SlideShare una empresa de Scribd logo
1 de 35
www.enisa.europa.eu
European Critical Internet
Infrastructure: past, present and
future challenges
www.enisa.europa.eu 2
Agenda
• Critical Infrastructures and Critical Information
Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience topics
www.enisa.europa.eu 3
Agenda
• Critical Infrastructures and Critical
Information Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience topics
www.enisa.europa.eu 4
Critical sectors and critical ICT assets
Critical Infrastructures:
• Energy
• Transport
• ICT
• Finance
• Food
• Water
• Safety
• Chemicals
Critical Information
Infrastructures:
• Telecommunications
• Computers/software
• Internet
• Satellites
• Etc.
www.enisa.europa.eu 5
Critical Internet Infrastructure
ICT systems that are essential for the operation of
Internet:
• Physical infrastructure
• Hardware
• Protocols
• Software
• Human infrastructure
www.enisa.europa.eu 6
Internet penetration – 30 June 2012
0,00%
10,00%
20,00%
30,00%
40,00%
50,00%
60,00%
70,00%
80,00%
90,00%
100,00%
www.enisa.europa.eu 7
Average number of users affected, per
incident, per service (in 1000s).
http://www.enisa.europa.eu/activities/Resilience-and-CIIP/Incidents-reporting/annual-reports/annual-incident-reports-2012
www.enisa.europa.eu 8
Agenda
• Critical Infrastructures and Critical Information
Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience topics
www.enisa.europa.eu 9
Recent History – Hurricane Sandy – October 2012
http://www.datacenterknowledge.com/archives/2012/10/30/major-flooding-nyc-data-centers/ http://www.renesys.com/blog/2012/11/sandys-global-impacts.shtml
www.enisa.europa.eu 10
Recent History – Egypt – March 2013
http://www.reuters.com/article/2013/03/27/net-us-egypt-internet-idUSBRE92Q1AQ20130327 https://labs.ripe.net/Members/mirjam/mediterranean-cable-disruption-as-seen-in-ripestat
www.enisa.europa.eu 11
Recent History – Spamhaus – March 2013
http://www.bgpmon.net/looking-at-the-spamhouse-ddos-from-a-bgp-perspective/ https://greenhost.nl/2013/03/21/spam-not-spam-tracking-hijacked-spamhaus-ip/
www.enisa.europa.eu 12
Incidents as source of info
• It is straightforward to divert traffic away from its proper
destination by announcing invalid routes -> youtube 2008,
china 2010, Spamhaus & banking IP Hijack 2013…
• Latent bugs in BGP implementations can disrupt the
system -> Cisco & RIPE unexpected attribute 2010,
Juniper 2011…
• In some parts of the world a small number of cable
systems are critical -> Egypt 2013
• The system is critically dependent on electrical power ->
Hurricane Sandy 2012
• The ecosystem can work well in a crisis -> 9/11, japan
earthquake 2011
www.enisa.europa.eu 13
Potential adverse events
• Regional failure of other critical infrastructure on
which the Internet depends
• Cable cut
• Natural disaster
• Coordinated attack
• Design faults
Cc-by-3.0|Árni Friðriksson
www.enisa.europa.eu 14
Agenda
• Critical Infrastructures and Critical Information
Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience topics
www.enisa.europa.eu 15
Criticality of the Internet Infrastructure
• Internet of things
• M2M
• Interconnected Mobility
• Smart city
• Communications
• Enterprise networks
• E-government
• E-health
C sandro gauci
www.enisa.europa.eu 16
Current issues
• The lack of good information about the state and
behavior of the system
• The scale and complexity of the system
• The dynamic nature of the system
www.enisa.europa.eu 17
Assessing the critical Internet Infrastructure
• Identify assets and
legal frameworks
• Cross‐system
dependencies
• Possible point of
failures not covered by
private sector risk
assessments
• National and European-
scale complete picture
www.enisa.europa.eu 18
Mapping the ecosystem
• The physical infrastructure - commercially
confidential, sometimes overlap with CNI
• The routing infrastructure – hidden by design,
cross borders interdependencies
• The organizational component - different legal
frameworks and maturity levels
www.enisa.europa.eu 19
How the Internet looks like?
• BGP‐derived maps
• AS Router‐Level Topologies
• PoP‐Level Topologies
www.enisa.europa.eu 20
Agenda
• Critical Infrastructures and Critical Information
Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience
topics
www.enisa.europa.eu 21
Metrics and Measurement
• More data:
– Incident Investigation
– Network Performance
– Resilience
• Accurately measure:
– the structure of the Internet
– structural properties of the Internet in a
changing provider ecosystem
www.enisa.europa.eu 22
Policy research
• Common terminology
• Understanding legal frameworks and markets
• Harmonizing approaches
• Define toolset and best practises
• Information sharing frameworks
• Integrated applied research
www.enisa.europa.eu 23
Vulnerability research
• Devices
• MPLS
• BGP
• RPKI
– RPKI-based origin validation
– Path validation
• DNS
– DNSSEC
www.enisa.europa.eu 24
Risk assessment frameworks for Internet
Infrastructures and depending
infrastructures
• Mission critical components
• Operational impact analysis
• Disaster recovery plans
• Operational exercises
www.enisa.europa.eu 25
Emerging topics
• Integrated inventories (GIS, routing,
performance)
• AR and gesture recognition for visualization of
complex systems
• Real time monitoring
• Automated tools for impact assessment and
scenario identification
• Federation of CI and CII early warning systems
www.enisa.europa.eu 26
Network Infrastructure Security and
Resilience
Communication networks
are the building blocks of the information society
www.enisa.europa.eu 27
Food For Thought
370 millions of Internet users at 30 June 2012
500 millions of potential users
www.enisa.europa.eu 28
Rossella Mattioli
rossella.mattioli@enisa.europa.eu
Thank you
www.enisa.europa.eu 29
BGPlay
www.enisa.europa.eu 30
RIPE Atlas
www.enisa.europa.eu 31
Internet Atlas
www.enisa.europa.eu 32
Previous ENISA Work
• 2010 “Secure Routing
Technologies” report
• Gives an overview of
available technologies
and proposed solutions
to secure routing
http://www.enisa.europa.eu/act/res/technologies/tech/routing
www.enisa.europa.eu 33
Previous ENISA Work
• 2010 “Secure Routing”
survey
• Shows that currently there
are only few security
mechanisms implemented
to secure internet routing
on the IP layer
http://www.enisa.europa.eu/act/res/technologies/tech/routing
www.enisa.europa.eu 34
Previous ENISA Work
• 2010 study “Resilience of the
Internet Interconnection
Ecosystem” (aka “Inter-X
Report”)
• Large collection of resilience
aspects of interconnections on all
layers
• Also contains collection of well-
known incidents
https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/interx
www.enisa.europa.eu 35
Previous ENISA Work
• 2011 report “Good Practices in
Resilient Internet Interconnection“
• 15 good practices and 11
recommendations for enhancing
resilience of internet
interconnections
• Recommendation 10: Develop
techniques to accurately
measure the structure of the
Internet
https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/resilience-of-interconnections/report

Más contenido relacionado

La actualidad más candente

International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...IJNSA Journal
 

La actualidad más candente (13)

International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...
 

Similar a European Critical Internet Infrastructure: past, present and future challenges

Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...ijasuc
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 

Similar a European Critical Internet Infrastructure: past, present and future challenges (20)

Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

European Critical Internet Infrastructure: past, present and future challenges

  • 2. www.enisa.europa.eu 2 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 3. www.enisa.europa.eu 3 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 4. www.enisa.europa.eu 4 Critical sectors and critical ICT assets Critical Infrastructures: • Energy • Transport • ICT • Finance • Food • Water • Safety • Chemicals Critical Information Infrastructures: • Telecommunications • Computers/software • Internet • Satellites • Etc.
  • 5. www.enisa.europa.eu 5 Critical Internet Infrastructure ICT systems that are essential for the operation of Internet: • Physical infrastructure • Hardware • Protocols • Software • Human infrastructure
  • 6. www.enisa.europa.eu 6 Internet penetration – 30 June 2012 0,00% 10,00% 20,00% 30,00% 40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00%
  • 7. www.enisa.europa.eu 7 Average number of users affected, per incident, per service (in 1000s). http://www.enisa.europa.eu/activities/Resilience-and-CIIP/Incidents-reporting/annual-reports/annual-incident-reports-2012
  • 8. www.enisa.europa.eu 8 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 9. www.enisa.europa.eu 9 Recent History – Hurricane Sandy – October 2012 http://www.datacenterknowledge.com/archives/2012/10/30/major-flooding-nyc-data-centers/ http://www.renesys.com/blog/2012/11/sandys-global-impacts.shtml
  • 10. www.enisa.europa.eu 10 Recent History – Egypt – March 2013 http://www.reuters.com/article/2013/03/27/net-us-egypt-internet-idUSBRE92Q1AQ20130327 https://labs.ripe.net/Members/mirjam/mediterranean-cable-disruption-as-seen-in-ripestat
  • 11. www.enisa.europa.eu 11 Recent History – Spamhaus – March 2013 http://www.bgpmon.net/looking-at-the-spamhouse-ddos-from-a-bgp-perspective/ https://greenhost.nl/2013/03/21/spam-not-spam-tracking-hijacked-spamhaus-ip/
  • 12. www.enisa.europa.eu 12 Incidents as source of info • It is straightforward to divert traffic away from its proper destination by announcing invalid routes -> youtube 2008, china 2010, Spamhaus & banking IP Hijack 2013… • Latent bugs in BGP implementations can disrupt the system -> Cisco & RIPE unexpected attribute 2010, Juniper 2011… • In some parts of the world a small number of cable systems are critical -> Egypt 2013 • The system is critically dependent on electrical power -> Hurricane Sandy 2012 • The ecosystem can work well in a crisis -> 9/11, japan earthquake 2011
  • 13. www.enisa.europa.eu 13 Potential adverse events • Regional failure of other critical infrastructure on which the Internet depends • Cable cut • Natural disaster • Coordinated attack • Design faults Cc-by-3.0|Árni Friðriksson
  • 14. www.enisa.europa.eu 14 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 15. www.enisa.europa.eu 15 Criticality of the Internet Infrastructure • Internet of things • M2M • Interconnected Mobility • Smart city • Communications • Enterprise networks • E-government • E-health C sandro gauci
  • 16. www.enisa.europa.eu 16 Current issues • The lack of good information about the state and behavior of the system • The scale and complexity of the system • The dynamic nature of the system
  • 17. www.enisa.europa.eu 17 Assessing the critical Internet Infrastructure • Identify assets and legal frameworks • Cross‐system dependencies • Possible point of failures not covered by private sector risk assessments • National and European- scale complete picture
  • 18. www.enisa.europa.eu 18 Mapping the ecosystem • The physical infrastructure - commercially confidential, sometimes overlap with CNI • The routing infrastructure – hidden by design, cross borders interdependencies • The organizational component - different legal frameworks and maturity levels
  • 19. www.enisa.europa.eu 19 How the Internet looks like? • BGP‐derived maps • AS Router‐Level Topologies • PoP‐Level Topologies
  • 20. www.enisa.europa.eu 20 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 21. www.enisa.europa.eu 21 Metrics and Measurement • More data: – Incident Investigation – Network Performance – Resilience • Accurately measure: – the structure of the Internet – structural properties of the Internet in a changing provider ecosystem
  • 22. www.enisa.europa.eu 22 Policy research • Common terminology • Understanding legal frameworks and markets • Harmonizing approaches • Define toolset and best practises • Information sharing frameworks • Integrated applied research
  • 23. www.enisa.europa.eu 23 Vulnerability research • Devices • MPLS • BGP • RPKI – RPKI-based origin validation – Path validation • DNS – DNSSEC
  • 24. www.enisa.europa.eu 24 Risk assessment frameworks for Internet Infrastructures and depending infrastructures • Mission critical components • Operational impact analysis • Disaster recovery plans • Operational exercises
  • 25. www.enisa.europa.eu 25 Emerging topics • Integrated inventories (GIS, routing, performance) • AR and gesture recognition for visualization of complex systems • Real time monitoring • Automated tools for impact assessment and scenario identification • Federation of CI and CII early warning systems
  • 26. www.enisa.europa.eu 26 Network Infrastructure Security and Resilience Communication networks are the building blocks of the information society
  • 27. www.enisa.europa.eu 27 Food For Thought 370 millions of Internet users at 30 June 2012 500 millions of potential users
  • 32. www.enisa.europa.eu 32 Previous ENISA Work • 2010 “Secure Routing Technologies” report • Gives an overview of available technologies and proposed solutions to secure routing http://www.enisa.europa.eu/act/res/technologies/tech/routing
  • 33. www.enisa.europa.eu 33 Previous ENISA Work • 2010 “Secure Routing” survey • Shows that currently there are only few security mechanisms implemented to secure internet routing on the IP layer http://www.enisa.europa.eu/act/res/technologies/tech/routing
  • 34. www.enisa.europa.eu 34 Previous ENISA Work • 2010 study “Resilience of the Internet Interconnection Ecosystem” (aka “Inter-X Report”) • Large collection of resilience aspects of interconnections on all layers • Also contains collection of well- known incidents https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/interx
  • 35. www.enisa.europa.eu 35 Previous ENISA Work • 2011 report “Good Practices in Resilient Internet Interconnection“ • 15 good practices and 11 recommendations for enhancing resilience of internet interconnections • Recommendation 10: Develop techniques to accurately measure the structure of the Internet https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/resilience-of-interconnections/report