Detection of NS Resource Record DNS Resolution Traffic, Host Search, and SSH Dictionary Attack Activities
|
|
|
- Sabina Cain
- 10 years ago
- Views:
Transcription
1 Detection of NS Resource Record DNS Resolution Traffic, Host Search, and SSH Dictionary Attack Activities Dennis Arturo Ludeña Romaña, 1 Kazuya Takemori, 1 Shinichiro Kubota, 2 Kenichi Sugitani 2 and Yasuo Musashi 2 We performed an entropy study on the traffic from the Internet to the top domain DNS server in a university campus network through January 1st to March 31st, 29. The obtained results are: (1) We observed a difference for the entropy changes among the total-, the A-, and the PTR resource records (RRs) based traffic from the Internet through January 17th to February 1st, 29. We found the large NS RR based traffic including only a keyword. in the total traffic from the Internet. (3) We also found that the unique source IP address based PTR DNS traffic entropy slightly increased, while the unique keywords based one drastically decreased in March 9th, 29. We found a specific IP host which was an already-hijacked classical Linux PC that carried out the SSH dictionary attack to the Internet sites in March 9th, 29. From these results, we can detect the unusual NS RR based DNS traffic and SSH dictionary attacks by only watching traffic from the Internet. 1. Introduction It is of considerable importance to raise up a detection rate of Bots, since they become components of the bot clustered networks that are used to transmit a lot of unsolicited mails including like spam, phishing, and mass mailing activities and to execute distributed denial of service attacks. 1) 4) Wagner et al. reported that entropy based analysis was very useful for anomaly detection of the random IP search activity of Internet worms (IWs) like an W32/Blaster or an W32/Witty worm, respectively, since the both worms drastically changes entropy when after starting their activity. 5) 1 Graduate School of Science and Technology, Kumamoto University 2 Center for Multimedia and Information Technologies, Kumamoto University tdns: Top Domain DNS Server BIND Topomain(kumamoto-u) Zone Data DNS cache Subdomain Delegation logging { channel qlog { syslog local1; }; category queries { qlog }; } Spam bot A Campus Network Victim Victim Fig. 1 A schematic diagram of a network observed in the present study. Then, we reported previously that the unique keyword based entropy in the PTR resource record (RR) based packet traffic from the Internet decreases considerably while the unique source IP addresses based entropy increases when the random spam bots activity is high in the campus network. 6) This is probably because the PTR RR based packet traffic was generated by the spam bots activity sensors like a spam filter of the server and/or the intrusion detection/prevention system (IDS/IPS) on the Internet. Therefore, we can detect spam bots activity, especially, a random spam bot (RSB) in the campus network, by watching the packet traffic from the other sites on the Internet (see Figure 1). We also reported that we observed not only an increase in the unique keyword based entropy in the PTR RR based packet traffic from the Internet but a decrease in the unique source IP address based one in the packet traffic when performing host search activity from the Internet. 7) In this paper, (1) we carried out entropy analysis on the total- A- and the PTR resource records (RRs) based packet traffic from the Internet through January 1st to March 31st, 29, and we assessed the bot attack detection rate among the entropies for the total- A-RR, and the PTR-RR based packet traffic. 1 c 29 Information Processing Society of Japan
2 2. Observations DNS Server s DNS Server s DNS Server 2.1 Network Systems and DNS Query Packet Capturing We investigated on the request packet traffic between the top domain (tdns) DNS server and the DNS clients. Figure 1 shows an observed network system in the present study, which consists of the tdns server and the PC clients as bots like a random spam bot and a host search one in the campus network, and the victim hosts like the s on the Internet. The tdns server is one of the top level domain name (kumamoto-u) system servers and plays an important role of domain name resolution including DNS cache function and subdomain name delegation services for many PC clients and the subdomain networks servers, respectively, and the operating system is Linux OS (CentOS 4.3 Final) in which the kernel is currently employed with the Intel Xeon 3.2 GHz Quadruple SMP system, the 2GB core memory, and Intel 1Mbps EthernetPro Network Interface Card. In the tdns server, the BIND program package has been employed as a DNS server daemon. 8) The packet and their query keywords have been captured and decoded by a query logging option (see Figure 1 and the named.conf manual of the BIND program in more detail). The log of packet access has been recorded in the syslog files. All of the syslog files are daily updated by the cron system. The line of syslog message consists of the contents of the packet like a time, a source IP address of the DNS client, a fully qualified domain name (A and AAAA resource record (RR) for IPv4 and IPv6 addresses, respectively) type, an IP address (PTR RR) type, or a mail exchange (MX RR) type. 2.2 Estimation of Entropy We employed Shannon s function in order to calculate entropy, as = i X P (i) log 2 P (i) (1) where X is the data set of the frequency freq(j) of IP addresses or that of the keyword in the packet traffic from the outside of the campus network, and the probability P (i) is defined, as Fig. 2 Spam bot X C {ip} X C {q} A Random Attack Activity Model Spam bot X C {ip} X C {q} A Targeted Attack Acitivity Model Campus Network X C {ip} X C {q} A Host Search Activity Model Random attack bots (RAB), targeted attack bots (TAB), and host search (HS) activity models P (i) = freq(i) j freq(j) where i and j (i, j X) represent the unique source IP address or the unique keyword in the packet, and the frequency freq(i) are estimated with the script program, as reported in our previous work. 9) 2.3 Attack Activity Models We define three incidents detection models for random attack (RA) activity, targeted attack (TA) activity, and host search (HS) activity (See Figure 2), respectively. A random attack (RA) activity model since a random spam bot (RSB), a typical example for the RA activity model, randomly attacks various victim E- mail servers, the s can try to check IP addresses and fully qualified domain names (FQDNs) for the RSB, with referring to the top domain DNS (tdns) server in the campus network. This causes an increase in the number of the unique source IP addresses in the traffic but a decrease in the number of the unique keyword i.e. the unique source IP addressesand the unique keyword-based entropies simultaneously increase and decrease, respectively, when the RA activity is high in the campus network. A targeted attack (TA) activity model since the targeted spam bot (TSB), for example, attacks a small number of specific victim s in the campus network or on the Internet, the s can check IP addresses and FQDNs for the TSB, with referring to the tdns server in the campus network. This causes decreases in the unique IP addresses- and the keyword-based 2 c 29 Information Processing Society of Japan
3 entropies when the TA activity is high. A host search (HS) activity model the host search activity can be mainly carried out by a small number of IP hosts on the Internet or in the campus network like bot compromised PCs. Since these IP hosts send a lot of the DNS reverse name resolution (the PTR RR based ) request packets to the tdns server, the unique IP addresses- and the unique -keywords based entropies decrease and increase, respectively. Here, we should also define thresholds for detecting these three kinds of malicious activity models, as setting to 1, packets day 1 for the frequencies of the top-ten unique source IP addresses or the keywords. The evaluation for threshold was previously reported. 9) 3. Results and Discussion 3.1 Entropy Changes in Total- A- and PTR-RRs DNS Query Packet Traffic from the Internet We demonstrate the calculated unique source IP address and unique DNS query keyword based entropies for the total-, A- and PTR-resource records (RRs) based request packet traffic from the Internet to the top domain DNS (tdns) server through January 1st to March 31st, as shown in Figure 3. In Figure 3A, we can find ten peaks and they are categorized into three groups, as: {(1), (7), (8), (1)}, {-}, and {(9)}. In the first peak group, all the peaks show a decrease in the unique source IP address based entropy and an increase in the unique keywords based one i.e. this feature indicates the host search (HS) activity. It is very important to detect the HS activity because the HS activity is mainly performed as pre-investigation on the campus network for the next cyber attack. In the second group, we can observe the five peaks in which all the peaks demonstrate simultaneous decreases in the unique source IP address- and the unique keyword-based entropies. This feature shows that the peaks - can be assigned to a targeted attack (TA) activity model. In the last group, we can find only a peak (9) which demonstrates nothing in the unique source IP addresses based entropy but a significant decrease in the unique keyword based one. This feature will be discussed later. In Figure 3B, surprisingly, we can find only two peaks (1) and. In the peak Entropy Changes in source IP addressesand contents based-parameters (day ) Entropy changes in the total packet traffic from the Internet 2 H({ip, Internet, total}): Unique source IP addresse-based parameters 15 1 A (1) H({q, Internet, total}): Unique keyword-based parameters (3) (4) (7) (8) (1) 5 (4) (3) (9) (1) 1/8 (4) 1/25 (7) 2/7 (1) 3/13 1/17 1/28 (8) 2/22 (3) 1/2 2/1 (9) 3/ Time (day) Fig. 3 Entropy Changes in source IP addressesand contents based-parameters (day -1 ) Entropy Changes in source IP addressesand contents based-parameters (day -1 ) Entropy changes in the A Resource Record based packet traffic from the Internet B H({ip, Internet, total}): Unique source IP addresse-based parameters H({q, Internet, total}): Unique keyword-based parameters (1) (1) 1/24 3/9 Entropy changes in the PTR Resource Record based packet traffic from the Internet C H({ip, Internet, total}): Unique source IP addresse-based parameters H({q, Internet, total}): Unique keyword-based parameters (1) (3) (4) (1) 1/8 1/21 (3) 2/7 (4) 2/22 (7) 3/26 3/9 3/ Time (day) Time (day) Entropy changes in the total- A- and PTR-resource records (RRs) based request packet traffic from the campus network to the top domain DNS (tdns) server through January 1st to March 31st, 29. The solid and dotted lines show the unique source IP addresses and unique keywords based entropies, respectively (day 1 unit). (1), we can observe small increase and decrease in the unique source IP addressand the unique query keyword based entropies, respectively. The peak (1) is assigned to January 24th, 29. This is probably because we had a half-day hardware trouble in the campus network core switches in the day, and this fact could affect the entropy change. The peak can be assigned to the same situation in the peak (9) in Figure 3A. As a result, we can observe no peak corresponding to the peaks for the targeted attack (TA) activity in Figure 3A. In Figure 3C, we can find eight peaks which can be categorized into two groups, (7) 3 c 29 Information Processing Society of Japan
4 Table 1 Detected top/2nd unique query keywords and their frequency through January 17th to February 1st, 29. (day 1 unit). Peak Date Query keyword Frequency (day ) (3) (4) Jan. 17th a1.181 Jan. 2th a a2.55 Jan. 25th. Jan. 28th a1.181 Feb. 1st. 69,927 1,473 72,291 1,619 1,384 4,419 51,81 1,523 47,69-1 Table 3 Detected top, 2nd, and third unique source IP addresses and their frequencies through January 17th to February 1st, 29. (day 1 unit). Peak Date Source IP address Frequency (day ) (3) (4) Jan. 17th Jan. 2th Jan. 25th Jan. 28th Feb. 1st 69.5.a1.b a2.b c1.d e1.f g1.h i1.j k1.l m1.n1 44,2 18,935 65,315 33,751 32,896 13,876 13,875 13,875-1 Table 2 DNS resource record (RR) based component analysis on the total packet traffic from the Internet including a root. as the query keywords at the two peaks, January 17th and 2th, 29. (day 1 unit). Total A AAAA PTR MX TXT NS Others Peak (Jan 17th, 29) 69, ,653 Peak (3) (Jan 2th, 29) 72, ,129 as: {(1)-(4),, (7)} and {}. In the first group, we can observe the same peaks (1), (3), (4), and corresponding to the peaks (1), (7), (8), and (1), respectively, in Figure 3A. This means that these peaks and the other peaks and (7) can be allocated to the HS activity. Interestingly, in the peak, the unique source IP address based entropy increases in a slight manner, while the query keyword based entropy decreases significantly. This feature indicates a random attack (RA) activity model. Usually, however, we can observe clear symmetrical changes in the both entropies for the RA activity like a random spam bot (RSB) activity i.e. it has a possibility that the peak demonstrates a different RA activity unlike a random spam bot (RSB) attack. Also, in Figure 3C, we can find out no TA activity peak like the peaks - in Figure 3A. Therefore, we need to investigate further the total packet traffic at the TA activity peaks - in Figure 3A and to confirm the possibility showing a new instance for the RA activity at the peak in Figure 3C. 3.2 The NS-RR DNS Query Packet Traffic from the Internet We investigated statistics of the query keywords in the request packet traffic from the Internet at the peaks - in Figure 3A. The top query keywords was obtained when the frequency takes more than 1, packets day 1 and the FQDNs or IP addresses of the network servers are discarded, as listed in Table 1. In Table 1, the top keyword is a root. at each peak. Then, we performed DNS resource record (RR) based component analysis on the total packet traffic from the Internet including the root. as the query keywords at the peaks and (3) shown in Figure 3A. Usually, we can observe that the root. included packet traffic takes only about 1,1 packets day 1 (an average value by observation through March 8th to 31st, 29). As shown in Table 2, the total root. included packet traffic consists of the NS- and A-RRs packet traffic in January 17th and 2th, 29. Also, we can observe that the NS RR based traffic takes 4 c 29 Information Processing Society of Japan
5 Table 4 Detected top, 2nd, and third IP addresses as query keywords and their frequencies through March 9th, 29. (day 1 unit) Query Keyword s s s3.163 Frequency (day -1) 4,919 6,11 1,115 A Random Spam Bot Attack Activity Model and DNS resolution Campus DNS Server Spam Bot Site Local DNS Cache Server IDS/IPS An SSH Dictionary Attack Activity Model and DNS resolution Campus DNS Server SSH Probagtion Bot SSH attack Site Local DNS Cache Server SSH server IDS/IPS almost 1,3 packets day 1 (an average value by observation through March 8th to 31st, 29). We further obtained statistics of the source IP addresses in the root. included packet traffic in January 17th and 2th, 29, as shown in Table 3. We can see the specific IP addresses in Table 3, and these IP addresses can be assigned for targeted attack activity corresponding to the peaks - in Figure 3A. 3.3 A New Instance for the Random Attack Activity We carried out statistics on the query keywords in the total PTR resource record (RR) based packet traffic from the Internet at March 9th, 29, in order to investigate further the peak in Figure 3C. The results are shown in Table 4, in which the top IP addresses are obtained when the frequency takes more than or equal to 1, packets day 1. In Table 4, we can find the three top IP addresses of s1.62, s2.73, and s3.163, as query keywords in which the top IP address is assigned to the old Linux PC in the campus network. Fortunately, we received an automatic notifying in which they complained about that a PC terminal in the campus network had carried out the SSH dictionary attack 11) to them and which shows the same IP address as the top one. Therefore, we can identify the peak corresponding to the random SSH dictionary attack activity. Also, we calculated rate for the unique source IP address in the PTR RR based packet traffic including a query keyword s1.62, in which the rate is calculated to be 11%. In January 17th, 28, we detected a spam bot kicked by USB silicon disk, and we observed 11,263 packets day 1 for the packet traffic including an IP address of the spam botted PC terminal. 1) The rate for the unique source IP address was estimated to be 72%. Fig. 4 Campus Network Campus Network Random Spam Bot and Random SSH Dictionary Attack Activity Models Interestingly, the unique keyword based DNS traffic entropy considerably decreases while the unique source IP address based one increases slightly in the peak. This situation is different from the previous instances in the random attack (RA) activity like a random spam bot (RSB), since we previously reported that the both DNS traffic entropies change symmetrically in the peaks for the random spam bot activity. 1) This feature is probably interpreted in terms of the difference whether or not the PTR RR based packet traffic from the Internet includes the DNS reverse resolution traffic from the s on the Internet, or not (See Figure 4). 4. Conclusions We investigated entropy analysis on the total, A, and PTR resource record (RR) based request packet traffic from the Internet through January 1st to March 31st, 29. The following interesting results are found: (1) we observed 1, 2, and 8 incidents in the entropy change in the total-, A-, and PTR-RRs based packet traffic, respectively. In the total packet traffic entropy change, we found 4 host search (HS) activities, 5 targeted attack (TA) ones, and 1 random attack (RA) one. In the A RR based packet traffic entropy change, we found 1 hardware trouble and 1 RA activity. In the PTR based packet traffic entropy change, we discovered 7 HS activities and 1 RA one. We found that the specific IP hosts had carried out the TA attack to the campus top domain name server (tdns) by transmitting the NS RR based packet traffic including a root. as a query keyword. (3) 5 c 29 Information Processing Society of Japan
6 Also, we found a new instance for the RA activity like a random SSH dictionary attack but unlike a random spam bot (RSB). This is because we observed the difference in the source IP address based entropy change and the unique rates for the source IP address in the RSB and SSH dictionary attacks were calculated to be 11% and 72%, respectively. From these results, it is concluded that we should pay attention to the results of resource record (RR) based component analysis since we observed the considerable differences among the total, A, and PTR RRs based traffic entropies, and we could detect the NS RR based denial of service (DoS) attack and the SSH dictionary attack by only observing the DNS resolution traffic from the Internet. We continue further study to develop spam and propagation bots detection technology. Acknowledgments All the studies were carried out in CMIT of Kumamoto University and this study is supported by the Grant aid of Graduate School Action Scheme for Internationalization of University Students (GRASIUS) in Kumamoto University. Vol. 28, No.13, pp (28). 8) BIND-9.2.6: 9) Ludeña Romaña, D. A., Musashi, Y., Matsuba, R., and Sugitani, K.: Detection of Bot Worm-Infected PC Terminals, Information, Vol. 1, No.5, pp (27). 1) Ludeña Romaña, D. A., Kubota, S., Sugitani, K., and Musashi, Y.: DNS Based Spam Bots Detection in a University, Proceedings for the First International Conference on Intelligent Networks and Intelligent Systems (ICINIS28), Wuhan, China, 28, pp (28). 11) Thames, J. L., Abler, R., and Keeling, D.: A distributed active response architecture for preventing SSH dictionary attacks, Proceedings for the Southeastcon, 28. IEEE, Huntsville, AL, USA, 28, pp (28). References 1) Barford, P. and Yegneswaran, V.: An Inside Look at Botnets, Special Workshop on Malware Detection, Advances in Information Security, Springer Verlag, 26. 2) Nazario, J.: Defense and Detection Strategies against Internet Worms, I Edition; Computer Security Series, Artech House, 24. 3) Kristoff, J.: Botnets, North American Network Operators Group (NANOG32), Reston, Virginia (24), 4) McCarty, B.: Botnets: Big and Bigger, IEEE Security and Privacy, No.1, pp.87-9 (23). 5) Wagner, A. and Plattner, B.: Entropy Based Worm and Anomaly Detection in Fast IP Networks, Proceedings of 14th IEEE Workshop on Enabling Technologies: Infrastracture for Collaborative Enterprises (WETICE 26), Linköping, Sweden, 25, pp ) Ludeña Romaña, D. A., Sugitani, K., and Musashi, Y.: DNS Based Security Incidents Detection in Campus Network, International Journal of Intelligent Engineering and Systems, Vol. 1, No.1, pp (28). 7) Ludeña Romaña, D. A., Kubota, S., Sugitani, K., and Musashi, Y.: Entropy Study on A and PTR Resource Record-Based DNS Query Traffic, IPSJ Symposium Series, 6 c 29 Information Processing Society of Japan
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
Detecting Mass-Mailing Worm Infected Hosts by Mining DNS Traffic Data
Detecting Mass-Mailing Worm Infected Hosts by Mining DNS Traffic Data Keisuke Ishibashi, Tsuyoshi Toyono, and Katsuyasu Toyama NTT Information Sharing Platform Labs., NTT Corporation 3-9-11 Midori-cho,
Linux Server Support by Applied Technology Research Center. Proxy Server Configuration
Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training
Botnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
The Domain Name System
Internet Engineering 241-461 Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre DNS The Domain Name System Kurose & Ross: Computer Networking Chapter 2 (2.5) James F. Kurose
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
SIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Passive Monitoring of DNS Anomalies
Passive Monitoring of DNS Anomalies Bojan Zdrnja 1, Nevil Brownlee 1, and Duane Wessels 2 1 University of Auckland, New Zealand, {b.zdrnja,nevil}@auckland.ac.nz 2 The Measurement Factory, Inc., [email protected]
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
DDoS Confirmation & Attack Packet Dropping Algorithm in On- Demand Grid Computing Platform
DDoS Confirmation & Attack Packet Dropping Algorithm in On- Demand Grid Computing Platform Muhammad Zakarya, Zahoor Jan, Imtiaz Ullah, Nadia Dilawar and Uzm Abstract- Distributed denial of service (DDoS)
DNS. Computer Networks. Seminar 12
DNS Computer Networks Seminar 12 DNS Introduction (Domain Name System) Naming system used in Internet Translate domain names to IP addresses and back Communication works on UDP (port 53), large requests/responses
Copyright 2012 http://itfreetraining.com
In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
Development of an IPv6 Honeypot
Development of an IPv6 Honeypot Klaus Steding-Jessen [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br Network Information Center Brazil CGI.br Brazilian Internet Steering Committee
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
CDN SERVICE ICSS ROUTE MANAGED DNS DEUTSCHE TELEKOM AG INTERNATIONAL CARRIER SALES AND SOLUTIONS (ICSS)
CDN SERVICE ICSS ROUTE MANAGED DNS DEUTSCHE TELEKOM AG INTERNATIONAL CARRIER SALES AND SOLUTIONS (ICSS) CDN FEATURE ICSS ROUTE ICSS ROUTE IS OUR NEW OFFERING TO HELP YOU MANAGE YOUR DOMAIN NAME SYSTEM
DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .
Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
DYNAMIC DNS: DATA EXFILTRATION
DYNAMIC DNS: DATA EXFILTRATION RSA Visibility Reconnaissance Weaponization Delivery Exploitation Installation C2 Action WHAT IS DATA EXFILTRATION? One of the most common goals of malicious actors is to
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Module 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
DDoS Attacks & Defenses
DDoS Attacks & Defenses DDOS(1/2) Distributed Denial of Service (DDoS) attacks form a significant security threat making networked systems unavailable by flooding with useless traffic using large numbers
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
My Services Online Service Support. User Guide for DNS and NTP services
My Services Online Service Support User Guide for DNS and NTP services Table of Contents 1 MY SERVICES... 3 2 ACCESSING MY SERVICES VIA THE INTERNET... 3 2.1 Logging into My Services... 3 2.2 My Services
DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa. DNS & IPv6.
DNS & IPv6 MENOG4, 8-9 April 2009 Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa Agenda DNS & IPv6 Introduction What s next? SaudiNIC & IPv6 About SaudiNIC How a cctld Registry supports
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
HTG XROADS NETWORKS. Network Appliance How To Guide: DNS Delegation. How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: DNS Delegation How To Guide DNS Delegation (The Simple Redundancy Solution) The key requirement when performing DNS based network redundancy and load
Next-Generation DNS Monitoring Tools
Next-Generation DNS Monitoring Tools Cyber Security Division 2012 Principal Investigators Meeting October 9, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected] 404-808-5172
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Lightweight DNS for Multipurpose and Multifunctional Devices
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.12, December 2013 71 Lightweight DNS for Multipurpose and Multifunctional Devices Yogesh A. Wagh 1, Prashant A. Dhangar
HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeDNS How To Guide V 3. 2 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeDNS XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS V
DDos Monitoring System using Cloud AV. 2009.09.30 AhnLab, Inc. SiHaeng Cho, Director of R & D Center
DDos Monitoring System using Cloud AV 2009.09.30 AhnLab, Inc. SiHaeng Cho, Director of R & D Center Table of Contents I. Recent Security Threat Trend II. III. Security Industry Response & Issues AhnLab
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis
Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis United States Computer Emergency Readiness Team (US-CERT) Detection and Analysis January 2011 Background As the number
Network reconnaissance and IDS
Network reconnaissance and IDS CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642 Let s play over the network Target
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions 9 May 2014 Dr.-Ing. Kpatcha Bayarou Head, Mobile Networks Fraunhofer SIT [email protected]
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Network attack and defense
Network attack and defense CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan 1 Outline 1. Overview
IPv6 and DNS. Secure64
IPv6 and DNS Secure64 About me Stephan Lagerholm Director and Founder of TXv6TF. Secure64 Software Corp. Sponsor of the event. Agenda: DNS and IPv6 basics DNS64 (RFC 6147) 464XLAT (RFC 6877) Heuristic
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Symptoms Based Detection and Removal of Bot Processes
Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 [email protected], 2 [email protected]
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Understand Names Resolution
Understand Names Resolution Lesson Overview In this lesson, you will learn about: Domain name resolution Name resolution process steps DNS WINS Anticipatory Set 1. List the host name of 4 of your favorite
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
THE ROAD TO IPV6: KU SERVICE EXPERIENCES ON DUAL-STACK
THE ROAD TO IPV6: KU SERVICE EXPERIENCES ON DUAL-STACK The Design and Implementation of a Scalable, Dual-Stack Oriented, Consolidated Authentication System Pirawat WATANAPONGSE * Surasak SANGUANPONG* Kasom
Log Management for the University of California: Issues and Recommendations
Log Management for the University of California: Issues and Recommendations Table of Contents 1 Introduction...2 2 Candidate Sources of Logged Information...3 3 Recommended Log Management Practices...4
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
ISPS & WEBHOSTS SETUP REQUIREMENTS & SIGNUP FORM LOCAL CLOUD
ISPS & WEBHOSTS SETUP REQUIREMENTS & SIGNUP FORM LOCAL CLOUD LOCAL CLOUD SETUP REQUIREMENTS Hardware Requirements Local Cloud Hardware Different hardware requirements apply depending on the amount of emails
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
Email [email protected] Phone 847-467-5930 Fax 847-467-6000
Information Technology Information and Systems Security/Compliance Northwestern University 1800 Sherman Av Suite 209 Evanston, IL 60201 Email [email protected] Phone 847-467-5930 Fax 847-467-6000
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
Malware Detection in Android by Network Traffic Analysis
Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
Campus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
SERVER CLUSTERING TECHNOLOGY & CONCEPT
SERVER CLUSTERING TECHNOLOGY & CONCEPT M00383937, Computer Network, Middlesex University, E mail: [email protected] Abstract Server Cluster is one of the clustering technologies; it is use for
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Applied Network Services. Janet Services for Resilience. Andrew Davis Network Services Coordinator Email: [email protected]
Applied Network Services Janet Services for Resilience Andrew Davis Network Services Coordinator Email: [email protected] What we can do to help... Janet services Primary Nameserver Service Backup Master
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
Large-Scale IP Traceback in High-Speed Internet
2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint
Recommendations for dealing with fragmentation in DNS(SEC)
Recommendations for dealing with fragmentation in DNS(SEC) Abstract DNS response messages can sometimes be large enough to exceed the Maximum Transmission Unit (MTU) size for the underlying physical network.
