Preetham Mohan Pawar ( )
|
|
|
- Moses Marshall
- 10 years ago
- Views:
Transcription
1 Charles Lever, Manos Antonakakis, Brad Reaves, Patrick Traynor, Wenke Lee Presented By:- Preetham Mohan Pawar ( ) University of Texas, Arlington CSE
2 Introduction. Basic concepts.( DNS ) Mobile Device Identification Process.(TASK 1) Filtering Benign Domains.(TASK 2) Feature Extraction. Dataset Summary. Results. University of Texas, Arlington CSE
3 Malware writers have begun to pay attention to mobile phones. Google and Apple have also invested significant resources in an attempt to prevent malicious applications from being installed on mobile devices and for later removing such applications if necessary. The extent to which the mobile ecosystem is actually infected by such malware is not well understood. verify hypothesis experimentally using three weeks of DNS data from a major US based cellular provider and a noncellular provider collected over the course of three months. University of Texas, Arlington CSE
4 Known mobile malware samples are virtually unseen. Infected: 3,492 out of 380,537,128 devices, or less than % of the population. Malware writers are failing to infect mobile devices with much success Compare traffic to suspicious hosts from ios against all other devices. Analysis demonstrates that approximately 8% of ios-based devices communicate with known suspicious hosts, virtually the identical frequency as all other mobile platforms. Observe campaigns with mobile malware clients. Analyze two major threats with mobile malware clients. University of Texas, Arlington CSE
5 DNS is a backbone protocol for the Internet that maps easy-to-remember domain names to IP network addresses. The domain name space is arranged as a tree, beginning with a root node. under the root node are the top-level domains (TLDs), and under the TLDs are the second-level domains, and so on. A fully qualified domain name (FQDN) includes all domain levels that describe the node in the DNS tree. Effective TLDs University of Texas, Arlington CSE
6 University of Texas, Arlington CSE
7 A DNS query is initiated by a DNS resolver running on a host. Issue a recursive request using a stub resolver to the recursive DNS resolver(rdns). RDNS is charged with completing the iterative portion of the DNS resolution process. The RDNS will typically cache the RR locally for up to some period, the Time To Live (TTL). University of Texas, Arlington CSE
8 Data collection of DNS queries received at the RDNS. pdns data collection typically includes all of the information associated with the successfully resolved DNS queries by the RDNS. University of Texas, Arlington CSE
9 Advantages: Malicious queries are able to be logged and analyzed without alerting the owners of the malicious domains. pdns data collection allows the discovery of malicious domains not previously known to exist on DNS blacklists (DNSBL) Disadvantages: data collected will be limited by the amount of traffic handled by the RDNS. University of Texas, Arlington CSE
10 Representation of a DNS query, qj, for a domain name, d, and the related DNS response, rj, as tuple Qj(d) = (Tj,Rj, IPsj), where Tj identifies the epoch in which the query-response was observed Rj is the unique identification of the device that initiated the query qj d is the queried domain, and IPsj is the set of resolved hosts as reported in the response rj
11
12 Proprietary data is received from the carrier that allows us to attribute traffic to a mobile device operating on the network for each epoch. set of mobile devices in an epoch. MDEVi = {Rk}k=1...l be a set that contains all l mobile device identifiers (Rk) for epoch i, and i ε EPOCHS. set of domains resolved by MDEVi in epoch i as mdni = {dk}k=1...n, where n is the number of domains (dk).
13 some domains are strongly or exclusively associated with mobile applications. Examples: Google s AdMob [1] advertising network is only supported on Android and ios Devices are labeled as mobile only if they contact a domain d with a mobile indicator or domains strongly associated with mobile applications or services. small number of cases where overlap exists, we tag a device as unknown and do not consider its behavior as reflective of mobile devices
14
15 The first step in this process is identifying and removing known benign traffic from our dataset. We achieve this by whitelisting all requests made to the top 750,000 effective second level domains (e2lds) according to Alexa [ ]. Dynamic Domain name systems are not whitelisted. further filter benign traffic by manually inspecting list of approximately 800 e2lds based on the lookup volume of the queried domains. This follows power law[ ]. In the small number of cases where overlap exists, we tag a device as unknown and do not consider its behavior as reflective of mobile devices. mdrdcj = {dk}k=1...n, where mdrdcj is a set that contains all n not whitelisted domain names (dk) resolved by mobile devices in epoch j
16
17 Two features from this group: The number of elements in the sets fpdns(ip)(non cellular domains). The number of elements in the sets fj cell(ip)(cellular domains). It returns a set of domain names dk The PF feature family, which is based on passive DNS data, will show to what extent the hosts from mobile RRs (directly or indirectly) can be associated with DNS resolutions from a non-cellular ISP.
18 These features describe direct reputations of the IP addresses in the set HOSTSj. We compute three features for each IP address: fmal(ip), the count of unique malware associated with ip, furl(ip), the count of URLs associated with ip, and fpbl(ip), the count of public blacklisting incidents associated with ip. The EF features, will show us to what extent the already tainted Internet hosting infrastructure is currently used directly by mobile devices.
19 Observations from the Cellular Carrier Traffic
20 Comparing cellular DNS traffic with: Public blacklist data (PBL) Phishing and drive-by download evidence (URL) Hosts accessed by known malicious applications (MAL). Mobile Blacklist containing 2,914 domains known to be malicious.
21 It is important note that our cellular DNS traffic sensor aggregates data from several different locations in different time zones.
22 Interested in unique Internet-based hosts requested by mobile devices. The filtering process results in the set HOST Sall having the following characteristics: At least one resolution request for each host was observed by the cellular carrier. The observed DNS requests came strictly from devices classified as mobile. The hosts are not associated with any known benign infrastructure, and The host is a routable IP address.
23 Notos [ ] reputation scores to the RRs that have IPs in the HOST Sall set, and use reputation threshold of 0.8 (or above 80% probability of the RR being malicious), we obtain 51,503 domain names (3,636 distinct IPs) as likely suspicious. Only 18 domain names of them have been listed in mobile blacklist.
24
25 We observe that 38% of the hosts corresponding to applications from Zhou et al dataset, have been historically associated with more than one malware samples. Approximately 23% of hosts in HOSTSsoftandroid dataset, can also be linked with more that one malware samples. Google play has the lowest percentage 10% linked with more than one sample.
26
27 Tainted hosts requested by mobile platforms
28 These threat class was found in the public blacklist. All of these threats classes were seen in pdns cellular network and were visited by mobile devices.
29 Mobile malware in the cellular network
30 The most prevalent malicious family in the network was FakeDoc. The second most popular malware family was NotCompatible. Only 9,033 devices of any type out of a total of over 480M million (0.001%), and 3,492 devices out of a total of 380M confirmed mobile devices (0.0009%) contacted a domain known to facilitate mobile malware.
31 Classified into 2 threats. Threat ε and Threat β. Both android application. Threat ε aims on obtaining user s credentials with the help of a login screen. Threat β calls a service with periodically contacts a C&C server. [ ] Command and Control (C&C) servers are centralized machines that are able to send commands and receive outputs of machines part of a botnet.
32
33
34
35 Reactive security measures failed to detect a threat until well after it was most effective. Second, both of these threats show a growth pattern similar to those shown in non-mobile malware studies [5]. Third, the agility in the hosting infrastructure used by these threats are similar to non-mobile botnet operators that commonly use tactics like moving to hosts in different networks and countries to provide agility to their illicit operations.
36
37 doi= M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou, and D. Dagon. Detecting malware domains at the upper DNS hierarchy. In Proceedings of the 20th USENIX Security Symposium, 2011.
38 Questions? THANK YOU
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology
Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, and Wenke Lee Domain Name System Machine-level
Detecting Malware Domains at the Upper DNS Hierarchy
Abstract Detecting Malware Domains at the Upper DNS Hierarchy Manos Antonakakis *, Roberto Perdisci, Wenke Lee *, Nikolaos Vasiloglou II, and David Dagon * Damballa Inc. {manos,nvasil}@damballa.com * Georgia
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
Next-Generation DNS Monitoring Tools
Next-Generation DNS Monitoring Tools Cyber Security Division 2012 Principal Investigators Meeting October 9, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected] 404-808-5172
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi Institute Eurecom, Sophia Antipolis {bilge,kirda,balduzzi}@eurecom.fr Northeastern
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 25 Domain Name System 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 25.2 Figure 25.1 Example of using the DNS service 25-1 NAME SPACE To be unambiguous,
Building a Dynamic Reputation System for DNS
Building a Dynamic Reputation System for DNS Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, and Nick Feamster College of Computing, Georgia Institute of Technology, {manos,rperdisc,dagon,wenke,feamster}@cc.gatech.edu
Understanding DNS (the Domain Name System)
Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi Institute Eurecom, Sophia Antipolis {bilge,kirda,balduzzi}@eurecom.fr Northeastern
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
JOURNAL OF L A T E X CLASS FILES, VOL. X, NO. X, JANUARY 201X 1 Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis Roberto Perdisci, Igino Corona, and Giorgio Giacinto
Detecting Hidden Anomalies in DNS Communication
Detecting Hidden Anomalies in DNS Communication Ondrej Mikle, Karel Slaný, Ján Veselý, Tomáš Janoušek and Ondřej Surý CZ.NIC Americka 23, 2 Prague, Czech Republic [email protected], [email protected],
Comprehensive Understanding of Malicious Overlay Networks
Comprehensive Understanding of Malicious Overlay Networks Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected]
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
3. The Domain Name Service
3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee College of Computing, Georgia Institute
Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1
Cymon.io Open Threat Intelligence 29 October 2015 Copyright 2015 esentire, Inc. 1 #> whoami» Roy Firestein» Senior Consultant» Doing Research & Development» Other work include:» docping.me» threatlab.io
Security Intelligence Blacklisting
The following topics provide an overview of Security Intelligence, including use for blacklisting and whitelisting traffic and basic configuration. Security Intelligence Basics, page 1 Security Intelligence
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Understand Names Resolution
Understand Names Resolution Lesson Overview In this lesson, you will learn about: Domain name resolution Name resolution process steps DNS WINS Anticipatory Set 1. List the host name of 4 of your favorite
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
The Domain Name System
Internet Engineering 241-461 Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre DNS The Domain Name System Kurose & Ross: Computer Networking Chapter 2 (2.5) James F. Kurose
An Empirical Analysis of Malware Blacklists
An Empirical Analysis of Malware Blacklists Marc Kührer and Thorsten Holz Chair for Systems Security Ruhr-University Bochum, Germany Abstract Besides all the advantages and reliefs the Internet brought
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Inspecting DNS Flow Traffic for Purposes of Botnet Detection
Inspecting DNS Flow Traffic for Purposes of Botnet Detection Vojtěch Krmíček, GEANT3 JRA2 T4 Internal Deliverable 2011 Abstract The goal of this report is to examine DNS IP flow traffic and its relation
Configuring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
IMPROVING INTERNET SECURITY VIA LARGE-SCALE PASSIVE AND ACTIVE DNS MONITORING
IMPROVING INTERNET SECURITY VIA LARGE-SCALE PASSIVE AND ACTIVE DNS MONITORING AThesis Presented to The Academic Faculty by Emmanouil K. Antonakakis In Partial Fulfillment of the Requirements for the Degree
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
The Domain Name System (DNS)
The Domain Name System (DNS) Each Internet host is assigned a host name and an IP address Host names are structured character strings, e.g., www.cs.iastate.edu IP addresses are 32 bit integers, e.g., 129.186.3.6
Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis
Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis United States Computer Emergency Readiness Team (US-CERT) Detection and Analysis January 2011 Background As the number
Domain Name Servers. Domain Types WWW host names. Internet Names. COMP476 Networked Computer Systems. Domain Name Servers
Domain Name Servers COMP76 Networked Computer Systems Internet Names Hierarchical starting from the right host.subnet.organization.type Names are case insensitive and can be in either upper or lower case.
Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security
Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an
STARTER KIT. Infoblox DNS Firewall for FireEye
STARTER KIT Introduction Infoblox DNS Firewall integration with FireEye Malware Protection System delivers a unique and powerful defense against Advanced Persistent Threats (APT) for business networks.
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
User Documentation Web Traffic Security. University of Stavanger
User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...
APPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
Domain Name Service (DNS) Training Division, NIC New Delhi
Domain Name Service (DNS) Training Division, NIC New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Replicating DNS V. Dynamic update
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
Content Inspection Features
Content Inspection Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
NTT R&D s anti-malware technologies
NTT R&D s anti-malware technologies Jan. 21, 2015 NTT Secure Platform Laboratories Takeo HARIU Threats causes most of cyber attacks Major infection routes are web browsing, URL links in email messages,
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Tracking and Characterizing Botnets Using Automatically Generated Domains
Tracking and Characterizing Botnets Using Automatically Generated Domains Hack In The Box October 17th, 2013 Politecnico di Milano, Italy @raistolo, [email protected] Federico Maggi, Politecnico
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012
SES / CIF Internet2 Combined Industry and Research Constituency Meeting April 24, 2012 Doug Pearson Technical Director, REN-ISAC [email protected] Background on REN-ISAC The REN-ISAC mission is to
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy Objectives The purpose of this lab is to demonstrate both high availability and performance using virtual IPs coupled with DNS round robin
SIE, PassiveDNS, and data combining
SIE, PassiveDNS, and data combining ENOG, June 2011 Eric Ziegast / Shane Kerr About ISC SIE Agenda Passive DNS and DNSDB Data analysis and combining examples How to participate 3 Shane
Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) Email/URLs
Naming and the DNS Focus How do we name hosts etc.? Application Presentation Topics Session Domain Name System (DNS) Email/URLs Transport Network Data Link Physical Ldns.1 Names and Addresses 43 name address
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
EVILSEED: A Guided Approach to Finding Malicious Web Pages
+ EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
ThreatSTOP Technology Overview
ThreatSTOP Technology Overview The Five Parts to ThreatSTOP s Service We provide 5 integral services to protect your network and stop botnets from calling home ThreatSTOP s 5 Parts: 1 Multiple threat feeds
Malware Detection in Android by Network Traffic Analysis
Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University
Access Control Rules: URL Filtering
The following topics describe how to configure URL filtering for your Firepower System: URL Filtering and Access Control, page 1 Reputation-Based URL Filtering, page 2 Manual URL Filtering, page 5 Limitations
Managing Name Resolution
3 CHAPTER THREE Managing Name Resolution Terms you ll need to understand: Windows Internet Naming Service (WINS) WINS Proxy Agent LMHOSTS Tombstoning Persistent Connections Push/pull partner Hostnames
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
