PROTECTING ISP
NETWORKS AND THE
INTERNET
CABLELABS INFORM[ED] CONFERENCE
NEWYORK, APRIL 12, 2017
GROWTH OFTHE INTERNET
0%
10%
20%
30%
40%
50%
60%
0
500
1000
1500
2000
2500
3000
3500
4000
Dec-95
Jun-96
Dec-96
Jun-97
Dec-97
Jun-98
Dec-98
Jun-99
Dec-99
Jun-00
Dec-00
Jun-01
Dec-01
Jun-02
Dec-02
Jun-03
Dec-03
Jun-04
Dec-04
Jun-05
Dec-05
Jun-06
Dec-06
Jun-07
Dec-07
Jun-08
Dec-08
Jun-09
Dec-09
Jun-10
Dec-10
Jun-11
Dec-11
Jun-12
Dec-12
Jun-13
Dec-13
Jun-14
Dec-14
Jun-15
Dec-15
Jun-16
Dec-16
INTERNET GROWTH
MILLIONS OF USERS % WORLD POPULATION
COUNT OF UNIQUE SOURCES SCANNING ON POPULAR IOT PORTS
4YEARS (AS OF APRIL 3, 2017)
TCP 23 - Telnet
TCP 7547 – Eir D1000 RouterVulnerability
UDP 53413 – Netis Router Backdoor
TCP 5358 - WSDAPI
TCP 23231 – Mirai port scanning
THE LESSONS OF MIRAI
• In Europe at least three ISPs were seriously impacted
• DeutscheTelekom reportedly being the most significantly affected (900k+ users knocked
offline through Mirai variant affecting CPE)
• It only takes a few vulnerabilities to bring down a network
• Poor security practices by a few vendors (e.g. default credentials) put everyone at risk.
• Customers cannot be expected to overcome vendor mistakes. Products and networks
should be secure by default even if the customer does nothing.
• A new approach is required to break out of “Security Ground Hog Day”
THREATVECTORSTHROUGH COMMON
PRODUCTS
Source: BBC
WHO ISTHE INTERNET?
• Most consumers and businesses connect to the Internet through their ISP.
• Customers rely on a variety of ecosystems players to protect their data and Internet
connectivity: anti-virus companies, ISPs, operating system vendors, application vendors,
search engine vendors, social media vendors, and hardware manufactures to name a few.
• If something goes wrong, customers are likely to call their ISP, but we cannot expect the
builders of highways to provide safe cars and good drivers.
• With the Internet ofThings, the scale of security issues from IoT devices is going to
increase rapidly.
HOW DO ISP’S STAY AHEAD OF ATTACKS?
• Quick and accurate detection
• Data analytics
• Machine learning
• Honey pots
• Quick response
• Traffic management
• Quarantine
• Proactive countermeasures
• DDoS Attacks
• Flow based monitoring / Select DPI
• Data Scrubbing
• Flowspec / Blackhole filtering
• DNS Protections
• Botnets
• Collaboration with law enforcement
• Customer notifications
• Collaboration with other ecosystem
players
TODAY’S PANEL
• Clarke Stevens – Principal Architect, Shaw Communications
• Rich Compton – Principal Engineer, Charter Communications
• AndreVan derWalt – InterimVP and CISO, Liberty Global
• Brian Rexroad –VP, Security Platforms,AT&T
• Mike Glenn –VP Security Services, CableLabs

More Related Content

PPTX
ROOF Quick Reference
PPTX
Internet of things: dai sensori al cloud - Global Azure Bootcamp - GABRome18
PDF
Future Proof Your Network Today To Support IOT Tomorrow
PPTX
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
PPTX
Simon Ford - ARM and the Open Internet of Things
PPTX
Future of IOT
PDF
Power of Pixels - Abridged
PPTX
5 g and business
ROOF Quick Reference
Internet of things: dai sensori al cloud - Global Azure Bootcamp - GABRome18
Future Proof Your Network Today To Support IOT Tomorrow
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
Simon Ford - ARM and the Open Internet of Things
Future of IOT
Power of Pixels - Abridged
5 g and business

What's hot (19)

PPTX
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
PDF
Internet Of Things & Ruby, com Thiago Scalone
PPTX
7 facts, fictions and predictions about the Internet of Things (IoT)
PPTX
R-NOX IoT
PPTX
Abel Aguiar - Startups as an engine for IoT development - Productized16
PDF
PDF
Drone World Expo Presentation
PPT
Presentación1 2003
PDF
IPR - Infographic
PPTX
DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...
PDF
IoT introduction
PDF
Mobile Internet: Καταλύτης για την οικονομική ανάπτυξη
PDF
Michael Enescu - Cloud + IoT at IEEE
PPTX
Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...
PPTX
Internet of things
PPTX
Databroker DAO Pitchdeck (February 20, 2018)
PPTX
Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...
PDF
IoT Networking
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Internet Of Things & Ruby, com Thiago Scalone
7 facts, fictions and predictions about the Internet of Things (IoT)
R-NOX IoT
Abel Aguiar - Startups as an engine for IoT development - Productized16
Drone World Expo Presentation
Presentación1 2003
IPR - Infographic
DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...
IoT introduction
Mobile Internet: Καταλύτης για την οικονομική ανάπτυξη
Michael Enescu - Cloud + IoT at IEEE
Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...
Internet of things
Databroker DAO Pitchdeck (February 20, 2018)
Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...
IoT Networking
Ad

Similar to Protecting ISP Networks and the Internet at Inform[ED] IoT Security (20)

PDF
Privacy & Security for the Internet of Things
PDF
The evolving threat in the face of increased connectivity
PDF
A new way to prevent Botnet Attack
PPTX
Network Security in the Age of the Third Platform
PPTX
presentation Comstor IoT_RTL
PPTX
Ch # 5, CISM
PDF
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
PPTX
nnnnnnnnnnnn7777777777777777777777777777777.pptx
PPTX
Cisco Security DNA
PPTX
Seguridad en Capas: Smart & Actionable Data
PDF
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
PDF
Big Communications Event, Keynote Communications Track
PPT
Indian perspective of cyber security
PDF
Nas nie zaatakują!
PDF
Insights success the 10 most trusted networking solution provider companies 2...
PDF
Intelligence in the Internet of Things (IoT)
PDF
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
PPTX
D3SF17- Improving Our China Clients Performance
PDF
The Science Behind Generating Big Data
PPTX
Roberto minerva 20181130
Privacy & Security for the Internet of Things
The evolving threat in the face of increased connectivity
A new way to prevent Botnet Attack
Network Security in the Age of the Third Platform
presentation Comstor IoT_RTL
Ch # 5, CISM
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
nnnnnnnnnnnn7777777777777777777777777777777.pptx
Cisco Security DNA
Seguridad en Capas: Smart & Actionable Data
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Big Communications Event, Keynote Communications Track
Indian perspective of cyber security
Nas nie zaatakują!
Insights success the 10 most trusted networking solution provider companies 2...
Intelligence in the Internet of Things (IoT)
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
D3SF17- Improving Our China Clients Performance
The Science Behind Generating Big Data
Roberto minerva 20181130
Ad

More from CableLabs (8)

PDF
"Future Impact of IoT and the Implications of Security" Keynote by Brian Scri...
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PDF
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PDF
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
PDF
Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...
PDF
Keynote by Simon Kos at Inform[ED] Connected Healthcare
PPTX
NFV ISG – Phase 2 Begins
"Future Impact of IoT and the Implications of Security" Keynote by Brian Scri...
Technology & Policy Interaction Panel at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...
Keynote by Simon Kos at Inform[ED] Connected Healthcare
NFV ISG – Phase 2 Begins

Recently uploaded (20)

PDF
Architecture types and enterprise applications.pdf
PDF
August Patch Tuesday
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Getting Started with Data Integration: FME Form 101
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
DOCX
search engine optimization ppt fir known well about this
Architecture types and enterprise applications.pdf
August Patch Tuesday
CloudStack 4.21: First Look Webinar slides
Benefits of Physical activity for teenagers.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Zenith AI: Advanced Artificial Intelligence
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Tartificialntelligence_presentation.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A review of recent deep learning applications in wood surface defect identifi...
Getting Started with Data Integration: FME Form 101
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Assigned Numbers - 2025 - Bluetooth® Document
Module 1.ppt Iot fundamentals and Architecture
NewMind AI Weekly Chronicles – August ’25 Week III
Getting started with AI Agents and Multi-Agent Systems
Univ-Connecticut-ChatGPT-Presentaion.pdf
Developing a website for English-speaking practice to English as a foreign la...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
search engine optimization ppt fir known well about this

Protecting ISP Networks and the Internet at Inform[ED] IoT Security