DNS as a Control Point for Cyber Risk. Dr. Paul Vixie, CEO Farsight Security
|
|
|
- Angelina Lloyd
- 10 years ago
- Views:
Transcription
1 DNS as a Control Point for Cyber Risk Dr. Paul Vixie, CEO Farsight Security
2 Topics DNS Purpose and Role DNS Actions and Reactions DNS Control Points
3 Topic DNS purpose and role
4 Internet as Territory But what is the internet? It's the largest equivalence class in the reflexive transitive symmetric closure of the relationship can be reached by an IP packet from. (Seth Breidbart) IP addresses, IP packets, underlie everything We overlay IP with many things, e.g., the web Most important overlay (a layer) is: DNS 10/6/2014 Farsight Security, Inc. 4
5 DNS as Map Most everything we do on the Internet B2C Web, B2B Web, , I-M, <your idea here> relies on TCP/IP, and begins with a DNS lookup Mobile Internet is dominated by search but search itself relies extensively upon DNS DNS has a rigorous internal structure Things that are in fact related, are related in DNS You can have whois privacy, but not DNS privacy 10/6/2014 Farsight Security, Inc. 5
6 Criminal DNS The Internet has been a great accelerator of human civilization Sadly, the criminals came along for the ride Criminals can t do Internet crime without DNS Cheap throw-away domain names DNS registrars and servers in bad neighborhoods Whois privacy or simply bad whois data Nature, to be commanded, must be obeyed. (Francis Bacon) 10/6/2014 Farsight Security, Inc. 6
7 So, About that Internal Structure Domain names are grouped into zones A zone has one or more name servers Each name server has one or more addresses Other domain names also have addresses IP addresses are grouped into netblocks Domain names appear in a lot of places: Web somebody@domain 10/6/2014 Farsight Security, Inc. 7
8 Traditional DNS Forensics DNS lets anybody look up a <domain,type> You get back the current set of resource records But there s no way to see the history And, your query exposes your interest Whois lets you check ownership of a domain But it s usually hidden/private or inaccurate 10/6/2014 Farsight Security, Inc. 8
9 Topic DNS Actions and Reactions
10 too cheap to meter SpamAssassin as a teaching tool Dotted quads as spamsign RRP and EPP: solving the.com problem Running a race to the bottom Fluidity having only one purpose 30 seconds? Really? Fitting Sturgeon s revelation 90% of <thing> is crap
11 Takedown: Far End Tactics Since we can t prevent it we ll have to evolve coping strategies Takedown as a Service (TaaS?) Yes, you can outsource this now A new profit center! Kill all you want, we ll make more Whack-a-mole as a Service (WaaS?) Incrementalism breeds better criminals
12 Firewalls: Near End Tactics If we can t prevent it and takedown is hard our coping strategy is, fight on the threshold You can filter IP+port, URL, and now even DNS But you can t keep up with the churn So, another outsourceable profit center! And you can t afford manual configuration So, firewall config now follows a pub-sub model This predates Puppet et al by a decade or more
13 DNS Control Points Attribution
14 Owner Lookup, Show History $ dnsdb_query -r vix.com/ns/vix.com... ;; record times: :14: :55:59 ;; count: ; bailiwick: vix.com. vix.com. NS ns.sql1.vix.com. vix.com. NS ns1.isc-sns.net. vix.com. NS ns2.isc-sns.com. vix.com. NS ns3.isc-sns.info. ;; record times: :30: :13:10 ;; count: 330; bailiwick: vix.com. vix.com. NS buy.internettraffic.com. vix.com. NS sell.internettraffic.com. 10/6/2014 Farsight Security, Inc. 14
15 Owner Wildcards, Left Hand $ dnsdb_query -r \*.vix.com/a fgrep internal.cat.lah1.vix.com. A ss.vix.com. A gutentag.vix.com. A lah1z.vix.com. A mm.vix.com. A ww.vix.com. A external.cat.lah1.vix.com. A wireless.cat.lah1.vix.com. A wireless.ss.vix.com. A ap-kit.lah1.vix.com. A cat.lah1.vix.com. A vix.com. A deadrat.lah1.vix.com. A ns-maps.vix.com. A ns.lah1.vix.com. A /6/2014 Farsight Security, Inc. 15
16 Owner Wildcards, Right Hand $ dnsdb_query -r vixie.\*/ns ;; zone times: :10: :24:50 ;; count: 872; bailiwick: com. vixie.com. NS ns2317.hostgator.com. vixie.com. NS ns2318.hostgator.com. ;; zone times: :12: :09:01 ;; count: 111; bailiwick: com. vixie.com. NS ns23.domaincontrol.com. vixie.com. NS ns24.domaincontrol.com. ;; zone times: :52: :54:04 ;; count: 0; bailiwick: info. vixie.info. NS ns31.domaincontrol.com. vixie.info. NS ns32.domaincontrol.com. ^C 10/6/2014 Farsight Security, Inc. 16
17 Data Lookup, By Name $./dnsdb_query -n ss.vix.su/mx vix.su. MX 10 ss.vix.su. dns-ok.us. MX 0 ss.vix.su. mibh.com. MX 0 ss.vix.su. iengines.com. MX 0 ss.vix.su. toomanydatsuns.com. MX 0 ss.vix.su. farsightsecurity.com. MX 10 ss.vix.su. anog.net. MX 0 ss.vix.su. mibh.net. MX 0 ss.vix.su. tisf.net. MX 10 ss.vix.su. iengines.net. MX 0 ss.vix.su. al.org. MX 0 ss.vix.su. vixie.org. MX 0 ss.vix.su. redbarn.org. MX 0 ss.vix.su. benedelman.org. MX 0 ss.vix.su. 10/6/2014 Farsight Security, Inc. 17
18 Data Lookup, by IP Address $ dnsdb_query -r ic.fbi.gov/mx ic.fbi.gov. MX 10 mail.ic.fbi.gov. $ dnsdb_query -r mail.ic.fbi.gov/a mail.ic.fbi.gov. A $ dnsdb_query -i ic.fbi.gov. A mail.ic.fbi.gov. A mail.ncijtf.fbi.gov. A /6/2014 Farsight Security, Inc. 18
19 Data Lookup, by IP Address Block $ dnsdb_query -i /24 grep -v infragard vpn.dev2.leo.gov. A mail.leo.gov. A A A cgate.leo.gov. A A infraguard.org. A A mx.leo.gov. A ic.fbi.gov. A mail.ic.fbi.gov. A mail.ncijtf.fbi.gov. A /6/2014 Farsight Security, Inc. 19
20 Technical Formatting Notes These slides show a DNS output conversion The real output is in JSON format, i.e.: $ dnsdb_query -r f.root-servers.net/a/root-servers.net ;; record times: :10: :22:56 ;; count: ; bailiwick: root-servers.net. f.root-servers.net. A $ dnsdb_query -r f.root-servers.net/a/root-servers.net -j {"count": , "time_first": , "rrtype": "A", "rrname": "f.root-servers.net.", "bailiwick": "rootservers.net.", "rdata": [" "], "time_last": } 10/6/2014 Farsight Security, Inc. 20
21 DNS Control Points DDoS Resistance with DNS-RRL
22 DNS Response Rate Limiting (RRL) If you run a DNS content ( authority ) server, it has to be massively overprovisioned Because OPN s don t have SAV, your server is a purpose-built DNS DDoS reflecting amplifier BIND and NSD now support DNS RRL, which accurately guesses what s safe to drop Your authority servers need this, whereas your recursive servers need to be firewalled off
23 Spoofed Source Attacks attacker Src addr: (target) Botted server, in the cloud, Gigabit speed target Internet Dst addr: (target) reflector
24 RRL In Action: Afilias
25 DNS Control Points DNS Firewalls with DNS-RPZ
26 Response Policy Zones: High Level Uses DNS zones to carry DNS Firewall policy R-P-Z = Response Policy Zones Pub-sub is handled by NOTIFY/TSIG/IXFR Many publishers, many subscribers, one format Pay other publishers, or create your own Or do both, plus a private white-list Simple failure or walled garden, as you choose We call this taking back the streets ( the DNS )
27 RPZ Capabilities Triggers (RR owners): If the query name is $X If the response contains an address in CIDR $X If any name server name is $X If any name server address is in CIDR $X If the query source address is in CIDR $X Actions (RR data): Synthesize NXDOMAIN Synthesize CNAME Synthesize NODATA Synthesize an answer Answer with the truth
28 Why Use RPZ? Easy stuff: Block access to DGA C&C s Block access to known phish/driveby Block if envelope/header is spammy More interesting stuff: Block DNS A/AAAA records in bad address space E.g., import Cymru Bogons or Spamhaus DROP list Block DNS records in your own address space After allowing your own domains to do so, of course
29 Implications of RPZ Controlled Balkanization Open market for producers and consumers Differentiated service at a global scale Instantaneous takedown
30 RPZ Deployment Status The RPZ standard is open and unencumbered So far implemented only in BIND Performance is pretty reasonable New features will be backward compatible This is not an IETF standard
31 DNS Control Points Newly Observed Domains (NOD) An RPZ and RHSBL Feed
32 Newly Observed Domains 60% of the spam we studied used a header or envelope domain name less than 24 hours old Most new domains are rapidly taken down Casa Vixie uses a 10 minute NXDOMAIN rule FSI NOD (5m, 10m, 30m, 1h, 3h, 6h, 12h, 24h) Streams: newly active vs. newly observed Feeds: RPZ (for DNS Firewalls) vs. RHSBL (for Spam Assassin)
33 Newly Observed Domains & SRA sh -x go-sra + exec sratool connect ssh [email protected] * HELLO srad version 0.1.0~a SRA protocol 1 > channel 212 on * OK CHANNEL ON/OFF channel ch212 on > count 3 > 10 watch ch= OK WATCH started 10 ch212 SIE newdomain rdata=cname webredir.vip.gandi.net rrname=news.aldatub.io 10 ch212 SIE newdomain rdata=ns ns1.hostedtube.com rrname=pornmovieonlinefree.xxx 10 ch212 SIE newdomain rdata=ns ns1.zippro2.com rrname=yulinovasoft.ru packet count limit exceeded > ^D
34 Newly Observed Domains & DNS whois -h whois.nic.xxx pornmovieonlinefree.xxx Domain Name:PORNMOVIEONLINEFREE.XXX Domain ID: D XXX Creation Date: 18-Mar :30:58 UTC Updated Date: 19-Mar :41:19 UTC... dig +short txt news.aldatub.io.v1.bl.dns-nod.net "first_seen= " dig +short a news.aldatub.io.v1.bl.dns-nod.net
35 Limited Bibliography
DNS as a Forensics Tool. Dr. Paul Vixie, CEO Farsight Security, Inc. 2014-06-23 FIRST, Boston
DNS as a Forensics Tool Dr. Paul Vixie, CEO Farsight Security, Inc. 2014-06-23 FIRST, Boston Internet as Territory But what is the internet? It's the largest equivalence class in the reflexive transitive
Domain Name Abuse: How Cheap New Domain Names Fuel The ecrime Economy
SESSION ID: HTA-R02 Domain Name Abuse: How Cheap New Domain Names Fuel The ecrime Economy Dr. Paul Vixie CEO Farsight Security, Inc. @paulvixie Today's Agenda DNS History At-A-Glance New Domain Name Churn
DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012
DNS Firewalls with BIND: ISC RPZ and the IID Approach Tuesday, 26 June 2012 1 About the Presenters»»» Paul Vixie Chairman and Founder Internet Systems Consortium Rod Rasmussen President and CTO IID (Internet
Response Policy Zones
Response Policy Zones Taking Back the DNS, V2.0 Paul Vixie Chairman and Chief Scientist Internet Systems Consortium Abstract DNS works as well for the bad guys (criminals, spammers, spies) as for respectable
Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour
Response Policy Zones for the Domain Name System (DNS ) By Paul Vixie, ISC (et.al.) 2010 World Tour Overview Motivation for DNS Response Policy Zones Relationship to DNS RBL (DNSBL) Constraints and Goals
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] page 2 One slide DNS Root www.nlnetlabs.nl A Referral: nl NS www.nlnetlabs.nl A 213.154.224.1 www.nlnetlabs.nl A www.nlnetlabs.nl A 213.154.224.1
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
DNS Response Policy Zone (DNSRPZ)
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still
Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS. Dr. Paul Vixie, CEO, Farsight Security, Inc.
Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS Dr. Paul Vixie, CEO, Farsight Security, Inc. Today s Agenda I. Introduction II. Passive DNS III. Using Passive DNS to Avoid Takedowns
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
DNSSEC and DNS Proxying
DNSSEC and DNS Proxying DNS is hard at scale when you are a huge target 2 CloudFlare DNS is big 3 CloudFlare DNS is fast 4 CloudFlare DNS is always under attack 5 CloudFlare A secure reverse proxy for
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
Talk-101 User Guide. DNSGate
Talk-101 User Guide DNSGate What is DNSGate? DNSGate is a management interface to allow you to make DNS changes to your domain. The interface supports A, CNAME, MX and TXT records. What is DNS? DNS stands
DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014
DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Firewalls 1 / 43. Firewalls
What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains?
How to set up the Integrated DNS Server for Inbound Load Balancing
How to set up the Integrated DNS Server for Introduction Getting Started Peplink Balance has a built-in DNS server for inbound link load balancing. You can delegate a domain s NS/SOA records, e.g. www.mycompany.com,
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
3. The Domain Name Service
3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)
DNS Some advanced topics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.6, 2013/09/19 10:55:30) Friday, September 13, 2013 Karst Koymans (with Niels Sijm) (UvA)
DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) survey says: There are things that go bump in the night, and things that go bump against your DNS security. You probably know
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
Web Hosting 101. with Patrick McNeil
Web Hosting 101 with Patrick McNeil Alphabet soup Why learn the technical side? To help your clients solve problems To help you work better with your tech team To better understand how the web works To
DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa. DNS & IPv6.
DNS & IPv6 MENOG4, 8-9 April 2009 Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa Agenda DNS & IPv6 Introduction What s next? SaudiNIC & IPv6 About SaudiNIC How a cctld Registry supports
ThreatSTOP Technology Overview
ThreatSTOP Technology Overview The Five Parts to ThreatSTOP s Service We provide 5 integral services to protect your network and stop botnets from calling home ThreatSTOP s 5 Parts: 1 Multiple threat feeds
The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.
1 TLP: GREEN 02.11.15 GSI ID: 1086 SECURITY BULLETIN: MS SQL REFLECTION DDOS RISK FACTOR - MEDIUM 1.1 / OVERVIEW / Beginning in October 2014, PLXsert observed the use of a new type of reflection-based
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check http://kuix.
Spam Salt aka Message Salt An invention against email abuse (Spam), introducing an email sender authentication mechanism. Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to
DNS. DNS Fundamentals. Goals of this lab: Prerequisites: LXB, NET
DNS DNS Fundamentals Goals of this lab: Learn how the domain name system works Learn about tools to test and troubleshoot DNS Learn how to deploy a basic DNS service Prerequisites: LXB, NET REVISION: 2.0
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
How to Configure the Windows DNS Server
Windows 2003 How to Configure the Windows DNS Server How to Configure the Windows DNS Server Objective This document demonstrates how to configure domains and record on the Windows 2003 DNS Server. Windows
Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution
Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution DG_ACC_062011.1 TABLE OF CONTENTS 1 Introduction... 3 2 Deployment Guide Overview... 3 3 Lab Setup Requirements... 3 4 Architecture
Copyright 2012 http://itfreetraining.com
In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the
CS3250 Distributed Systems
CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
SIE, PassiveDNS, and data combining
SIE, PassiveDNS, and data combining ENOG, June 2011 Eric Ziegast / Shane Kerr About ISC SIE Agenda Passive DNS and DNSDB Data analysis and combining examples How to participate 3 Shane
Defending against DNS reflection amplification attacks
University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013 Authors: Thijs Rozekrans Javy de Koning
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS /ABOUT/ME Thomas Chopitea - Incident handler @CertSG Digital forensics & incident response (#DFIR), malware analysis,
CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders
Mail agents Introduction to Internet Mail Philip Hazel University of Cambridge MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom, Mulberry,
Email Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand [email protected] (408) 834-7577 x125
Email Marketing 201 How a SPAM Filter Works Craig Stouffer Pinpointe On-Demand [email protected] (408) 834-7577 x125 Mark Feldman NetProspexVP Marketing [email protected] (781) 290-5714 www.twitter.com/pinpointe
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
DNS Response Policy Zones Roadmap to Accellerate Adoption
DNS Response Policy Zones Roadmap to Accellerate Adoption Hugo M. Connery Based on input from the DNS RPZ Community June 28, 2013 Contents 1 Introduction 1 1.1 Audience....................................
Ralph Dolmans A solution for the DNS amplification attack problem
Ralph Dolmans A solution for the DNS amplification attack problem July 4 th, 2013 Context Spamhaus was attacked with 300Gbps Every day attacks are getting bigger Sites can be held hostage, banks cannot
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected]. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected] Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Configuring DNS on Cisco Routers
Configuring DNS on Cisco Routers Document ID: 24182 Contents Introduction Prerequisites Requirements Components Used Conventions Setting Up a Router to Use DNS Lookups Troubleshooting You Can Ping a Web
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
Installing and Setting up Microsoft DNS Server
Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.
Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011
The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
DNSSEC Applying cryptography to the Domain Name System
DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
Table of Contents DNS. How to package DNS messages. Wire? DNS on the wire. Some advanced topics. Encoding of domain names.
Table of Contents DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 DNS on the wire Encoding of domain names
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
Security Monitoring of DNS traffic
Security Monitoring of DNS traffic Bojan Zdrnja CompSci 780, University of Auckland, May 2006. [email protected] Abstract The Domain Name System (DNS) is a critical part of the Internet. This paper
CSE543 - Computer and Network Security Module: Firewalls
CSE543 - Computer and Network Security Module: Firewalls Professor Trent Jaeger Fall 2010 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
Using the Intrusion Prevention System in MultiNet V5.3
Using the Intrusion Prevention System in MultiNet V5.3 Jeremy Begg VSM Software Services Pty Ltd March 2009 Introduction One of the interesting new features in MultiNet V5.3 is a security mechanism called
IETF Update on RDAP. ICANN52 Singapore CCTLD Tech Day. Marc Blanchet Viagénie [email protected]
IETF Update on RDAP ICANN52 Singapore CCTLD Tech Day Marc Blanchet Viagénie [email protected] February 9th 2015 From Whois to RDAP RDAP: Registration Data Access Protocol replacement of whois structured
How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net
Surviving a DDoS Attack: What every host needs to know Maria Karaivanova, Business Development David Koston, Platform www.cloudflare.com DDoS Attacks are becoming massive, and easier to initiate!2 Major
Comprehensive Understanding of Malicious Overlay Networks
Comprehensive Understanding of Malicious Overlay Networks Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected]
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Operational Problems in IPv6: Fallback and DNS issues
Operational Problems in : Fallback and DNS issues Tomohiro Fujisaki, Arifumi Matsumoto, Katsuyasu Toyama,Tsuyoshi Toyono and Shirou Niinobe Nippon Telegraph and Telephone Corporation Network problems associated
Debugging With Netalyzr
Debugging With Netalyzr Christian Kreibich (ICSI), Nicholas Weaver (ICSI), Boris Nechaev (HIIT/TKK), and Vern Paxson (ICSI & UC Berkeley) 1 What Is Netalyzr?! Netalyzr is a comprehensive network measurement
Network Security - ISA 656 Firewalls & NATs
Network Security - ISA 656 & NATs Angelos Stavrou Types of Schematic of a Conceptual Pieces Packet UDP Types of Packet Dynamic Packet Application Gateways Circuit Relays Personal /or Distributed Many firewalls
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
DNS amplification attacks
amplification attacks Matsuzaki Yoshinobu 2006/04/25 Copyright (C) 2006 Internet Initiative Japan Inc. 1 amplification attacks Attacks using IP spoofed dns query generating a traffic overload
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
Network reconnaissance and IDS
Network reconnaissance and IDS CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642 Let s play over the network Target
Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.
Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business
CSC574 - Computer and Network Security Module: Firewalls
CSC574 - Computer and Network Security Module: Firewalls Prof. William Enck Spring 2013 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
