DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012



Similar documents
Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour

Response Policy Zones

DNS Response Policy Zone (DNSRPZ)

STARTER KIT. Infoblox DNS Firewall for FireEye

DNS RPZ in the Swiss NREN

Securing Your Business with DNS Servers That Protect Themselves

Software that provides secure access to technology, everywhere.

WildFire. Preparing for Modern Network Attacks

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

DNS as a Control Point for Cyber Risk. Dr. Paul Vixie, CEO Farsight Security

Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Detect Malware and APTs with DNS Firewall Virtual Evaluation

FAQ (Frequently Asked Questions)

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Securing Your Business with DNS Servers That Protect Themselves

How To Protect Your Online Banking From Fraud

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie

Securing DNS Infrastructure Using DNSSEC

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

SPEAR PHISHING AN ENTRY POINT FOR APTS

Secret Server Qualys Integration Guide

TECHNICAL WHITE PAPER. Infoblox and the Relationship between DNS and Active Directory

APPLICATION PROGRAMMING INTERFACE

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

POLIWALL: AHEAD OF THE FIREWALL

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

POLIWALL: AHEAD OF THE FIREWALL

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Internet Security and Resiliency: A Collaborative Effort

The Cyber Threat Profiler

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Automate the Hunt. Rapid IOC Detection and Remediation WHITE PAPER WP-ATH

Analyzing HTTP/HTTPS Traffic Logs


Concierge SIEM Reporting Overview

Arbor s Solution for ISP

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Fidelis XPS Tech Talk: Preventing Cyber Attacks With Real-Time Threat Intelligence. June 2010 Version 1.0 PAGE 1 PAGE 1

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Top Five DNS Security Attack Risks and How to Avoid Them

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Comprehensive Understanding of Malicious Overlay Networks

How Attackers are Targeting Your Mobile Devices. Wade Williamson

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Deep Security Vulnerability Protection Summary

Know Your Foe. Threat Infrastructure Analysis Pitfalls

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

ECE 4321 Computer Networks. Network Programming

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION

Protecting Against Online Fraud with F5

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

IBM Security re-defines enterprise endpoint protection against advanced malware

Streamlining Web and Security

All Information is derived from Mandiant consulting in a non-classified environment.

Netsweeper Whitepaper

Chapter 3 Restricting Access From Your Network

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Solution Brief: Enterprise Security

Fight Malware, Malfeasance, and Malingering with F5

Using the DNS as a Hammer The Good, the Bad and the Ugly

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

Akamai to Incapsula Migration Guide

Secure Your Mobile Workplace

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Cybersecurity and internal audit. August 15, 2014

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

Security Information and Event Management. White Paper. Expand the Power of SIEM with Real-Time Windows Security Intelligence

AT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated

Bridging the gap between COTS tool alerting and raw data analysis

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Unified Security Management and Open Threat Exchange

Transcription:

DNS Firewalls with BIND: ISC RPZ and the IID Approach Tuesday, 26 June 2012 1

About the Presenters»»» Paul Vixie Chairman and Founder Internet Systems Consortium Rod Rasmussen President and CTO IID (Internet Identity) 2

Logistics Webinar is 1 hour long A recording will available in 3 business days at http://www.isc.org/webinars Participants are muted Use the Q&A Tab to submit questions 3

Agenda Building DNS Firewalls with RPZ Paul Vixie DNS Firewall Rod Rasmussen Q&A Session 4

Building DNS Firewalls With RPZ Paul Vixie Internet Systems Consortium 5

DNS firewalls A DNS firewall examines responses to queries, passes some, blocks others. Responses can be examined for any content. Block action can discard, modify, or replace the original response. 6

The hard part The essence of a DNS firewall is simple. What s hard? Maintenance. How to provide the data that guides its behavior? How to update that data easily? How to share that data with others? 7

More about RPZ DNS firewall rules carried inside DNS zones. Rules published, subscribed, shared by normal DNS zone transfer protocol Including IXFR, NOTIFY, TSIG. So, propagation is timely, efficient, and authentic. 8

RPZ inspection capabilities If the name being looked up is X. If the response contains any IP address in range X. If a listed name server name is X. If any returned name server IP address is in range X. 9

RPZ action capabilities Synthesize NXDOMAIN. Synthesize CNAME. Synthesize NODATA. Synthesize an answer. Answer with the truth. 10

Implications Controlled Balkanization. Open market for (many) producers and (many) consumers. Differentiated service at a global scale. Instantaneous takedown. 11

Status RPZ is open and unencumbered. Implemented only in BIND (so far). Performance reasonable (~15%). New features backward compatible. ISC standard not an IETF standard. We hope for other implementations. 12

DNS Firewalls Rod Rasmussen IID (Internet Identity) President and CTO 13

Critical Internet Security Problems Malware command-and-control Malware infection sites APT attacks Phishing and spear phishing 14

Solution DNS Firewall Over 80% of malware uses DNS to communicate. Using a DNS firewall is an easy way to stop this. Network professionals and security pros working together for mutual benefit 15

Leverages big data on Internet security events to create intelligence that prevents enterprise employee and system connections to known malicious Internet locations IID identifies and takes down thousands of malicious Internet locations a week Brings in data feeds and works with hundreds of global law enforcement, security vendors, security researchers Instantly alerts SOC/NOC of problems on enterprise networks via unique TrapTrace feature 16

Collective Intelligence Latest actionable intelligence on malicious Internet locations Share findings from unique customer relationships one of the best networks around Aggregates many of the most robust threat intelligence streams in the industry 17

Feed Delivery Real-time threat updates via RPZ push capability Daily pre-determined malicious domains Feed empowers your own DNS infrastructure to provide robust security network wide with no new overhead 18

TrapTrace RPZ redirection enables enterprise security personnel to instantly be notified when a compromised machine tries to: Access a command-and-control server Transmit sensitive data to a known drop zone Connect to spear phishing site 19

Use Cases: Malware and APT Attacks Malware command-and-control APT attacks 25

Summary Over 80% of malware uses DNS to communicate. Using a DNS firewall is an easy way to stop this. IID provides solution with actionable intelligence via RPZ feeds and unique TrapTrace feature By bridging gap between network administrators and security professionals, DNS firewalls are protecting real customers against real threats IID and ISC are ready to help 26

Take Action Go to www.internetidentity.com/solutions/ activetrust-resolver Email dnsfirewall@internetidentity.com 27

Questions

About IID Trust IID to proactively protect against the latest cyber threats: Five of the top six banks in the U.S. Largest government agencies worldwide Leading financial services firms, e-commerce, social networking and ISP companies Headquartered in Tacoma, Washington www.internetidentity.com 29

About ISC Non-profit dedicated to Internet infrastructure Software: BIND9, (BIND10,) ISC DHCP, Operations: F-Root, Hosted@ISC, Protocols: about two dozen IETF RFC s Policy: Internet governance (e.g., SOPA) Commercial services: support, training, feature development registry services for new gtld s DNS hosting (public-facing or secondary ) 30

ISC www.isc.org info@isc.org +1 650 423 1300 IID www.internetidentity.com info@internetidentity.com +1 253 590 4100 31