Domain Name Abuse: How Cheap New Domain Names Fuel The ecrime Economy
|
|
|
- Charles Richard
- 10 years ago
- Views:
Transcription
1 SESSION ID: HTA-R02 Domain Name Abuse: How Cheap New Domain Names Fuel The ecrime Economy Dr. Paul Vixie CEO Farsight Security,
2 Today's Agenda DNS History At-A-Glance New Domain Name Churn Reducing New Domain Name Risk The Value of Passive DNS Conclusion
3 DNS History At-A-Glance
4 A Brief Recap of (Some) DNS History In the beginning, each host had simple (flat) alphanumeric names. Names were manually registered by ing The Network Information Center (NIC) at Stanford Research Institute maintained a flat text file (HOSTS.TXT) that contained the complete list of such hosts. Sites periodically grabbed copies. Nodes translated names to numeric address by doing a search of their local copy of that flat file. Clearly this was not a scalable solution (imagine a billion line HOSTS.TXT file, copied to a billion nodes every day!) 4
5 The New Era A replacement hierarchical and distributed domain name system was specified in 1983 and 1984: "The Domain Names Plan and Schedule," RFC881, Postel, Nov "Domain Names Concepts & Facilities," RFC882, Mockapetris, Nov "Domain Names Implementation and Specifications," RFC883, Mockapetris, Nov "Domain Requirements," RFC980, Postel & Reynolds, Oct. 1984, etc. A hierarchical and distributed domain name system was critical to enable growth of the Internet (ironically, today it also threatens it) 5
6 It's no coincidence that material growth in the # of connected hosts happened post-dns "Internet Hosts Count log" by Kopiersperre (talk) - Own work. Licensed under CC BY-SA 3.0 via Wikimedia Commons media.org/wiki/file:in ternet_hosts_count_l og.svg#mediaviewer/fil e:internet_hosts_cou nt_log.svg 6
7 The Evolution Symbolics.com, the first dot com, registered March 15 th, Domain names were free for the next ten years : Network Solutions era. Price goes to $100 for two years date: ICANN and the shared registration system. New cost for a.com? $7.85 to the registry ($0.25 goes to ICANN) + whatever the registrar adds on (typically just a few bucks) Domains are often bundled at nominal cost in packages with web hosting, web design, name service, privacy protection, etc. Some domains available at zero cost to drive market share, etc. 7
8 Example of One Domain Policy Gone Awry Domain Tasting: "In February 2007, 55.1 million domain names were registered. Of those, 51.5 million were canceled and refunded just before the 5 day grace period expired and only 3.6 million domain names were actually kept." [Source: Godaddy] Driver? Empirical evaluation of pay-per-impression advertising revenues Eliminated in 2008/2009 by ICANN reforms correcting exploitable cost structure Note: anything free (or cheap) will be prone to exploitation. 8
9 New Domain Name Churn
10 Internet as Substrate; Domains as Identities IP packets, IP addresses and BGP routes, underlay everything We overlay that substrate with many applications, such as the web The most important overlay layer is, in many ways, DNS For most sites, DNS is totally good -- and operationally critical Can you imagine Amazon, Apple, Cisco, ebay, Microsoft, PayPal, without DNS? No. It's unimaginable. Domains are literally priceless to the online operations of these and many other companies. Their domains ARE these companies' identities. 10
11 Domain Names Are Also Important to Criminals (Just Not The Same Way As For Corporations) Cyber criminals aren't interested in long-lived domain names. For criminals, domains are free (or cheap) & short-lived assets "Honest" bad guys? ~$10/name is just a "cost of doing business," too inconsequential to mention, even if using 100's of them per day Other bad guys? Fraudulently use stolen cards to get domains. Use those names until the card is reported; lather/rinse/repeat. And then there's all the intentionally free domain/free subdomain/free domain name redirection services out there... 11
12 Free... And Liable to Being Abused As A Result Domains:.cf,.ga,.gq,.ml,.tk Subdomains:.eu.nu,.web.gg, us.nf, int.nf, tv.gg, co.gp, online.gp, asia.gp, biz.uz, pro.vg, name.vu, info.nu, edu.ms, mobi.ps,.co.nr, or tens of thousands of other domain names offering subdomains to those interested (see ) URL Redirector Services: One list of hundreds of URL shorteners and redirectors These free domains/services aren't meant to be abused and their operators try to police them, but criminals are relentless. 12
13 Why Criminals Need New Domain Names These days, if you use a domain (for good/ill) the world will notice Domain intelligence services are very efficient, listing misused or abused domains very quickly (often within just minutes). Domains once listed are worthless (or even become liabilities): Any content that includes the listed domain is "dead on arrival" due to domain-based block lists (SURBL, Spamhaus DBL, etc.) Domain names may even act as a connection back to the cyber criminal (WHOIS POC info, credit card info, etc.) Blocklists make life very unpleasant for spammers/cyber criminals. 13
14 A Historical Aside About Blocklists Wikipedia says, "The first DNSBL was the Real-time Blackhole List (RBL), created in 1997, at first as a BGP feed by Paul Vixie, and then as a DNSBL by Eric Ziegast as part of Vixie's Mail Abuse Prevention System (MAPS) [...] The inventor of the technique later commonly called a DNSBL was Eric Ziegast while employed at Vixie Enterprises." I'm proud to say that Eric is still a valued part of the Farsight Security family today. We all owe Eric a debt of thanks. So how do the bad guys counter blocklists? Many approaches, most notably, they begin to continually use new domains 14
15 Constantly Using New Domain Names Makes A Lot of Sense For The Bad Guys... Besides complicating use of blocklists... Continual new domains complicate prioritization of investigations: "Who's the worst/hottest bad guy, our top priority for attention?" In order to tell, investigators need to aggregate all the relevant domains but which ones belong to each particular bad guy? [And can we prove that attribution?] Continual new domains exacerbate evidence management issues: Imagine thousands of domains, spread across multiple registrars, each using privacy/proxy services to hide contact information, and each of which may need court paperwork to "pierce the veil." 15
16 Fast Flux Hosting Just as bad guys churn through domains, at one point they also churned through IPs, leveraging bots for "bulletproof hosting" Lots o' bots were (and are) available. Bad guys could use those to host content as well as send spam, conduct DDoS attacks, etc. They'd use short TTLs and constantly rotate through new botted hosts, continually updating DNS to point to 6-to-12 botted hosts, each acting as proxy to a hidden backend real server. This basically worked pretty well, at least a few years ago, and some fast flux hosts continue to be seen today...
17 A Domain Tagged as Fast Flux by Zeus Tracker deolegistronf[dot]com. 150 IN A [AS34700] deolegistronf[dot]com. 150 IN A [AS50780] deolegistronf[dot]com. 150 IN A [AS25229] deolegistronf[dot]com. 150 IN A [AS24955] deolegistronf[dot]com. 150 IN A [AS6849] deolegistronf[dot]com. 150 IN A [AS39824] deolegistronf[dot]com. 150 IN A [AS6866] deolegistronf[dot]com. 150 IN A [AS12714] deolegistronf[dot]com. 150 IN A [AS13082] deolegistronf[dot]com. 150 IN A [AS9924] deolegistronf[dot]com. 150 IN A [AS50886]
18 Why Doesn't Everyone Use Fast Flux Hosting? Fast flux hosting generally isn't necessary if you're constantly churning through new domains, instead. New domains can just be assigned to IPs from a regular hosting company (by the time the complaints come pouring in, the bad guy will have moved on), or you can always use bots So how, then, to cope with these hit-and-run domain name strategies?
19 Insight: No One Needs to Immediately Use a New Domain (Except Cyber Criminals) Cyber criminals get new domains, abuse and then abandon them within minutes While the good guys are still figuring what they're seeing, the bad guys are making a "lightning strike:" in, out, gone. The trick is to "help" these cyber criminals slow down a little. What's the rush? No honest person, no legitimate domain, is in that big of a hurry... 19
20 Reducing New Domain Name Risk
21 Simple Strategy: Temporarily Defer The Resolution of ALL Newly Observed Domains Temporarily deferring the resolution of ALL new observed domains is a simple strategy, but one that's surprisingly effective... By ignoring new domains for a specific period of time, you'll frustrate cyber criminals "no-huddle offense." Following this approach, domain reputation companies have more time to review new domains and block those found to be bad. 21
22 How Long Is Enough? How Long Is Too Long? We won't pretend to dictate a single "right" answer. Users normally can find an "ignore" duration that works for them from: 5 minutes 10 minutes 30 minutes 60 minutes 3 hours 12 hours 24 hours 22
23 What Counts As A "Newly Observed Domain?" Domains are "new" if they haven't been seen in use on network -- - it isn't a function of when a domain was just registered. Newly detected domain information is exceedingly time sensitive: need to publish in real time (or near real time) to block resolution This implies a need for a low latency real-time (stream) computing approach rather than asynchronous (batch) computing paradigm. This has been operationally proven in production. 23
24 Operationalizing Use of Newly Observed Domains A couple of examples of how one could practically employ a feed of newly observed domains: Download an rbldnsd-formatted file via rsync; use that data as an input to SpamAssassin or another spam scoring/filtering systems, or Download a Response Policy Zone-formatted file via IXFR, blocking the new domains for ALL applications by using BIND with RPZ (thereby creating a "DNS-firewall")
25 "DNS Firewalls" with RPZ (Response Policy Zones) Uses DNS zones to implement DNS Firewall policy If it doesn't resolve in DNS, it's blocked (to a first approximation) Pub-sub is handled by NOTIFY/TSIG/IXFR Many publishers, many subscribers, one format Pay other publishers, or create your own Or do both, plus a private exception list Simple failure or walled garden, as you choose We call this taking back the streets ( the DNS )
26 RPZ Capabilities Triggers (RR owners): Actions (RR data): If the query name is $X If the response contains an address in CIDR $X If any NS name is $X If any NS address is in CIDR $X If the query source address is in CIDR $X Synthesize NXDOMAIN Synthesize CNAME Synthesize NODATA Synthesize an answer Answer with the truth But remember, it's not a sin to lie to criminals
27 Why Use RPZ? Easy stuff: Block access to DGA C&C s Block access to known phish/driveby downloaders Block if envelope/header is spammy More interesting stuff: Block DNS A/AAAA records in bad address space E.g., import Team Cymru Bogons or Spamhaus DROP list Block DNS records in your own address space After allowing your own domains to do so, of course
28 RPZ Status Implications: Controlled Balkanization (your network, your rules) Open market for producers and consumers Differentiated service at a global scale Instantaneous effective takedown Deployment: The RPZ standard is open and unencumbered So far implemented only in BIND Performance is pretty reasonable New features will be backward compatible This is not an IETF standard
29 The Value of Passive DNS
30 Exterminators seldom find just one termite... and cyber investigators seldom find bad guys with just one evil domain. Bad guys almost always have multiple domains for the reasons we've previously discussed. But how to find them? This is where we can leverage the inherent relationships that almost always exist among domain names: Given the IP of one bad domain (or bad name server), often there will be additional bad domains (or bad name servers) using that same IP Bad guys will often share a single set of name servers for multiple related domains Over time, bad domain names will often move from one bad IP to another, which can lead to still more IP that merit investigation 30
31 Passive DNS Passive DNS makes it possible to synthetically derive implicit DNS relationships based on empirically observed query/response data. Sensors collect DNS data from recursive resolvers across Internet (we collect data above recursive resolvers to help protect end-user privacy). This collected DNS data gets stored in a database, and indexed. Hunt teams can query the database using one indicator of badness to find others. Farsight s passive DNS data is called DNSDB, but there are others, too Let's use DNSDB to explore a few NON-MALICIOUS examples. 31
32 Given an IP (or CIDR netblock) of interest, what domains have used that address? $ dnsdb_query.py -i oregon.gov. IN A gis.oregon.gov. IN A egov.oregon.gov. IN A courts.oregon.gov. IN A education.oregon.gov. IN A insurance.oregon.gov. IN A healthoregon.org. IN A healthykidsoregon.org. IN A [etc] 32
33 Given a base domain, what FQDNs are known to be associated with that base domain? $ dnsdb_query -r \*.rsaconference.com/a grep "nce.com. " rsaconference.com. A rsaconference.com. A rsaconference.com. A e.rsaconference.com. A ae.rsaconference.com. A ae.rsaconference.com. A cm.rsaconference.com. A ec.rsaconference.com. A [etc] 33
34 Given a particular name server, what domains have we seen using that name server? $ dnsdb_query.py -n ns1.ieee.org/ns ieee.com. IN NS ns1.ieee.org. myieee.com. IN NS ns1.ieee.org. ieeeexplore.com. IN NS ns1.ieee.org. trynanotechnology.com. IN NS ns1.ieee.org. ieeeconfpublishing.com. IN NS ns1.ieee.org. photonicssociety.net. IN NS ns1.ieee.org. ieee.org. IN NS ns1.ieee.org. computer.org. IN NS ns1.ieee.org. [etc] 34
35 Given a domain, what IP or IPs has that domain used over time? $ dnsdb_query.py -s time_last -r ;; bailiwick: farsightsecurity.com. ;; count: 164 ;; first seen: :37: ;; last seen: :14: IN A ;; bailiwick: farsightsecurity.com. ;; count: 4,289 ;; first seen: :02: ;; last seen: :20: IN A
36 Given a domain, what name servers has that domain used over time? $ dnsdb_query.py -s time_last -r fsi.io/ns/fsi.io [...] ;; first seen: :28: ;; last seen: :51: fsi.io. IN NS ns.lah1.vix.com. fsi.io. IN NS ns1.isc-sns.net. [...] ;; first seen: :26: ;; last seen: :33: fsi.io. IN NS ns5.dnsmadeeasy.com. fsi.io. IN NS ns6.dnsmadeeasy.com. [...] 36
37 Prefer JSON to plain text output? Just add a -j $ dnsdb_query.py -r f.root-servers.net/a/root-servers.net -j {"count": , "time_first": , "rrtype": "A", "rrname": "f.root-servers.net.", "bailiwick": "root-servers.net.", "rdata": [" "], "time_last": } Json format output is perfect for those frustrated with plain text, including those who like to use json slicing/dicing/formatting tools such as./jq 37
38 Why Passive DNS Methods Matter Investigators can use sometimes-scarce "clues" (such as even a single malicious domain) to find MANY other related domain names they might otherwise have missed, thereby avoiding the frustration of "incomplete takedowns"... "He hit 5 of my domains but missed 8,750 other ones!" Agencies or enterprises planning takedowns or local blocks can avoid embarrassment by checking for potential 'collateral damage:' "Um, there are 14,000 apparently innocent domains on that IP, as well as the three bad ones we noticed. Maybe we should hold off blocking that IP for now..." 38
39 Conclusion
40 Applying What You've Learned Today There are now massive volumes of untraceable junk domains Use Passive DNS methods to make forensics possible Use DNS RPZ to block unwanted domains locally/collaboratively There are also massive volumes of forged DNS queries Deploy Source Address Validation (aka BCP38/BCP84) to limit emission of spoofed DNS queries Use DNS Response Rate Limiting to protect your authority servers Use IP ACLs to limit unauthorized access to your recursive resolvers Pay attention to DNS and treat it as if it matters (because it does!) 40
41 Q&A Thank you Farsight Security Whitepaper: Passive DNS for Threat Intelligence Contact information: 41
42 Limited Bibliography
DNS as a Control Point for Cyber Risk. Dr. Paul Vixie, CEO Farsight Security
DNS as a Control Point for Cyber Risk Dr. Paul Vixie, CEO Farsight Security Topics DNS Purpose and Role DNS Actions and Reactions DNS Control Points Topic DNS purpose and role Internet as Territory But
DNS as a Forensics Tool. Dr. Paul Vixie, CEO Farsight Security, Inc. 2014-06-23 FIRST, Boston
DNS as a Forensics Tool Dr. Paul Vixie, CEO Farsight Security, Inc. 2014-06-23 FIRST, Boston Internet as Territory But what is the internet? It's the largest equivalence class in the reflexive transitive
DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012
DNS Firewalls with BIND: ISC RPZ and the IID Approach Tuesday, 26 June 2012 1 About the Presenters»»» Paul Vixie Chairman and Founder Internet Systems Consortium Rod Rasmussen President and CTO IID (Internet
Response Policy Zones
Response Policy Zones Taking Back the DNS, V2.0 Paul Vixie Chairman and Chief Scientist Internet Systems Consortium Abstract DNS works as well for the bad guys (criminals, spammers, spies) as for respectable
Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS. Dr. Paul Vixie, CEO, Farsight Security, Inc.
Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS Dr. Paul Vixie, CEO, Farsight Security, Inc. Today s Agenda I. Introduction II. Passive DNS III. Using Passive DNS to Avoid Takedowns
Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour
Response Policy Zones for the Domain Name System (DNS ) By Paul Vixie, ISC (et.al.) 2010 World Tour Overview Motivation for DNS Response Policy Zones Relationship to DNS RBL (DNSBL) Constraints and Goals
Threat Spotlight: Angler Lurking in the Domain Shadows
White Paper Threat Spotlight: Angler Lurking in the Domain Shadows Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
DNS Response Policy Zone (DNSRPZ)
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security Agenda Increasing DNS availability using DNS Anycast Opening the internal DNS Enhancing DNS security DNS traffic
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Passive Monitoring of DNS Anomalies
Passive Monitoring of DNS Anomalies Bojan Zdrnja 1, Nevil Brownlee 1, and Duane Wessels 2 1 University of Auckland, New Zealand, {b.zdrnja,nevil}@auckland.ac.nz 2 The Measurement Factory, Inc., [email protected]
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN
DNS Traffic Monitoring Dave Piscitello VP Security and ICT Coordina;on, ICANN Domain Names ICANN coordinates the administra2on of global iden2fier systems Domain names provide user friendly identification
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
Resilient Botnet Command and Control with Tor
Resilient Botnet Command and Control with Tor Dennis Brown July 2010 10/14/10 1 Who am I? Dennis Brown Security Researcher for Tenable Network Solutions Toorcon 10, 11 Defcon 18 PaulDotCom Podcast Rhode
Using the DNS as a Hammer The Good, the Bad and the Ugly
Using the DNS as a Hammer The Good, the Bad and the Ugly SATIN March 22, 2012 March 22, 2012, SATIN Conference March 22, 2012, SATIN Conference Presenter: Rod Rasmussen Rod.RasmussenInternetIdenBty.com
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Acceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
Comprehensive Understanding of Malicious Overlay Networks
Comprehensive Understanding of Malicious Overlay Networks Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Wenke Lee and David Dagon Georgia Institute of Technology [email protected]
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security
Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.
This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and
ThreatSTOP Technology Overview
ThreatSTOP Technology Overview The Five Parts to ThreatSTOP s Service We provide 5 integral services to protect your network and stop botnets from calling home ThreatSTOP s 5 Parts: 1 Multiple threat feeds
Fast Flux Hosting and DNS ICANN SSAC
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal Avoid detection and take down of web sites used for illegal purposes Technique Host illegal content at many sites
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
IDS or IPS? Pocket E-Guide
Pocket E-Guide IDS or IPS? Differences and benefits of intrusion detection and prevention systems Deciding between intrusion detection systems (IDS) and intrusion prevention systems (IPS) is a particularly
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS /ABOUT/ME Thomas Chopitea - Incident handler @CertSG Digital forensics & incident response (#DFIR), malware analysis,
CDN SERVICE ICSS ROUTE MANAGED DNS DEUTSCHE TELEKOM AG INTERNATIONAL CARRIER SALES AND SOLUTIONS (ICSS)
CDN SERVICE ICSS ROUTE MANAGED DNS DEUTSCHE TELEKOM AG INTERNATIONAL CARRIER SALES AND SOLUTIONS (ICSS) CDN FEATURE ICSS ROUTE ICSS ROUTE IS OUR NEW OFFERING TO HELP YOU MANAGE YOUR DOMAIN NAME SYSTEM
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
Why Spamhaus is Your Best Approach to Fighting Spam
Page 1 of 10 Executive Summary The spam problem is evolving and while overall spam volumes are down, the problems are getting worse. No longer just a nuisance wasting resources and time, spam is now a
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
CYBERSECURITY INESTIGATION AND ANALYSIS
CYBERSECURITY INESTIGATION AND ANALYSIS The New Crime of the Digital Age The Internet is not just the hotspot of all things digital and technical. Because of the conveniences of the Internet and its accessibility,
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management A Report from the ICANN Security and Stability Advisory Committee (SSAC) 03 June 2011 SAC049 1 Preface This is a Report of the Security and
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
The F5 Intelligent DNS Scale Reference Architecture.
The F5 Intelligent DNS Scale Reference Architecture. End-to-end DNS delivery solutions from F5 maximize the use of organizational resources, while remaining agile and intelligent enough to scale and support
JPNIC Public Forum. Paul Vixie. Chairman, Internet Software Consortium. January 21, 2003
JPNIC Public Forum Paul Vixie Chairman, Internet Software Consortium January 21, 2003 1 Paul Vixie has been contributing to Internet protocols and UNIX systems as a protocol designer and software architect
SIE, PassiveDNS, and data combining
SIE, PassiveDNS, and data combining ENOG, June 2011 Eric Ziegast / Shane Kerr About ISC SIE Agenda Passive DNS and DNSDB Data analysis and combining examples How to participate 3 Shane
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2002 LETTER NO.: 02-CU-16 TO: All Federally-Insured Credit Unions SUBJ: Protection of Credit Union Internet Addresses
Acceptable Use (Anti-Abuse) Policy
Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
DYNAMIC DNS: DATA EXFILTRATION
DYNAMIC DNS: DATA EXFILTRATION RSA Visibility Reconnaissance Weaponization Delivery Exploitation Installation C2 Action WHAT IS DATA EXFILTRATION? One of the most common goals of malicious actors is to
Security Monitoring of DNS traffic
Security Monitoring of DNS traffic Bojan Zdrnja CompSci 780, University of Auckland, May 2006. [email protected] Abstract The Domain Name System (DNS) is a critical part of the Internet. This paper
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
Kaspersky Anti-Spam 3.0
Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is
LIST BUILDING PROFITS
LIST BUILDING PROFITS BUILD YOUR LIST THE RIGHT WAY Jonathan Leger COURTESY OF LEARNFROMJON.COM - PRIVATE BUSINESS COACHING FROM A MULTI-MILLION DOLLAR INTERNET MARKETER + ACCESS TO PREMIUM AND EXCLUSIVE
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology
Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:
Using the Domain Name System for System Break-ins
Using the Domain Name System for System Break-ins Steven M. Bellovin Presented by: Thomas Repantis [email protected] CS255-Computer Security, Winter 2004 p.1/37 Overview Using DNS to spoof a host s name
STATE OF DNS AVAILABILITY REPORT
STATE OF DNS AVAILABILITY REPORT VOLUME 1 ISSUE 1 APRIL 2011 WEB SITES AND OTHER ONLINE SERVICES ARE AMONG THE MOST IMPORTANT OPERATIONAL AND REVENUE GENERATING TOOLS FOR BUSINESSES OF ALL SIZES AND INDUSTRIES.
USAGE GUIDE ADAM INTERNET SPAM FILTER MANAGER
USAGE GUIDE ADAM INTERNET SPAM FILTER MANAGER Introduction For all Business Domain hosting services, Adam Internet provides the ability to add SPAM and VIRUS filtering. This service reduces the amount
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING 20 APRIL 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Introduction to Open Atrium s workflow
Okay welcome everybody! Thanks for attending the webinar today, my name is Mike Potter and we're going to be doing a demonstration today of some really exciting new features in open atrium 2 for handling
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
The Use of DNS Resource Records
International Journal of Advances in Electrical and Electronics Engineering 230 Available online at www.ijaeee.com & www.sestindia.org/volume-ijaeee/ ISSN: 2319-1112 Simar Preet Singh Systems Engineer,
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
The Survey Report on DNS Cache & Recursive Service in China Mainland
The Survey Report on DNS Cache & Recursive Service in China Mainland Wei WANG, Chinese Academy of Sciences Zhiwei YAN, China Internet Network Information Center Motivation Improve the traditional recursive
DNS Domain Name System
Domain Name System DNS Domain Name System The domain name system is usually used to translate a host name into an IP address Domain names comprise a hierarchy so that names are unique, yet easy to remember.
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS)
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS) By Michael Olan, Richard Stockton College (last update: March 2012) Purpose At this point, all hosts should be communicating
Insider s Guide to Outsourcing your Link Building
Insider s Guide to Outsourcing your Link Building By: www.downloadplrproducts.com 1 Introduction This report will be a little different, because it's hard to recommend specific providers. No, I'm not hiding
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Web Hosting 101. with Patrick McNeil
Web Hosting 101 with Patrick McNeil Alphabet soup Why learn the technical side? To help your clients solve problems To help you work better with your tech team To better understand how the web works To
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
Understanding DNS (the Domain Name System)
Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2
Law Enforcement Recommendations Regarding Amendments to the Registrar Accreditation Agreement
* 1) The RAA should not explicitly condone or encourage the use of 1. Use of Proxy or Privacy Registrations Proxy Registrations or Privacy Services, as it appears in paragraphs a. In the event ICANN establishes
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
