Will any future internet architecture be able to cope with this threat?

How might we tackle security in such a way as to make life extremely difficult for these kinds of criminals?

By the way, anyone can add content to this blog, so feel free to add your thoughts and links

Views: 18

Comment by rea on October 11, 2009 at 8:44pm
I would hope so. We need to devise better methods to allow users to validate as much (or as little) of their own information. In this manner, we can have a sliding scale of trust that will allow interactions and/or transactions that range from the casual need (e.g., is this person a member of a group) to a more complex need (e.g., do we want to conduct legal and financial transactions with this user).
Comment by Henning Schulzrinne on October 12, 2009 at 10:03pm
The trojan makes the legitimate user's computer do the withdrawing, so network protocols are unlikely to help, since the compromise (MiTM) is on the browser, not the network.
Comment by Susan Hinrichs on October 13, 2009 at 7:38am
I agree with Henning that much of the problem here is with how the malware was able to get to the user's system in the first place. The browsing user may have been tricked into installing a "fun game" or something. It is unlikely the user understood that he was installing a privileged program. Once the user's bank credentials are stolen, the gig is up.

However, perhaps somethings can still be done at the network level to detect/repair the problem. Perhaps, the bank can certify all servers/content streams that might possibly occur while a client is performing a banking operation? An infected user interacting with his bank site would be notified that unexpected communication is occurring. If not done well won't help the unsophisticated user (i.e. user account control).
Comment by Henning Schulzrinne on October 14, 2009 at 9:30am
My understanding of the operation of the malware is that it issues commands on the TLS channel with the bank to transfer funds, and then modifies the web page returned so that the user doesn't see that they just transferred their life savings to the Ukraine, via some mule. Thus, the network traffic looks pretty much normal.

Comment

You need to be a member of Future Internet Summit to add comments!

Join Future Internet Summit

© 2018   Created by David Clark.   Powered by

Report an Issue  |  Terms of Service