SlideShare ist ein Scribd-Unternehmen logo
1 von 35
www.enisa.europa.eu
European Critical Internet
Infrastructure: past, present and
future challenges
www.enisa.europa.eu 2
Agenda
• Critical Infrastructures and Critical Information
Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience topics
www.enisa.europa.eu 3
Agenda
• Critical Infrastructures and Critical
Information Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience topics
www.enisa.europa.eu 4
Critical sectors and critical ICT assets
Critical Infrastructures:
• Energy
• Transport
• ICT
• Finance
• Food
• Water
• Safety
• Chemicals
Critical Information
Infrastructures:
• Telecommunications
• Computers/software
• Internet
• Satellites
• Etc.
www.enisa.europa.eu 5
Critical Internet Infrastructure
ICT systems that are essential for the operation of
Internet:
• Physical infrastructure
• Hardware
• Protocols
• Software
• Human infrastructure
www.enisa.europa.eu 6
Internet penetration – 30 June 2012
0,00%
10,00%
20,00%
30,00%
40,00%
50,00%
60,00%
70,00%
80,00%
90,00%
100,00%
www.enisa.europa.eu 7
Average number of users affected, per
incident, per service (in 1000s).
http://www.enisa.europa.eu/activities/Resilience-and-CIIP/Incidents-reporting/annual-reports/annual-incident-reports-2012
www.enisa.europa.eu 8
Agenda
• Critical Infrastructures and Critical Information
Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience topics
www.enisa.europa.eu 9
Recent History – Hurricane Sandy – October 2012
http://www.datacenterknowledge.com/archives/2012/10/30/major-flooding-nyc-data-centers/ http://www.renesys.com/blog/2012/11/sandys-global-impacts.shtml
www.enisa.europa.eu 10
Recent History – Egypt – March 2013
http://www.reuters.com/article/2013/03/27/net-us-egypt-internet-idUSBRE92Q1AQ20130327 https://labs.ripe.net/Members/mirjam/mediterranean-cable-disruption-as-seen-in-ripestat
www.enisa.europa.eu 11
Recent History – Spamhaus – March 2013
http://www.bgpmon.net/looking-at-the-spamhouse-ddos-from-a-bgp-perspective/ https://greenhost.nl/2013/03/21/spam-not-spam-tracking-hijacked-spamhaus-ip/
www.enisa.europa.eu 12
Incidents as source of info
• It is straightforward to divert traffic away from its proper
destination by announcing invalid routes -> youtube 2008,
china 2010, Spamhaus & banking IP Hijack 2013…
• Latent bugs in BGP implementations can disrupt the
system -> Cisco & RIPE unexpected attribute 2010,
Juniper 2011…
• In some parts of the world a small number of cable
systems are critical -> Egypt 2013
• The system is critically dependent on electrical power ->
Hurricane Sandy 2012
• The ecosystem can work well in a crisis -> 9/11, japan
earthquake 2011
www.enisa.europa.eu 13
Potential adverse events
• Regional failure of other critical infrastructure on
which the Internet depends
• Cable cut
• Natural disaster
• Coordinated attack
• Design faults
Cc-by-3.0|Árni Friðriksson
www.enisa.europa.eu 14
Agenda
• Critical Infrastructures and Critical Information
Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience topics
www.enisa.europa.eu 15
Criticality of the Internet Infrastructure
• Internet of things
• M2M
• Interconnected Mobility
• Smart city
• Communications
• Enterprise networks
• E-government
• E-health
C sandro gauci
www.enisa.europa.eu 16
Current issues
• The lack of good information about the state and
behavior of the system
• The scale and complexity of the system
• The dynamic nature of the system
www.enisa.europa.eu 17
Assessing the critical Internet Infrastructure
• Identify assets and
legal frameworks
• Cross‐system
dependencies
• Possible point of
failures not covered by
private sector risk
assessments
• National and European-
scale complete picture
www.enisa.europa.eu 18
Mapping the ecosystem
• The physical infrastructure - commercially
confidential, sometimes overlap with CNI
• The routing infrastructure – hidden by design,
cross borders interdependencies
• The organizational component - different legal
frameworks and maturity levels
www.enisa.europa.eu 19
How the Internet looks like?
• BGP‐derived maps
• AS Router‐Level Topologies
• PoP‐Level Topologies
www.enisa.europa.eu 20
Agenda
• Critical Infrastructures and Critical Information
Infrastructures
• Large scale incidents
• Criticality of the Internet Infrastructure
• Future research: security and resilience
topics
www.enisa.europa.eu 21
Metrics and Measurement
• More data:
– Incident Investigation
– Network Performance
– Resilience
• Accurately measure:
– the structure of the Internet
– structural properties of the Internet in a
changing provider ecosystem
www.enisa.europa.eu 22
Policy research
• Common terminology
• Understanding legal frameworks and markets
• Harmonizing approaches
• Define toolset and best practises
• Information sharing frameworks
• Integrated applied research
www.enisa.europa.eu 23
Vulnerability research
• Devices
• MPLS
• BGP
• RPKI
– RPKI-based origin validation
– Path validation
• DNS
– DNSSEC
www.enisa.europa.eu 24
Risk assessment frameworks for Internet
Infrastructures and depending
infrastructures
• Mission critical components
• Operational impact analysis
• Disaster recovery plans
• Operational exercises
www.enisa.europa.eu 25
Emerging topics
• Integrated inventories (GIS, routing,
performance)
• AR and gesture recognition for visualization of
complex systems
• Real time monitoring
• Automated tools for impact assessment and
scenario identification
• Federation of CI and CII early warning systems
www.enisa.europa.eu 26
Network Infrastructure Security and
Resilience
Communication networks
are the building blocks of the information society
www.enisa.europa.eu 27
Food For Thought
370 millions of Internet users at 30 June 2012
500 millions of potential users
www.enisa.europa.eu 28
Rossella Mattioli
rossella.mattioli@enisa.europa.eu
Thank you
www.enisa.europa.eu 29
BGPlay
www.enisa.europa.eu 30
RIPE Atlas
www.enisa.europa.eu 31
Internet Atlas
www.enisa.europa.eu 32
Previous ENISA Work
• 2010 “Secure Routing
Technologies” report
• Gives an overview of
available technologies
and proposed solutions
to secure routing
http://www.enisa.europa.eu/act/res/technologies/tech/routing
www.enisa.europa.eu 33
Previous ENISA Work
• 2010 “Secure Routing”
survey
• Shows that currently there
are only few security
mechanisms implemented
to secure internet routing
on the IP layer
http://www.enisa.europa.eu/act/res/technologies/tech/routing
www.enisa.europa.eu 34
Previous ENISA Work
• 2010 study “Resilience of the
Internet Interconnection
Ecosystem” (aka “Inter-X
Report”)
• Large collection of resilience
aspects of interconnections on all
layers
• Also contains collection of well-
known incidents
https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/interx
www.enisa.europa.eu 35
Previous ENISA Work
• 2011 report “Good Practices in
Resilient Internet Interconnection“
• 15 good practices and 11
recommendations for enhancing
resilience of internet
interconnections
• Recommendation 10: Develop
techniques to accurately
measure the structure of the
Internet
https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/resilience-of-interconnections/report

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (13)

International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...Call for Papers - International Conference on Networks, Blockchain and Intern...
Call for Papers - International Conference on Networks, Blockchain and Intern...
 

Ähnlich wie European Critical Internet Infrastructure: past, present and future challenges

Ähnlich wie European Critical Internet Infrastructure: past, present and future challenges (20)

Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Inter...
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

European Critical Internet Infrastructure: past, present and future challenges

  • 2. www.enisa.europa.eu 2 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 3. www.enisa.europa.eu 3 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 4. www.enisa.europa.eu 4 Critical sectors and critical ICT assets Critical Infrastructures: • Energy • Transport • ICT • Finance • Food • Water • Safety • Chemicals Critical Information Infrastructures: • Telecommunications • Computers/software • Internet • Satellites • Etc.
  • 5. www.enisa.europa.eu 5 Critical Internet Infrastructure ICT systems that are essential for the operation of Internet: • Physical infrastructure • Hardware • Protocols • Software • Human infrastructure
  • 6. www.enisa.europa.eu 6 Internet penetration – 30 June 2012 0,00% 10,00% 20,00% 30,00% 40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00%
  • 7. www.enisa.europa.eu 7 Average number of users affected, per incident, per service (in 1000s). http://www.enisa.europa.eu/activities/Resilience-and-CIIP/Incidents-reporting/annual-reports/annual-incident-reports-2012
  • 8. www.enisa.europa.eu 8 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 9. www.enisa.europa.eu 9 Recent History – Hurricane Sandy – October 2012 http://www.datacenterknowledge.com/archives/2012/10/30/major-flooding-nyc-data-centers/ http://www.renesys.com/blog/2012/11/sandys-global-impacts.shtml
  • 10. www.enisa.europa.eu 10 Recent History – Egypt – March 2013 http://www.reuters.com/article/2013/03/27/net-us-egypt-internet-idUSBRE92Q1AQ20130327 https://labs.ripe.net/Members/mirjam/mediterranean-cable-disruption-as-seen-in-ripestat
  • 11. www.enisa.europa.eu 11 Recent History – Spamhaus – March 2013 http://www.bgpmon.net/looking-at-the-spamhouse-ddos-from-a-bgp-perspective/ https://greenhost.nl/2013/03/21/spam-not-spam-tracking-hijacked-spamhaus-ip/
  • 12. www.enisa.europa.eu 12 Incidents as source of info • It is straightforward to divert traffic away from its proper destination by announcing invalid routes -> youtube 2008, china 2010, Spamhaus & banking IP Hijack 2013… • Latent bugs in BGP implementations can disrupt the system -> Cisco & RIPE unexpected attribute 2010, Juniper 2011… • In some parts of the world a small number of cable systems are critical -> Egypt 2013 • The system is critically dependent on electrical power -> Hurricane Sandy 2012 • The ecosystem can work well in a crisis -> 9/11, japan earthquake 2011
  • 13. www.enisa.europa.eu 13 Potential adverse events • Regional failure of other critical infrastructure on which the Internet depends • Cable cut • Natural disaster • Coordinated attack • Design faults Cc-by-3.0|Árni Friðriksson
  • 14. www.enisa.europa.eu 14 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 15. www.enisa.europa.eu 15 Criticality of the Internet Infrastructure • Internet of things • M2M • Interconnected Mobility • Smart city • Communications • Enterprise networks • E-government • E-health C sandro gauci
  • 16. www.enisa.europa.eu 16 Current issues • The lack of good information about the state and behavior of the system • The scale and complexity of the system • The dynamic nature of the system
  • 17. www.enisa.europa.eu 17 Assessing the critical Internet Infrastructure • Identify assets and legal frameworks • Cross‐system dependencies • Possible point of failures not covered by private sector risk assessments • National and European- scale complete picture
  • 18. www.enisa.europa.eu 18 Mapping the ecosystem • The physical infrastructure - commercially confidential, sometimes overlap with CNI • The routing infrastructure – hidden by design, cross borders interdependencies • The organizational component - different legal frameworks and maturity levels
  • 19. www.enisa.europa.eu 19 How the Internet looks like? • BGP‐derived maps • AS Router‐Level Topologies • PoP‐Level Topologies
  • 20. www.enisa.europa.eu 20 Agenda • Critical Infrastructures and Critical Information Infrastructures • Large scale incidents • Criticality of the Internet Infrastructure • Future research: security and resilience topics
  • 21. www.enisa.europa.eu 21 Metrics and Measurement • More data: – Incident Investigation – Network Performance – Resilience • Accurately measure: – the structure of the Internet – structural properties of the Internet in a changing provider ecosystem
  • 22. www.enisa.europa.eu 22 Policy research • Common terminology • Understanding legal frameworks and markets • Harmonizing approaches • Define toolset and best practises • Information sharing frameworks • Integrated applied research
  • 23. www.enisa.europa.eu 23 Vulnerability research • Devices • MPLS • BGP • RPKI – RPKI-based origin validation – Path validation • DNS – DNSSEC
  • 24. www.enisa.europa.eu 24 Risk assessment frameworks for Internet Infrastructures and depending infrastructures • Mission critical components • Operational impact analysis • Disaster recovery plans • Operational exercises
  • 25. www.enisa.europa.eu 25 Emerging topics • Integrated inventories (GIS, routing, performance) • AR and gesture recognition for visualization of complex systems • Real time monitoring • Automated tools for impact assessment and scenario identification • Federation of CI and CII early warning systems
  • 26. www.enisa.europa.eu 26 Network Infrastructure Security and Resilience Communication networks are the building blocks of the information society
  • 27. www.enisa.europa.eu 27 Food For Thought 370 millions of Internet users at 30 June 2012 500 millions of potential users
  • 32. www.enisa.europa.eu 32 Previous ENISA Work • 2010 “Secure Routing Technologies” report • Gives an overview of available technologies and proposed solutions to secure routing http://www.enisa.europa.eu/act/res/technologies/tech/routing
  • 33. www.enisa.europa.eu 33 Previous ENISA Work • 2010 “Secure Routing” survey • Shows that currently there are only few security mechanisms implemented to secure internet routing on the IP layer http://www.enisa.europa.eu/act/res/technologies/tech/routing
  • 34. www.enisa.europa.eu 34 Previous ENISA Work • 2010 study “Resilience of the Internet Interconnection Ecosystem” (aka “Inter-X Report”) • Large collection of resilience aspects of interconnections on all layers • Also contains collection of well- known incidents https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/interx
  • 35. www.enisa.europa.eu 35 Previous ENISA Work • 2011 report “Good Practices in Resilient Internet Interconnection“ • 15 good practices and 11 recommendations for enhancing resilience of internet interconnections • Recommendation 10: Develop techniques to accurately measure the structure of the Internet https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/resilience-of-interconnections/report