
 
Phishing As Tragedy of the Commons
amiable_indian
 
Workshop on Wireless Security
amiable_indian
 
Secrets of Top Pentesters
amiable_indian
 
Workshop on BackTrack live CD
amiable_indian
 

Similar to No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling (17)

PPTX
Extracting the Malware Signal from Internet Noise
EndgameInc
 
PPTX
Extracting the Malware Signal from Internet Noise
Ashwini Almad
 
PPTX
36.44.final
meraz rizel
 
PDF
Apwg trends report_q1_2016
Andrey Apuhtin
 
PDF
Apwg trends report_q4_2015
Andrey Apuhtin
 
PPTX
Finding the source of Ransomware - Wire data analytics
NetFort
 
PDF
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
IJNSA Journal
 
PDF
Apt zero day malware
aspiretss
 
PDF
Anti Phishing Working Group Report 1H 2009
Kim Jensen
 
PDF
HIGH ACCURACY PHISHING DETECTION
IRJET Journal
 
PPTX
Phishing Incident Response Playbook
Naushad CEH, CHFI, MTA, ITIL
 
PDF
Hacklu2011 tricaud
stricaud
 
PPTX
PHISHING DETECTION
umme ayesha
 
PDF
Online Attack Types of Data Breach and Cyberattack Prevention Methods
BRNSSPublicationHubI
 
PDF
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
IJECEIAES
 
PDF
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
IJNSA Journal
 
PDF
Apwg trends report_q1-q3_2015
Andrey Apuhtin
 
Extracting the Malware Signal from Internet Noise
EndgameInc
 
Extracting the Malware Signal from Internet Noise
Ashwini Almad
 
36.44.final
meraz rizel
 
Apwg trends report_q1_2016
Andrey Apuhtin
 
Apwg trends report_q4_2015
Andrey Apuhtin
 
Finding the source of Ransomware - Wire data analytics
NetFort
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
IJNSA Journal
 
Apt zero day malware
aspiretss
 
Anti Phishing Working Group Report 1H 2009
Kim Jensen
 
HIGH ACCURACY PHISHING DETECTION
IRJET Journal
 
Phishing Incident Response Playbook
Naushad CEH, CHFI, MTA, ITIL
 
Hacklu2011 tricaud
stricaud
 
PHISHING DETECTION
umme ayesha
 
Online Attack Types of Data Breach and Cyberattack Prevention Methods
BRNSSPublicationHubI
 
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
IJECEIAES
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
IJNSA Journal
 
Apwg trends report_q1-q3_2015
Andrey Apuhtin
 
Ad

More from amiable_indian (20)

PPS
State of Cyber Law in India
amiable_indian
 
PPS
AntiSpam - Understanding the good, the bad and the ugly
amiable_indian
 
PPS
Reverse Engineering v/s Secure Coding
amiable_indian
 
PPS
Network Vulnerability Assessments: Lessons Learned
amiable_indian
 
PPS
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
PPS
Immune IT: Moving from Security to Immunity
amiable_indian
 
PPS
Reverse Engineering for exploit writers
amiable_indian
 
PPS
Hacking Client Side Insecurities
amiable_indian
 
PDF
Web Exploit Finder Presentation
amiable_indian
 
PPT
Network Security Data Visualization
amiable_indian
 
PPT
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian
 
PDF
Top Network Vulnerabilities Over Time
amiable_indian
 
PDF
What are the Business Security Metrics?
amiable_indian
 
PPT
Advanced Ajax Security
amiable_indian
 
PPT
Network Performance Forecasting System
amiable_indian
 
PDF
Leading Indicators in Information Security
amiable_indian
 
PPT
Ferret - Data Seepage
amiable_indian
 
PPT
SCADA Security
amiable_indian
 
PPT
Security Considerations in Process Control and SCADA Environments
amiable_indian
 
PDF
Fast flux hosting and DNS
amiable_indian
 
State of Cyber Law in India
amiable_indian
 
AntiSpam - Understanding the good, the bad and the ugly
amiable_indian
 
Reverse Engineering v/s Secure Coding
amiable_indian
 
Network Vulnerability Assessments: Lessons Learned
amiable_indian
 
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
Immune IT: Moving from Security to Immunity
amiable_indian
 
Reverse Engineering for exploit writers
amiable_indian
 
Hacking Client Side Insecurities
amiable_indian
 
Web Exploit Finder Presentation
amiable_indian
 
Network Security Data Visualization
amiable_indian
 
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian
 
Top Network Vulnerabilities Over Time
amiable_indian
 
What are the Business Security Metrics?
amiable_indian
 
Advanced Ajax Security
amiable_indian
 
Network Performance Forecasting System
amiable_indian
 
Leading Indicators in Information Security
amiable_indian
 
Ferret - Data Seepage
amiable_indian
 
SCADA Security
amiable_indian
 
Security Considerations in Process Control and SCADA Environments
amiable_indian
 
Fast flux hosting and DNS
amiable_indian
 
Ad

Recently uploaded (20)

PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
July Patch Tuesday
Ivanti
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 

No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling

  • 1. No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling John S. Quarterman Gretchen K. Phillips InternetPerils 1 August 2006 Metricon Vancouver, BC
  • 2. A Month's Phishing Infestation
  • 3. Multiple Servers and Targets Both red and green nodes are phishing servers Some churn in ongoing infestation Multiple targets, e.g., paypal and ebay No single target would know this Phishers use leverage of Internet: can't counter that alone Lists of phishing servers from APWG repository Topology & performance data & visualization by InternetPerils Give to collaborate: report phishing to APWG; focus nodes to monitoring companies; etc.; iterate for collective action
  • 4. Know Your Network Neighborhood
  • 5. Hurricane Ivan Meets Cayman Islands
  • 6. No Substitute ISPs won't tell you (competitive info.; embarrassment) ISPs can't tell you: don't know outside their network Running forensic tools yourself is not enough Need early warning: need independent 3 rd party data Need real data for baselines + longitudinal + ongoing Already watching when events occur + frequent scans to catch event + specific focus + wide view to see related Quantify + visualize for pattern recognition and presentation Tell a story!
  • 7. Contact Information John S. Quarterman [email_address] Gretchen K. Phillips www.internetperils.com book: Risk Management Solutions