Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic "" " Matt Thomas" Data Architect, Verisign Labs"
|
|
|
- Edward Miller
- 10 years ago
- Views:
Transcription
1 Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic "" " Matt Thomas" Data Architect, Verisign Labs"
2 About the Author"! Matthew Thomas! Data Architect" Verisign Labs"! Aziz Mohaisen! Sr. Research Scientist" Verisign Labs"
3 An Overview of Command & Control Botnets" Malware commonly uses Domain Fast-Fluxing or Domain Generation Algorithms (DGA)" Typically seeded by system clock" Domains span many TLDs" DNS traffic lookup patterns will emerge as all infected hosts resolve the same set of domains" " Most result in NXDomain"
4 Conficker: The Quintessential DGA" A malware family that popularized the concept of DGA" Thousands of infected machines still exist" Many variants each generates different set of domains" " DGA Algorithm was reverse engineered" Provides set of domains generated for each variant for a given day" Useful ground truth for detection" " How does Conficker traffic differ from typical NXD traffic?"
5 NXDomain Traffic Data" Daily volume of NXD traffic for CC/TV/NET/COM" NXD traffic is associated with domains not registered, mistyped, etc"
6 NXDomain Traffic Data" Daily number of unique Second Level Domains (SLDs)" The traffic is NXD (not registered domains, mistyped, etc)"
7 NXDomain Traffic Data" COM typically sees ~2.5 billion NXD requests per day and spans over 350 million unique SLDs" NET receives 500 million NXD requests over 60M SLDs (SLDs that are not registered, or mistyped)" cctlds receive significantly less traffic, and less NXD" What s the distribution of requests per SLD?"
8 NXDomain Traffic Data" CDF of average number of NXD requests per SLD "
9 NXDomain Traffic Data" CDF of number of days an SLD appears in a week"
10 NXDomain Traffic Data" Average SLD receives minimal amount of NXD traffic" 95% of SLD s NXD receive less than 10 requests within 24 hours" High churn rate within the SLD set during a week" How does Conficker s NXD traffic compare?"
11 Conficker s NXDomain Traffic Data" NXD traffic volume for DGA domains prior, during and after their expected generation date"
12 Conficker s NXDomain Traffic Data" NXD traffic diversity (/24 of the RNS) for DGA domains prior, during and after their expected generation date"
13 Conficker s NXDomain Traffic Data" Despite specific generation date, DGA domains receive traffic pre and post its specific generation date" Possible global clock skew; also possible misconfiguration " Large amount of traffic from diverse set of RNS for SLDs" Statistical abnormal compare to whole NXD population" How can we detect and associate malware domains?"
14 Detection and Clustering" 14"
15 Computing Traffic Similarity" We try to address the following questions:" How similar are traffic streams to each other?" Can the similarity be used to group different traffic streams?" " The similarity function is a real-valued function that quantifies the similarity between two entities" Jaccard Index is a statistic for comparing the similarity and diversity of sample sets (one among many)"
16 Conficker s Traffic Similarity" CDF of pairwise domain similarities for a set of DGA domains based on on their /24 RNS set for a given day"
17 Conficker s Traffic Similarity" Count Color Key and Histogram Value DPNRUQ.NET CBCBXK.NET NPQNVINF.NET USELIWHA.NET QKYHNAYL.NET HSHANWTDLL.NET EHFDZ.NET MVTJJUXUPV.NET HZWCBP.NET XBEUEHK.NET EASNKBZWVV.NET WVVXHZFHQH.NET HXMLZIZLTZK.NET Subset of domains from Conficker A & B clustered based on similarity using single-linkage algorithm" BBXGVLDEGGF.NET TGAABUXBHB.NET QBUJK.NET OQXMBVJYXU.NET VVVSBPUEHOL.NET LQWMPTBZHW.NET IMZDCFIMQJ.NET SZSEVX.NET LALLKHU.NET NEJINHU.NET RLRZHORFIB.NET JGHUGKXS.NET ATQMS.NET DYBRGJS.NET AOENGA.NET OLDWTRKC.NET ZAKTDU.NET ZAKTDU.NET OLDWTRKC.NET AOENGA.NET DYBRGJS.NET ATQMS.NET JGHUGKXS.NET RLRZHORFIB.NET NEJINHU.NET LALLKHU.NET SZSEVX.NET IMZDCFIMQJ.NET LQWMPTBZHW.NET VVVSBPUEHOL.NET OQXMBVJYXU.NET QBUJK.NET TGAABUXBHB.NET BBXGVLDEGGF.NET HXMLZIZLTZK.NET WVVXHZFHQH.NET EASNKBZWVV.NET XBEUEHK.NET HZWCBP.NET MVTJJUXUPV.NET EHFDZ.NET HSHANWTDLL.NET QKYHNAYL.NET USELIWHA.NET NPQNVINF.NET CBCBXK.NET DPNRUQ.NET
18 Conficker s NXDomain Traffic Data" Domains on a specific DGA date have very high similarity measures, most measuring higher than 0.9" Techniques such as hierarchical clustering could potentially group domains from a specific DGA into distinct clusters based on DNS traffic similarity" " How do various similarity thresholds affect the cluster?" Count Value 1 ZAKTDU.NET OLDWTRKC.NET AOENGA.NET DYBRGJS.NET ATQMS.NET JGHUGKXS.NET RLRZHORFIB.NET NEJINHU.NET LALLKHU.NET SZSEVX.NET IMZDCFIMQJ.NET LQWMPTBZHW.NET VVVSBPUEHOL.NET OQXMBVJYXU.NET QBUJK.NET TGAABUXBHB.NET BBXGVLDEGGF.NET HXMLZIZLTZK.NET WVVXHZFHQH.NET EASNKBZWVV.NET XBEUEHK.NET HZWCBP.NET MVTJJUXUPV.NET EHFDZ.NET HSHANWTDLL.NET QKYHNAYL.NET USELIWHA.NET NPQNVINF.NET CBCBXK.NET DPNRUQ.NET DPNRUQ.NET CBCBXK.NET NPQNVINF.NET USELIWHA.NET QKYHNAYL.NET HSHANWTDLL.NET EHFDZ.NET MVTJJUXUPV.NET HZWCBP.NET XBEUEHK.NET EASNKBZWVV.NET WVVXHZFHQH.NET HXMLZIZLTZK.NET BBXGVLDEGGF.NET TGAABUXBHB.NET QBUJK.NET OQXMBVJYXU.NET VVVSBPUEHOL.NET LQWMPTBZHW.NET IMZDCFIMQJ.NET SZSEVX.NET LALLKHU.NET NEJINHU.NET RLRZHORFIB.NET JGHUGKXS.NET ATQMS.NET DYBRGJS.NET AOENGA.NET OLDWTRKC.NET ZAKTDU.NET Color Key and Histogram
19 19"
20 Clustering Similarity Thresholds" 20"
21 Clustering Similarity Thresholds" The number of SLDs contained in a cluster at various similarity threshold levels"
22 Clustering Similarity Thresholds" The number of distinct clusters formed at various similarity threshold levels"
23 Clustering Similarity Thresholds" Temporal evolution of clusters based on SLDs present"
24 Global Malware Detection" 24"
25 Global Malware Detection" Similarity thresholds influence the number of clusters and the number of domains within each cluster" What resulting clusters appear when such a technique is applied to all NXD traffic?"
26 Global Malware Detection" Clusters identified with a similarity threshold set to > 0.9 " Each point is a cluster measures # domains and # RNS"
27 Global Malware Detection" Many detected clusters of malware/variants use a small amount of domains observable in our dataset" A few clusters generated several hundred domains" May influence evasiveness and resilience of a botnet" Several clusters have thousands of distinct /24s" Infection rate or prevalence of a malware"
28 Concluding Remarks and Future Work" We look at using the authoritative NXD traffic for identifying DGA s used as the C&C channel of malware" " We use the largest dataset from com/net resolution" Domain names used for C&C are identifiable by their request pattern" Different generations of the Conficker malware family are identified" Clustering of traffic yields interesting structures identifying evasion" Future works: We will look into extending the work" To other malware families using DNS for C&C" Highlight operation impact and evolution of evasion techniques" Explore spread of infections via remote sensing at the DNS level"
29 2014 VeriSign, Inc. All rights reserved. VERISIGN and other Verisign-related trademarks, service marks, and designs appearing herein are registered or unregistered trademarks and/or service marks of VeriSign, Inc., and/or its subsidiaries in the United States and in foreign countries. All other trademarks, service marks, and designs are property of their respective owners."
Detecting Search Lists in Authoritative DNS
Detecting Search Lists in Authoritative DNS Andrew Simpson March 10 th, 2014 Summary Early research into name collisions has postulated that search list interaction drives some portion of the DNS requests
Comprehensive Understanding of Malicious Overlay Networks
Comprehensive Understanding of Malicious Overlay Networks Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected]
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
DNS Footprint of Malware
DNS Footprint of Malware Ed Stoner [email protected] CERT Network Situational Awareness 2010 Carnegie Mellon University Anexa Automated Run-Time Analysis environment Malicious Software Catalog of millions of
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
Report. Takeover of Virut domains
Report Takeover of Virut domains February 25, CONTENTS Contents 1 Executive summary 2 2 Introduction 2 2.1 What is Virut?................................ 2 2.2 Takeover of Virut domains..........................
ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
STATE OF DNS AVAILABILITY REPORT
STATE OF DNS AVAILABILITY REPORT VOLUME 1 ISSUE 1 APRIL 2011 WEB SITES AND OTHER ONLINE SERVICES ARE AMONG THE MOST IMPORTANT OPERATIONAL AND REVENUE GENERATING TOOLS FOR BUSINESSES OF ALL SIZES AND INDUSTRIES.
Preetham Mohan Pawar (1000919136)
Charles Lever, Manos Antonakakis, Brad Reaves, Patrick Traynor, Wenke Lee Presented By:- Preetham Mohan Pawar (1000919136) University of Texas, Arlington CSE Introduction. Basic concepts.( DNS ) Mobile
Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy. 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs
Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs Motivation Network resources are consumed by a small number
Domain Name Service (DNS) Training Division, NIC New Delhi
Domain Name Service (DNS) Training Division, NIC New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Replicating DNS V. Dynamic update
Detecting Algorithmically Generated Malicious Domain Names
Detecting Algorithmically Generated Malicious Domain Names Sandeep Yadav, Texas A&M University IT Security for the Next Generation American Cup, New York 9-11 November, 2011 Introduction Botnets, a network
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
High Availability for Citrix XenApp
WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi Institute Eurecom, Sophia Antipolis {bilge,kirda,balduzzi}@eurecom.fr Northeastern
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
New Trends in FastFlux Networks
New Trends in FastFlux Networks Wei Xu 408-753-4135 [email protected] Huagang Xie 408-753-4109 [email protected] Xinran Wang 408-753-4108 [email protected] ABSTRACT Fast-flux
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security Agenda Increasing DNS availability using DNS Anycast Opening the internal DNS Enhancing DNS security DNS traffic
SIDekICk SuspIcious DomaIn Classification in the.nl Zone
Master Thesis as part of the major in Security & Privacy at the EIT Digital Master School SIDekICk SuspIcious DomaIn Classification in the.nl Zone delivered by Moritz C. Müller [email protected]
Internet Security and Resiliency: A Collaborative Effort
Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
The Growing Problem of Outbound Spam
y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
DATA SHEET. What Darktrace Finds
DATA SHEET What Darktrace Finds Darktrace finds anomalies that bypass other security tools, due to the uniqueness of the Enterprise Immune System, capable of detecting threats without reliance on rules,
Appendix D: Configuring Firewalls and Network Address Translation
Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology
Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:
Conficker Summary and Review Dave Piscitello, ICANN Senior Security Technologist 7 May 2010
ConfickerSummaryandReview ConfickerSummaryandReview DavePiscitello,ICANNSeniorSecurityTechnologist 7May2010 Abstract Thisreportprovidesachronologyofeventsrelatedtothecontainmentof theconfickerworm.itprovidesanintroductionandbriefdescriptionofthe
Citrix Server: Citrix Server work as a remote connection by users
PERFORMANCETESTING FOR CITRIXUSINGLOADRUNNER BESTPRACTICES Presented By Rupesh Garg & Saket Bihari Wipro Technologies. ABSTRACT HP s industry standard load testing product Load Runner has been customized
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, and Wenke Lee Domain Name System Machine-level
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi Institute Eurecom, Sophia Antipolis {bilge,kirda,balduzzi}@eurecom.fr Northeastern
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
The Domain Name Industry Brief Volume 4 - Issue 4 - June 2007
The Domain Name Industry Brief Volume 4 - Issue 4 - June 2007 The VeriSign Domain Name and Pay Per Click Advertising Report As the global registry operator for.com and.net, VeriSign closely monitors the
Next-Generation DNS Monitoring Tools
Next-Generation DNS Monitoring Tools Cyber Security Division 2012 Principal Investigators Meeting October 9, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected] 404-808-5172
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis
Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis United States Computer Emergency Readiness Team (US-CERT) Detection and Analysis January 2011 Background As the number
Security Business Review
Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
Winning with DNS Failures: Strategies for Faster Botnet Detection
Winning with DNS Failures: Strategies for Faster Botnet Detection Sandeep Yadav and A.L. Narasimha Reddy Department of Electrical and Computer Engineering, Texas A&M University [email protected],[email protected]
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
D&D of malware with exotic C&C
D&D of malware with exotic C&C D&D = Description & Detection C&C = Command & Control Automotive Consumer Energy & Chemicals Paul Rascagneres - @r00tbsd Eric Leblond - @Regiteric Life Sciences & Healthcare
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
JOURNAL OF L A T E X CLASS FILES, VOL. X, NO. X, JANUARY 201X 1 Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis Roberto Perdisci, Igino Corona, and Giorgio Giacinto
THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014
THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014 THE VERISIGN DOMAIN REPORT AS THE GLOBAL LEADER IN DOMAIN NAMES, VERISIGN REVIEWS THE STATE OF THE DOMAIN NAME INDUSTRY THROUGH A VARIETY OF
Botnet Detection with DNS Monitoring
Botnet Detection with DNS Monitoring Christopher Will Advisor: Oliver Gasser Seminar Future Internet SS2014 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION Kleissner & Associates Botconf 14, 3-5 Dec 2014, Nancy/France Worlds largest botnet monitoring system Since September 2012 Originally
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Windows Server 2008 R2 Initial Configuration Tasks
Windows Server 2008 R2 Initial Configuration Tasks I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the
DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING
PolyServe High-Availability Server Clustering for E-Business 918 Parker Street Berkeley, California 94710 (510) 665-2929 wwwpolyservecom Number 990903 WHITE PAPER DNS ROUND ROBIN HIGH-AVAILABILITY LOAD
Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS
White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves
Blind Spot Analysis Finding RAT Communications through Entropy and Analytics
Blind Spot Analysis Finding RAT Communications through Entropy and Analytics Customer Profile EMC CIRC ANDREW RUTKIEWICZ Principle IT Security Analyst Numerical weakness comes from having to prepare against
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012
DNS Firewalls with BIND: ISC RPZ and the IID Approach Tuesday, 26 June 2012 1 About the Presenters»»» Paul Vixie Chairman and Founder Internet Systems Consortium Rod Rasmussen President and CTO IID (Internet
BOTNET Detection Approach by DNS Behavior and Clustering Analysis
BOTNET Detection Approach by DNS Behavior and Clustering Analysis Vartika Srivastava, Ashish Sharma Dept of Computer science and Information security, JIIT Noida, India Abstract -Botnets are one of the
How To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager
Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW Jürgen Seitz Systems Engineering Manager Evolution of Network Security Next-Gen Firewall Application Visibility and Control User-based
trends in mobile malware and importance of network based user protection
trends in mobile malware and importance of network based user protection Sicherheitsnetzwerk München: Praxisforum Anwender und Anbieter im Dialog Mobile Sicherheit im Unternehmen Joachim Lüken, Nokia Networks,
Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE
Network that Know Rasmus Andersen Lead Security Sales Specialist North & RESE Email Gateway vendor CERT AV vendor Law enforcement Web Security Vendor Network security appliance vendor IT Department App
GroupWise SMTP Infrastructure Design:
Managing an Enterprise Series : GWIA configuration and use Lawrence Kearney Enterprise and Workgroup Service Analyst [email protected] http://www.lawrencekearney.com Session Agenda Discussion
How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For
Deployment Guide Deployment Guide VeriSign Certificate Authority Citrix NetScaler SSL Deployment Guide Notice: The information in this publication is subject to change without notice. THIS PUBLICATION
GLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014 [email protected]
How Lastline Has Better Breach Detection Capabilities By David Strom December 2014 [email protected] The Internet is a nasty place, and getting nastier. Current breach detection products using traditional
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
CIT 480: Securing Computer Systems. Malware
CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware
dnsperf DNS Performance Tool Manual
dnsperf DNS Performance Tool Manual Version 2.0.0 Date February 14, 2012 Copyright 2002-2012, Inc. - All Rights Reserved This software and documentation is subject to and made available pursuant to the
A General-purpose Laboratory for Large-scale Botnet Experiments
A General-purpose Laboratory for Large-scale Botnet Experiments Thomas Barabosch, Sebastian Eschweiler, Mohammad Qasem, Daniel Panteleit, Daniel Plohmann and Elmar Gerhards-Padilla Cyber Defense Fraunhofer
Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency
Deployment Guide Document Version 1.2 What s inside: 2 Configuration example 5 Configuring the BIG-IP LTM using the Lync 2010 iapp 6 Configuring the BIG-IP GTM 11 Creating a Distributed Application for
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
How To Test For Security Protection
False Sense of Security: New Anti-Virus Testing Methodologies are Critical to Educate Customers Charlotte Dunlap Independent Security Analyst Charlotte Dunlap is an independent security analyst and regular
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Botnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
