New Trends in FastFlux Networks
|
|
|
- Lilian Hicks
- 10 years ago
- Views:
Transcription
1 New Trends in FastFlux Networks Wei Xu Huagang Xie Xinran Wang ABSTRACT Fast-flux networks have been adopted by attackers for many years. Existing works focus on characteristics such as the fast changingrateoftheipaddresses(e.g. Arecord)andthe name server addresses (NS records); the single flux/double flux structure etc. In this work, we tracked and analyzed over 200 fast flux domains and we discovered that the features of the fast-flux networks has shifted. More specifically, we discovered that the changing rate of the IP addresses and name server addresses are slower than reported before, in some cases even slower than some benign applications that leverage fast-flux alike techniques. We also discovered that IP addresses and name servers are shared among different families of fast-flux domains indicating that there is a well-established underground economic model for fast-flux domains. Moreover, we also noticed that instead of using single or double flux, current fast-flux domains exhibit nlevels of flux behavior, i.e., there appears to be n levels of name servers in the DNS system for Finally, we also studied the similar benign applications that look alike fast-flux domains but are not. In light of these new characteristics, we proposed several new detection approaches that can help to identify the Categories and Subject Descriptors K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms Security Keywords Fastflux Networks 1. INTRODUCTION & BACKGROUND Fastflux domains leverage DNS system to create a more robust system to engage malicious activities such as delivering malicious content, spreading spams and setting up phishing websites, etc. A fast-flux network is a distributed system that consists of mainly two types of elements: 1) master server(s), so called mothership that controls all the other hosts in the system; 2) infected/controlled hosts, whose roles include: providing name server, proxying traffic to the next level, delivery malicious contents. In [1], the authors explained two typical fast-flux networks, namely single-flux and double-flux networks. Since fast-flux networks are frequently adopted by various malicious campaigns, it has become part of the underground economic system. That is, fast-flux networks have become a paid service that can be purchased by attackers to facilitate their malicious activities. Previous works such as [7] [8] has discussed some characteristics on FF. Characteristics include: rate of change, the location of change and the sharing of FF networks among different malicious campaigns. In this work, we discuss the new trends discovered in FF networks. 2. DATA COLLECTION Our data collection process consists of three steps: 1. Collect fast-flux domains candidates. We use different sources: malware domains extracted from malware samples; published lists for fast-flux domains (e..g, Arbor Networks FF list; spamhaus list), etc. 2. Actively monitoring the fast-flux domains using active DNS queries. Periodically query candidate domains on different public DNS servers 3. Aggregate the data based on name servers, authoritative name servers and malware families. In total, we identified and tracked 207 We observed over unique IP addresses being resolved to these domains, and we have seen unique name server names. 3. OVERVIEW In this work, we investigate the Fast-flux networks from several different perspectives: Slower change rate 1
2 Table 1: Change Rate of Monitored FF Domains type Minutes/IP IP/Day A-TTL NS-TTL average max min Sharing of IP address, name servers Double-flux OR n-flux One IP at a time Benign systems that look alike FF networks 4. NEW FEATURES IN FF NETWORKS 4.1 Not So Fast Fast-Flux Networks We listed the change rate of the FF domains in Table 1. Table 2: Statistic on Name Servers and IPs type number share-factor (average) domain 207 n/a name server authoritative name server IP Table 3: IP Addresses Being Shared between Domains Reside on the Same Authoritative Name Server. Auth. Name Server # of domains % of shared IPs atw.kz % biocacces.ru % biwcacecca.ru % blo.kz % xincacec.ru % xginzecac.ru % solisalo.net % sccacxoec.ru % needhed.com % myhappyplants.com % mkijsppc.ru % kamisca.com % breakwinner.com % Figure 1: CDF of Change rate of IP The results show that 95% of the fast-flux domains that we are tracking have a change rate of IP address larger than 10 minutes/ip (i.e., on average, each IP address will be used for 10 minutes). Over 80% of fast-flux domains have changing rate of IP addresses that is larger than 33 minutes/ip. Over 61% of fast-flux domains have changing rate of IP addresses that is larger than 60 minutes/ip. The changing rate is slower than the values that were reported in [7], which is around 10 minutes/ip. This suggests that the value of a domain name to attackers is not as much as it use to be. Since one of the assumptions of applying fast-flux networks is that the domain names are valuable assets to attackers such that attackers are willing to map the same domain name to many different IP addresses to preserve the availability of the domain. As for the rational behind this shift, we believe this is because the increase in the number of registrars and the expand of domain name space (i.e. the development of new tad, cctld,etc.), the cost for registering a domain now (e.g. $10 per year) is much less than several years before (e.g., $100) [3]. Meanwhile, the cost to infect, control and keep a bot/zombie is increasing because the advance of various defense mechanisms and the increase of risk in engaging malicious activities. 4.2 Sharing, Clustering We further check the following characteristics: the statistic of the name servers, the statistic of the authoritative name servers and the statistic of IPs. The results are listed in Table 2. The share-factor (average) means on average how many domains share the same resource (e.g., name server, IP address). On average, every 4.7 fast flux domains share the same authoritative name server and every 4.5 fast-flux domains share one IP address. One of the potential reasons is these authoritative name servers are normally bullet-proof hosting servers and the registration expenses on these servers (e.g. $100 per year) are higher than the expense on the fast-flux domains (e.g., around $10 per year depending on the tld). On the contrary, the name servers are bearly shared among Besides, we also found a high level of sharing of IP addresses between name servers and the domains. For example, on average, over 70% of the name servers actually share IP addresses with the This indicates that the infected hosts are serving as both the front proxy and the DNS server at the same time. Moreover, we identify the two levels of sharing of IP addresses. The first level of sharing of IP addresses happens among different fast-flux domains that reside on the same authoritative name server; the second level of sharing of IP addresses happens among different authoritative name servers. As shown in Table 3. In most authoritative name servers (11 out of 13 authoritative name servers), over 80% of the IP addresses are actually shared between the domains resided on this name server. On the second level, we calcu- 2
3 Table 4: IP Addresses Being Shared between Domains in the Same Family. Type/Family # of domains % of shared IPs TrojanDownloader.waledac % Trojan.GenericKDZ % Trojan-Psw.tepfer % Trojan-Spy.zbot % spam % Figure 2: Registration Information of xginzecac.ru and xincacec.ru the same malware family). The results are listed in Table 4. We list the four Trojan families and all the spam domains. We noticed that for Trojan, the percentage of intra-family shared IP address is between 10% to 20%. For spam, the percentage of intra-family shared IP address is much higher, around 45%. This suggests that among different spam families, IP addresses are more frequently shared. We believe this is because spams, despite different family, often focus on the similar and limited number of topics (e.g., pharmaceuticals, dating, financial, etc.) For inter-family sharing between different Trojan families, we found that most of the Trojan families do not share any IP addresses with other families. This is different from spam because different Trojan families may serve very different malicious purposes which require the infected hosts to be uniquely owned, hence less IP addresses are shared among different Trojan families. 4.3 Double-flux OR N-flux? Unlike double-flux network, we noticed many fast-flux domains actually appear to be using n-level flux. For example, the definition of double-flux network describes both A, and NS records changing. However, we observed that the level of NS records appears to be endless. That is, there seems to be n-levels of name servers as Figure 4 shows. Figure 3: Registration Information of biocacces.ru and biwcacecca.ru lated the IP addresses shared between each pair ofthe 13authoritative name servers. The maximum shared percentage of IP addresses is 76.27%, which is between biocacces.ru and biwcacecca.ru. The next highest percentage of shared IP address is between xginzecac.ru and xincacec.ru. Further investigation (Figure 2 and Figure 3) shows that biocacces.ru and biwcacecca.ru are actually registered using the same name server IP address, so does xginzecac.ru and xincacec.ru. This results suggest that the percentage of shared IP addresses is larger between domains sharing the same authoritative name servers than between different authoritative name servers. Finally, we also discovered the sharing that happens among inter-malware-family (e.g., sharing IP addresses among different malware families) and intra-malware-family (e.g., sharing IP addressed among different fast-flux domains within The understand the reason behind this case, we also compared the returned IP addresses of different levels of name servers. At the beginning, the IP addresses seem irrelevant. Later, the IP addresses from different levels of the name servers start to overlap. For example, in the case of larstor.com, we track the ip addresses of 3 levels of name servers, e.g. ns*.larstor.com, ns*.ns*.larstor.com and ns*.ns*.ns*.larstor.com. The results show that for name servers with level equal or larger than two, over 50% of their IP addresses are resolved to more than one name servers. All these facts suggest that the n-level of name servers are probably wildcard like DNS response to flux the IP addresses of bot/zombie. Another characteristic is that the number of the IP addresses mapped to the first level name server is almost the sum of IP addresses mapped to the higher levels name servers. 4.4 One IP at A Time Unlike traditional fast-flux networks that response with a list of IP addresses (e.g., round-robin DNS). We noticed that the DNS queries to some fast-flux domains we monitored only return one IP address at a time with TTL=0. This scheme seems to maximize the flux change rate, but the fact is the total number of IP addresses after observing for certain time does not increase comparing with the name servers that 3
4 servers who have volunteered to be in the pool. This is usually good enough for end-users. We tracked pool.ntp.org and five of its sub-domains asia.pool.ntp.org, europe.pool-.ntp.org, north-america.pool.ntp.org, oceania.pool.ntp.org and south-america.pool.ntp.org. The statistic on these NTP pool servers are similar, we only list the pool.ntp.org in Table 5. CDN We also find several domains using CDN. One example is download.phoenixai.com.au, which use the name server ns-01.cloudfront.net, ns-02.cloudfront.net. The details are listed in Table Censorship Bypass Another special type of benign domains that behave like fast-flux domains is so-called anti-censorship domains. These domains are more like fast-flux domains than the above three types of benign domains, because this type of domains also leverage dynamics of DNS to prevent itself from being blocked or suspended. One example is Dynamic Internet Technology [2]. This company sets up many subdomains under ziyouforever.com. The average changing rate is listed in Table 5. Figure 4: An Example of n-flux domain return a list of IP addresses. Therefore, we believe the only benefit for attackers to set TTL equals to zero is to nullify the local DNS cache to achieve better control. 5. BENIGN SYSTEMS LOOK ALIKE FF NET- WORKS 5.1 Distributed Service BitCoin DNS seed As mentioned in [6]: Upon startup, if peer node discovery is needed, the client then issues DNS requests to learn about the addresses of other peer nodes. The client includes a list of host names for DNS services that are seeded. As-of May 17, 2012 the list (from net.cpp[1]) includes : bitseed.xf2.org dnsseed.bitcoin.dashjr.org dnsseed.bluematt.me seed.bitcoin.sipa.be Among these 4 servers, we tracked the two dnsseed.bluematt.me and seed.bitcoin.sipa.be. dnsseed.bluematt.me is resolved to 7747 different IPs and seed.bitcoin.sipa.be is resolved to different IPs. The statistics on the IPs and A & NS DNS records are listed in Table 5. NTP Pool As mentioned in [4, 5]: pool.ntp.org uses DNS round robin to make a random selection from a pool of time In summary, the DNS records in these three distributed systems change faster than the average values in the fast-flux networks. This is because: 1) special purposes in the use of DNS system require faster change of DNS records, such as providing constantly updating server information and peer discovery; 2) providing high availability for benign content delivery. This observation indicates: 1) fast (in terms of the changing rate of both A and NS records) may no longer be the dominant characteristics of malicious Fast-flux networks; 2) reputation based detection approaches should be adopted in future since the behavior in DNS system between benign fast-flux alike domains and malicious fast-flux domains is very similar. 6. DEFENSE Given the new characteristics of the Fast-flux network. We propose the following suggestions on the defense mechanisms: Not relying on the changing rate of IP addresses and name server addresses. As we have demonstrated, fastflux domains have shown slower changing rate than they used to be. Besides, the changing rate of addresses in benign applications have passed that of fastflux. Therefore, we suggest that the detection of fastflux should not rely on the chaining rate of addresses. In the same sense, the geographically distribution of addresses is also not a reliable indicator for fast-flux domains. In stead, the detection should based on the accumulation of evidence of Such evidence includes the maliciousness of the name servers, the reputation of the registrar and the nature of the IP addresses (e.g., residential IP addresses). Introduce name server reputation score that can measure the probability of hosting Since we noticed that name servers often reside on so-called bullet-proof servers. These name servers are not 4
5 Table 5: Change Rate of Benign System domain type Minutes/IP IP/Day A-TTL NS-TTL dnsseed.bluematt.me average seed.bitcoin.sipa.be average pool.ntp.org average download.phoenixai.com.au average *.1.ziyouforever.com average likely to be taken down as often as fast-flux domains and have been observed in the hosting of multiple fastflux domains. It is clear that these name servers are more valuable assets for the owners of the fast-flux networks. Therefore, we should build reputation on known malicious name servers to identify and block domains using these name servers for DNS resolving. Such reputation can be build by the accumulation of historical evidence that show involvement in the identified [7] T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling. Measuring and detecting fast-flux service networks. In NDSS, [8] M. Konte, N. Feamster, and J. Jung. Fast flux service networks: Dynamics and roles in hosting online scams. In TechReport, Based on our discoveries of the sharing and clustering among different fast-flux domains, we also suggest building a connection between different domains by the number of their shared IP addresses. In such, when one domain is identified as fast-flux domain, all connected domains that share a large enough portion (e.g., a threshold on the percentage of shared IP addresses) of the IP addresses are very likely fast-flux domains as well. Moreover, by maintaining the connection between domains, we can also identify the family/type of fast-flux domains by inferring from one domain to another when the number of shared IP addresses between two domains passes the threshold for intra-malwarefamily. leveraging the appeared n-flux structure in the DNS system for fast-flux domain detection. Although fastflux domains are not actually implementing the nflux structure as their name resolving process, it is a unique feature of the Therefore, we suggest that by actively testing the existence of nflux structure, we can identify the fast-flux domains or at least suspicious 7. CONCLUSIONS In this work, we discovered several new features of fast-flux domains/networks by tracking over 200 fast-flux domains and their name servers. We present these features and also discuss the rationale behind these features. Meanwhile, we also identified and studied three representative benign applications that exhibit similar behavior as Based on our findings, we proposed four detection mechanisms that can cope with the new characteristic observed in 8. REFERENCES [1] Know your enemy: Fast-flux service networks, [2] Dynamic internet technology, [3] How much do domain names cost, [4] Ntp pool, [5] Ntp pool time servers, [6] Satoshi client node discovery,
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Dynamics of Online Scam Hosting Infrastructure
Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster, and Jaeyeon Jung 2 Georgia Institute of Technology 2 Intel Research {mkonte,feamster}@cc.gatech.edu, [email protected] Abstract.
Dynamics of Online Scam Hosting Infrastructure
Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster, and Jaeyeon Jung 2 Georgia Institute of Technology 2 Intel Research {mkonte,feamster}@cc.gatech.edu, [email protected] Abstract.
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
DYNAMIC DNS: DATA EXFILTRATION
DYNAMIC DNS: DATA EXFILTRATION RSA Visibility Reconnaissance Weaponization Delivery Exploitation Installation C2 Action WHAT IS DATA EXFILTRATION? One of the most common goals of malicious actors is to
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security Agenda Increasing DNS availability using DNS Anycast Opening the internal DNS Enhancing DNS security DNS traffic
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
JOURNAL OF L A T E X CLASS FILES, VOL. X, NO. X, JANUARY 201X 1 Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis Roberto Perdisci, Igino Corona, and Giorgio Giacinto
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Basheer Al-Duwairi Jordan University of Science & Technology
Basheer Al-Duwairi Jordan University of Science & Technology Outline Examples of using network measurements /monitoring Example 1: fast flux detection Example 2: DDoS mitigation as a service Future trends
An Empirical Analysis of Malware Blacklists
An Empirical Analysis of Malware Blacklists Marc Kührer and Thorsten Holz Chair for Systems Security Ruhr-University Bochum, Germany Abstract Besides all the advantages and reliefs the Internet brought
SAC 025 SSAC Advisory on Fast Flux Hosting and DNS
Fast and Double Flux Attacks 1 SAC 025 SSAC Advisory on Fast Flux Hosting and DNS An Advisory from the ICANN Security and Stability Advisory Committee (SSAC) January 2008 Fast and Double Flux Attacks 2
Fast Flux Hosting and DNS ICANN SSAC
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal Avoid detection and take down of web sites used for illegal purposes Technique Host illegal content at many sites
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology
Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:
Preetham Mohan Pawar (1000919136)
Charles Lever, Manos Antonakakis, Brad Reaves, Patrick Traynor, Wenke Lee Presented By:- Preetham Mohan Pawar (1000919136) University of Texas, Arlington CSE Introduction. Basic concepts.( DNS ) Mobile
Threat Spotlight: Angler Lurking in the Domain Shadows
White Paper Threat Spotlight: Angler Lurking in the Domain Shadows Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant
JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY 2009 75
JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY 29 7 Collaborative Detection of Fast Flux Phishing Domains Chenfeng Vincent Zhou, Christopher Leckie and Shanika Karunasekera Department of Computer Science
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS INTRODUCTION BOTNETS IN SPAMMING WHAT IS AUTORE? FACING CHALLENGES? WE CAN SOLVE THEM METHODS TO DEAL WITH THAT CHALLENGES Extract URL string, source server
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
Inspecting DNS Flow Traffic for Purposes of Botnet Detection
Inspecting DNS Flow Traffic for Purposes of Botnet Detection Vojtěch Krmíček, GEANT3 JRA2 T4 Internal Deliverable 2011 Abstract The goal of this report is to examine DNS IP flow traffic and its relation
Internet Content Distribution
Internet Content Distribution Chapter 4: Content Distribution Networks (TUD Student Use Only) Chapter Outline Basics of content distribution networks (CDN) Why CDN? How do they work? Client redirection
How to set up the Integrated DNS Server for Inbound Load Balancing
How to set up the Integrated DNS Server for Introduction Getting Started Peplink Balance has a built-in DNS server for inbound link load balancing. You can delegate a domain s NS/SOA records, e.g. www.mycompany.com,
Botnet Detection with DNS Monitoring
Botnet Detection with DNS Monitoring Christopher Will Advisor: Oliver Gasser Seminar Future Internet SS2014 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München
Acceptable Use Policy and Terms of Service
Acceptable Use Policy and Terms of Service Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.nic.sucks Version 1.0
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
Application and service delivery with the Elfiq idns module
Technical White Paper Application and service delivery with the Elfiq idns module For Elfiq Operating System (EOS) version 3.x Document Revision 1.63 June 2012 Table of Contents 1. The IDNS module... 3
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
Efficient DNS based Load Balancing for Bursty Web Application Traffic
ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf
EVILSEED: A Guided Approach to Finding Malicious Web Pages
+ EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
Botnet Detection Using Passive DNS
Botnet Detection Using Passive DNS Master Thesis Pedro Marques da Luz [email protected] Supervisors: Erik Poll (RU) Harald Vranken (RU & OU) Sicco Verwer (TUDelft) Barry Weymes
Surveying DNS Wildcard Usage Among the Good, the Bad, and the Ugly
Surveying DNS Wildcard Usage Among the Good, the Bad, and the Ugly Andrew Kalafut, Minaxi Gupta, Pairoj Rattadilok, and Pragneshkumar Patel School of Informatics and Computing, Indiana University {akalafut,minaxi,prattadi,patel27}@cs.indiana.edu
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
How To Manage Dns On An Elfiq Link Load Balancer (Link Balancer) On A Pcode (Networking) On Ipad Or Ipad (Netware) On Your Ipad On A Ipad At A Pc Or Ipa
White paper The IDNS module for incoming load balancing For Elfiq Operating System (EOS) version 3.x Document Revision 1.5 October 2007 Elfiq Solutions www.elfiq.com COPYRIGHT The content of this document
User Documentation Web Traffic Security. University of Stavanger
User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...
ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
DNS Record Injection Vulnerabilities in Home Routers
DNS Record Injection Vulnerabilities in Home Routers Kyle Schomp, Tom Callahan, Michael Rabinovich, Mark Allman Case Western Reserve University International Computer Science Institute 1 Attacks targeting
Exploring the Black Hole Exploit Kit
Exploring the Black Hole Exploit Kit Updated December 20, 2011 Internet Identity Threat Intelligence Department http://www.internetidentity.com http://www.internetidentity.com 12/29/11 Page 1/20 Summary
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi Institute Eurecom, Sophia Antipolis {bilge,kirda,balduzzi}@eurecom.fr Northeastern
Global Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi Institute Eurecom, Sophia Antipolis {bilge,kirda,balduzzi}@eurecom.fr Northeastern
Access Control Rules: URL Filtering
The following topics describe how to configure URL filtering for your Firepower System: URL Filtering and Access Control, page 1 Reputation-Based URL Filtering, page 2 Manual URL Filtering, page 5 Limitations
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Phishing Trends Report
Phishing Trends Report Analysis of Online Financial Fraud Threats Second Quarter, 2009 For more information, please contact: [email protected] 888.239.6932 www.internetidentity.com Internet Identity
CYBERSECURITY INESTIGATION AND ANALYSIS
CYBERSECURITY INESTIGATION AND ANALYSIS The New Crime of the Digital Age The Internet is not just the hotspot of all things digital and technical. Because of the conveniences of the Internet and its accessibility,
End to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania Email {amaximciuc, cvatamanu, rbenchea}@ bitdefender.com
Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy. 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs
Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs Motivation Network resources are consumed by a small number
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/ PowerDNS Very briefly so you know where we come from Open source nameserver, around since 2000, open source since 2002,
Domain Name Auto-Registration for Plugged-in IPv6 Nodes. <draft-kitamura-ipv6-name-auto-reg-00.txt>
Domain Name Auto-Registration for Plugged-in IPv6 Nodes Hiroshi KITAMURA NEC Corporation [email protected] Background IPv6 addresses are too long to remember
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
A Layman's Guide to Global Server Load Balancing
A Layman's Guide to Global Server Load Balancing Zeus Technology Limited (UK) Sales: +44 (0)1223 568555 Zeus Technology, Inc. (U.S.) Phone: (650) 965-4627 The Jeffreys Building Main: +44 (0)1223 525000
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
The Survey Report on DNS Cache & Recursive Service in China Mainland
The Survey Report on DNS Cache & Recursive Service in China Mainland Wei WANG, Chinese Academy of Sciences Zhiwei YAN, China Internet Network Information Center Motivation Improve the traditional recursive
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Internet Security and Resiliency: A Collaborative Effort
Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/ PowerDNS Very briefly so you know where we come from Open source nameserver, around since 2000, open source since 2002,
Shell over what?! Naughty CDN manipulations. Roee Cnaan, Information Security Consultant
Shell over what?! Naughty CDN manipulations Roee Cnaan, Information Security Consultant About me (mister) Penetration Tester DDoS fitness tester Python and Scapy programmer SCADA and ICS attacker Tools
Connection Broker The Leader in Managing Hosted Desktop Infrastructures and Virtual Desktop Infrastructures (HDI and VDI) DNS Setup Guide
Connection Broker The Leader in Managing Hosted Desktop Infrastructures and Virtual Desktop Infrastructures (HDI and VDI) DNS Setup Guide Versions 8.0 December 9, 2014 Contacting Leostream Leostream Corporation
Passive Monitoring of DNS Anomalies
Passive Monitoring of DNS Anomalies Bojan Zdrnja 1, Nevil Brownlee 1, and Duane Wessels 2 1 University of Auckland, New Zealand, {b.zdrnja,nevil}@auckland.ac.nz 2 The Measurement Factory, Inc., [email protected]
Software that provides secure access to technology, everywhere.
Software that provides secure access to technology, everywhere. Joseph Patrick Schorr @JoeSchorr October, 2015 2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Agenda What are we dealing with? How
Application Note. SIP Domain Management
Application Note SIP Domain Management 28 March 2008 Table of Contents 1 WHAT IS A SIP DOMAIN?... 1 2 LOCAL SIP DOMAIN... 2 3 OTHER SIP DOMAIN... 3 4 DNS CONSIDERATIONS... 4 5 USING A PUBLIC DNS... 5 6
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015
Monitoring the DNS Gustavo Lozano Event Name XX XXXX 2015 Agenda 1 2 3 Components of the DNS Monitoring gtlds Monitoring other components of the DNS 4 5 Monitoring system Conclusion 2 Components of the
EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework)
EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework) Seeking Exploit Kits at Large Scale Made Easy By Sébastien Larinier / @Sebdraven & Guillaume Arcas / @y0m This Slide Intentionally Left
Web Application Worms & Browser Insecurity
Web Application Worms & Browser Insecurity Mike Shema Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be
FortiBalancer: Global Server Load Balancing WHITE PAPER
FortiBalancer: Global Server Load Balancing WHITE PAPER FORTINET FortiBalancer: Global Server Load Balancing PAGE 2 Introduction Scalability, high availability and performance are critical to the success
WHITE PAPER. Using DNS RPZ to Protect Against Web Threats SPON. Published June 2015 SPONSORED BY. An Osterman Research White Paper.
WHITE PAPER Using DNS RPZ to Protect An Osterman Research White Paper Published June 2015 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
State of the Cloud DNS Report
transparency for the cloud State of the Cloud DNS Report Basic Edition August 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
Log Management for the University of California: Issues and Recommendations
Log Management for the University of California: Issues and Recommendations Table of Contents 1 Introduction...2 2 Candidate Sources of Logged Information...3 3 Recommended Log Management Practices...4
