12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010 155should also address all relevant protocols, because <strong>Web</strong>threats leverage multiple protocols <strong>in</strong> their attacks, <strong>in</strong>particular email as the <strong>in</strong>itial delivery mechanism and the<strong>Web</strong> as the threat host. However, other mechanisms canalso help perpetrate attacks such as l<strong>in</strong>ks <strong>in</strong> IM and<strong>in</strong>fected files.Coord<strong>in</strong>at<strong>in</strong>g measures requires efficient, centralizedmanagement <strong>of</strong> region-specific expertise to help addressthe regional, and even localized nature <strong>of</strong> many <strong>of</strong> thethreats. The key to effectively address<strong>in</strong>g <strong>Web</strong> threats is amulti-layered approach. The network po<strong>in</strong>ts arecategorized <strong>in</strong> four different layers (see Figure 2): 1) “<strong>in</strong>the-cloud”(i.e. before the traffic reaches the Internetgateway), 2) at the Internet gateway, 3) across the networkservers, 4) and at the endpo<strong>in</strong>t (for example, the client). Inthe below example, the description uses the po<strong>in</strong>ts <strong>in</strong> thenetwork for high level organization and describes theprotocol protection and security technologies that can bedeployed at these po<strong>in</strong>ts. The subsections on protocolprotection and security technologies describe emailsolutions first, which is <strong>of</strong>ten the first step <strong>in</strong> a <strong>Web</strong> threatattack, followed by <strong>Web</strong> solutions that directly protect<strong>Web</strong> usage.A multi-layered approach is needed to protect aga<strong>in</strong>stthe broad range <strong>of</strong> <strong>Web</strong> threatsDNA <strong>of</strong> an Ideal Solution:Dynamic, real-time detection <strong>of</strong> threat: F<strong>in</strong>ds thelatest stealth, 0-day attacksAccurate detection: No false positives, and no falsenegativesReturn on security <strong>in</strong>vestment: Easy to <strong>in</strong>stall,manage, support and scaleVIII. CONCLUSION<strong>Web</strong> threats are prevalent today and are grow<strong>in</strong>g <strong>in</strong>numbers and impact. Their complexity, large number <strong>of</strong>variants, and use <strong>of</strong> multiple vectors, comb<strong>in</strong>ed with theirexploitation <strong>of</strong> the most commonly used medium today -the <strong>Web</strong> - make <strong>Web</strong> threats the most challeng<strong>in</strong>g threatthat consumers, bus<strong>in</strong>esses, and services providers, havefaced <strong>in</strong> a long time.Potential costs associated with these threats <strong>in</strong>cludeconfidential <strong>in</strong>formation leakage and theft <strong>of</strong> networkresources, with the adverse impact <strong>of</strong> erosion <strong>of</strong>customers, trust, and brand reputation; regulatory andlegal implications; negative public relations; and loss <strong>of</strong>competitive advantage. Because conventional approachesfail to protect aga<strong>in</strong>st <strong>Web</strong> threats, the <strong>in</strong>formationsecurity <strong>in</strong>dustry is at a crossroads. Bus<strong>in</strong>esses <strong>of</strong> all sizes,as well as service providers, need to deploy solutions viaan <strong>in</strong>tegrated, multi-layered approach to provide real-time,comprehensive protection aga<strong>in</strong>st these threats.REFERENCES1. Gregg Keizer, Computerworld, August 19, 2007, “Identityattack spreads; 1.6M records stolen from Monster.com,”http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9031418&pageNumber=1.2. Dan Kaplan, SC Magaz<strong>in</strong>e, October 30, 2007, “FTC SpamConta<strong>in</strong>s Keylogg<strong>in</strong>g Trojan”,http://www.scmagaz<strong>in</strong>eus.com/FTC-spam-conta<strong>in</strong>skeylogg<strong>in</strong>g-trojan/article/58273/3. Paul F. Roberts, eWeek.com, December 16, 2005, “SpearPhish<strong>in</strong>g Attack Targets Credit Unions,”http://www.eweek.com/article2/0,1895,1902896,00.asp.4. IDC, press release, July 18, 2006, “Private Internet Use byStaff Threatens IT Security <strong>in</strong> Danish Companies, SaysIDC,”http://www.idc.com/getdoc.jsp?conta<strong>in</strong>erId=pr2006_07_14_125434.5. Cara Garretson, NetworkWorld.com, January 11, 2006,“Spam that Delivers a P<strong>in</strong>k Slip”http://www.networkworld.com/news/2006/110106-spamspear-phish<strong>in</strong>g.html6. Gregg Keizer, Tech<strong>Web</strong> Technology News, January 24, 2006,“Botnet Creator Pleads Guilty, Faces 25 Years,”http://www.techweb.com/wire/security/177103378.7. Marius Oiaga, S<strong>of</strong>tpedia, October 4, 2006, “Hack<strong>in</strong>g RussianTrio Gets 24 Years <strong>in</strong> Prison,”http://news.s<strong>of</strong>tpedia.com/news/Hack<strong>in</strong>g-Russian-Trio-Gets-24-Years-<strong>in</strong>-Prison-37149.shtml.8. Byron Acohido and Jon Swartz, USA TODAY “Cybercrimeflourishes <strong>in</strong> onl<strong>in</strong>e hacker forums,” October 11, 2006,http://www.usatoday.com/tech/news/computersecurity/<strong>in</strong>fotheft/2006-10-11-cybercrime-hackerforums_x.htm.9. Police <strong>of</strong> the City <strong>of</strong> Munich, August 25, 2006,http://www.sueddeutsche.de/,tt3m3/muenchen/artikel/612/83529.10. Avivah Litan, “Phish<strong>in</strong>g Attacks Escalate, Morph, and CauseConsiderable Damage,” Gartner, December 12, 2007.11. Tom Krazit, Cnet, “Two <strong>in</strong> three retail PCs are notebooks,”December 20, 2006,http://news.com.com/Two+<strong>in</strong>+three+retail+PCs+are+notebooks/2100-1044_3-6144921.html.12. Niels Provos, Dean McNamee, Panayiotis Mavrommatis, KeWang, and Nagendra Modadugu: The Ghost <strong>in</strong> the BrowserAnalysis <strong>of</strong> <strong>Web</strong>-based Malware, May 2007.13 David Barroso, ENISA Position Paper No. 3: Botnets – TheSilent Threat, November 2007,http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_botnets.pdf.14 Panda Security,http://www.pandasecurity.com/homeusers/media/pressreleases/viewnews?noticia=9077© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!