55
Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

Technical tools to handle

cybercrime

NTVA meeting in Datakriminalitet, 20/3/2018

Patrick Bours

NTNU/IIK

Page 2: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

2

Who am I?

Page 3: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

3

Who are we?

Page 4: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

4

Traditional look at IS

• Based on topics:

– Biometrics

– Forensics

– Network security

– Cryptology

– Human/organizational aspects

– Risk management

– Software security

– System security

– Critical infrastructure security

– …

Page 5: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

5

Layered look on IS

5 Societal Models Digital economics; Risk; Socio-technical modelling; Simulation and modelling; Privacy, …

4 Digital Value Chain Dependability and performance in complex digital ecosystems; Safe and secure systems; Robustness; Cyber range; Cyber defense; …

3 Application Domain Cyber-physical systems; Internet of Things (IoT); Cloud; Smart grid; Networked services; Transport; Communication Systems; Healthcare; …

2 Network Technology Telecommunication; Architectures and protocols; Software defined networks; …

1 Enabling Aspects Cryptology; Authentication; Biometrics; Privacy Enhancing Technologies; Digital Forensics; Artificial Intelligence; Machine Learning; …

Page 6: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

6

Today’s presentation

• Threats

• Enabling aspects

– Cryptology

– Digital Forensics

– Biometrics

• Example for a current project

Page 7: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

7

Threats

Page 8: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

8

Threats

Page 9: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

9

Threats

Page 10: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

10

Threats

Page 11: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

11

Threats

Page 12: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

12

Threats

Page 13: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

13

Threats

Page 14: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

14

Threats

Page 15: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

15

Cryptology

• Cryptology = Cryptography + Cryptanalysis

• Cryptography:Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it1

• Cryptanalysis:Cryptanalysis refers to the study of ciphers, ciphertext, or crypto-systems with a view to finding weaknesses in them that will permit retrieval of the plaintext from the ciphertext, without necessarily knowing the key or the algorithm2

1 http://searchsoftwarequality.techtarget.com/definition/cryptography2 http://searchsecurity.techtarget.com/definition/cryptanalysis

Page 16: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

16

Cryptography vs Cryptanalysis:

Enigma vs The Bombe

https://pocketbookuk.com/2015/02/22/the-imitation-game-alan-turing/

Page 17: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

17

Terminology

Page 18: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

18

Terminology

• Alice

• Bob

• Eve

• Carol

• Dave

Page 19: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

19

Terminology

!

?

Page 20: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

20

Symmetric vs Asymmetric

• Symmetric:• Encryption key = Decryption key

• In general: Encryption algorithm ≠ Decryption algorithm

• Both sender and receiver must have the same key K

• Also called Secret Key Crypto

• Key distribution is a problem!

• Must happen before secure communication is possible

• Different keys for different pairs of persons

• Asymmetric• Encryption Key ≠ Decyption key

• In general: Encryption algorithm = Decryption algorithm

• Each user has a pair of keys: 1 public and 1 private (secret)

• Also called Public Key Crypto

• Key distribution is less of a problem

• Public key can be published online

• Must only ensure correctness of published public keys

Page 21: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

21

Symmetric Crypto

Page 22: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

22

Symmetric Crypto

• Example:

• I share different keys with different persons

• If I want to share message “sikkerhet” with Alice, I will use my key to

encrypt the message:

• Cipher text: turvallisuus

• Everybody can try to decrypt this text:

• Bob: ?

• Carol: ?

• Dave: ?

• Eve: ?

• Alice: sikkerhet

• Same message encrypted for

• Bob: güvenlik

• Carol: sicherheit

• Dave: безопасность

• Eve: seguridad

Confidential

Page 23: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

23

Asymmetric Crypto

• Alice makes her public key available to all, but keeps the private

key to herself

Kpub

Kpriv

Page 24: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

24

Asymmetric Crypto

• Analogy:

• Public key:

• Private key:

• Encryption method:

• Key distribution:

Page 25: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

25

Asymmetric Crypto

• Bob wants to send message M to Alice

Kpub

Kpriv

MC=EK(pub) (M)

Page 26: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

26

Asymmetric Crypto

• Alice uses her private key to decrypt the message from Bob

Kpub

Kpriv

M

M=DK(priv) (C)

C=EK(pub) (M)

Page 27: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

27

Digital Forensics

• What not!

Page 28: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

28

Digital Forensics

Page 29: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

29

Malware analysis

• Classification of malware

– Reverse engineering

– “Classical” virus

scanners don’t

always work

– Anomaly

behaviour

detection

Page 30: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

30

Digital Forensics

Page 31: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

31

Digital Forensics

Page 32: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

32

Access control

Page 33: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

33

Access control

Page 34: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

34

Access control

• How can we get access?

1. Password (something we know)

Page 35: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

35

Access Control

• How can we get access?

1. Password (something we know)

2. Token (something we have)

Page 36: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

36

Access Control

• How can we get access?

1. Password (something we know)

2. Token (something we have)

3. Biometrics (something we are / do)

Page 37: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

37

Biometrics

• ISO definition:

– Automated recognition of individuals based on their

behavioural and biological characteristics

– Behavioural has to do with the function of the body

– Biological has to do with the structure of the body

Page 38: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

38

Biological biometrics

Page 39: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

39

Behavioural biometrics

Page 40: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

40

Biometrics

Ridge endings

Singularity

Bifurcations

Page 41: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

41

Biometrics

• Comparison of a reference image against a probe

image

Page 42: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

42

Biometrics

• Comparison of a reference image against a probe

image

Page 43: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

43

Biometrics

• Comparison of a reference image against a probe

image

Page 44: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

44

Biometrics

• Comparison of a reference image against a probe

image

Page 45: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

45

Page 46: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

46

Chatroom Security project

Overall goal:

Protect children in a chatroom from sexual

preditors

Page 47: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

47

Page 48: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

48

Chatroom Security project

Overall goal:

Protect children in a chatroom from sexual

preditors

Page 49: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

49

Cyber safety project

Overall goal:

Protect children in online from sexual predators

or cyber bullying

Page 50: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

50

Profiling

Page 51: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

51

Harassment detection

Page 52: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

52

Grooming

1. Targeting the victim

2. Gaining the victim’s trust

3. Filling a need

4. Isolating the child

5. Sexualizing the relationship

6. Maintaining control

Page 53: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

53

Page 54: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

54

Questions?

• Contact details– Email: [email protected]

– Skype: patrick.bours.norge

– Phone: 611 35 250

Page 55: Technical tools to handle cybercrime · Technical tools to handle cybercrime NTVA meeting in Datakriminalitet, 20/3/2018 Patrick Bours NTNU/IIK

55