A Privacy framework for DNS big data. November 28, 2014 Jelte Jansen



Similar documents
.nl ENTRADA. CENTR-tech 33. November 2015 Marco Davids, SIDN Labs. Klik om de s+jl te bewerken

A privacy framework for DNS big data applications *

DNS Big Data

TLD Data Analysis. ICANN Tech Day, Dublin. October 19th 2015 Maarten Wullink, SIDN. Klik om de s+jl te bewerken

A privacy framework for DNS big data applications *

legal & ethical data sharing prof.dr. Ronald Leenes r.e.leenes@uvt.nl TILT - Tilburg Institute for Law, Technology, and Society

14. Privacy Policies Introduction

First version of the document.

.ke Domain Name WHOIS Policy .ke Domain Name WHOIS Policy

CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31,

.eu Domain Name WHOIS Policy v.1.0..eu Domain Name WHOIS Policy

ENTRADA: Enabling DNS Big Data Applications

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

SUMMARY PRINCIPLES, RECOMMENDATIONS & IMPLEMENTATION GUIDELINES

Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015

DNS Basics. DNS Basics

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Policy for the Registration of.hamburg Domain Names

SDNP.mw cctld DOMAIN REGISTRATION POLICY Ver 1.2 of 23 July 2015

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS

Guidance for Preparing Domain Name Orders, Seizures & Takedowns

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management

AUSTRALIAN COMMUNICATIONS AUTHORITY CALL FOR EXPRESSIONS OF INTEREST FOR A TIER 1 REGISTRY OPERATOR FOR THE AUSTRALIAN TRIAL OF ENUM

Privacy Seminar - Social Networks

Domain Name System (DNS)

THE MOST EFFICIENT DOmAIN management SERvICE IN THE WORLD

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

XN--P1AI (РФ) DNSSEC Policy and Practice Statement

Policy Overview and Definitions

Instructions for Domain Name Registration

Verisign/ICANN Proposal in Response to NTIA Request

OpenSRS Service DNS Configuration Guide

what can we do with botnet data?

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

NET0183 Networks and Communications

PRIVACY POLICY The type of web browser and operating system you have used:

LAN TCP/IP and DHCP Setup

19. Exercise: CERT participation in incident handling related to the Article 13a obligations

Walking The Security & Privacy Talk Moving from Compliance to Stewardship

Innovating with the Domain Name System: From Web to Cloud to the Internet of Things

ICANN: achievements and challenges of a multi-stakeholder, bottom up, transparent model

Telecom and Internet Regulatory Challenges and Opportunities Names, Numbers, Internet Governance

C u s t o m e r S u p p o r t

Lab - Observing DNS Resolution

Lecture 2 CS An example of a middleware service: DNS Domain Name System

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

How to Transfer Domain Names and Get an Authorization Code

Domain Name Control Considerations

Japan Registry Services. Copyright 2005 Japan Registry Services Co., LTD.

Network Layers. CSC358 - Introduction to Computer Networks

Code of Conduct for the Processing of Personal Data by Financial Institutions

Configuring Your Gateman Server

The Internet Ecosystem and ICANN!! Steve Stanford University, Center for Information and Society! 29 April 2013!

Application and service delivery with the Elfiq idns module

STATE OF DNS AVAILABILITY REPORT

Figure 41-1 IP Filter Rules

Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic

Application-layer protocols

Wireshark DNS. Introduction. nslookup

Chapter 25 Domain Name System Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Registrar Ramp Up Process. Prepared by Afilias

NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314

The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. Duisburg, June 19, 2015

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check

GENERAL TERMS AND CONDITIONS

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

IANA Functions to cctlds Sofia, Bulgaria September 2008

Configuration Notes 0215

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

Opinion 04/2012 on Cookie Consent Exemption

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

Data publication and access policy on.fr registrations - 1 -

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN

Arbor s Solution for ISP

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Introduction. Friday, June 21, 2002

INXPO Privacy Policy

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)

How To Manage Dns On An Elfiq Link Load Balancer (Link Balancer) On A Pcode (Networking) On Ipad Or Ipad (Netware) On Your Ipad On A Ipad At A Pc Or Ipa

FAQ (Frequently Asked Questions)

.bbva TLD Registration Policy

Computer Networks: Domain Name System

IOS 8: Configure IMAP/POP/SMTP

PARTNER GUIDELINES

Blackbaud Communication Services Overview of Delivery and FAQs

Why contribute passive DNS data to ISC?

PEQ-DNS A Platform for DNS Quality Monitoring

Malicious domains: Automatic Detection with DNS traffic analysis

DATA RETENTION POLICY. ETC Foundation

American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2

ACCEPTABLE USE AND TAKEDOWN POLICY

Policy for the Registration of.versicherung Domain Names

PowerDNS Introduction

Lab - Observing DNS Resolution

Internet-Praktikum I Lab 3: DNS

Resilient Botnet Command and Control with Tor

Summary - ENUM functions that maps telephone numbers to Internet based addresses - A description and the possible introduction to Sweden

Internet Security and Resiliency: A Collaborative Effort

DNSSEC Policy and Practice Statement.amsterdam

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Transcription:

A Privacy framework for DNS big data November 28, 2014 Jelte Jansen

SIDN.nl (Registry voor Nederland) 5.5M domain names, >1.600 registrars > 1.300.000.000 DNS queries per day Private foundation with public task

SIDN Labs R&D team SIDN Improve services of SIDN Center of expertise Improve security of Internet in the Netherlands Facilitates external research

Privacy Framework What? Why? How? Source: http://xkcd.com

Privacy Framework: Why? Public service that is vital to Dutch society and economy Keep trust and confidence in SIDN as the operator for.nl Responsibility to be proactive in the field SIDN wants to act transparently

Privacy Framework: Innovations Introduces Privacy management to the use of DNS data Integrates legal, technical and organisational aspects of privacy management

ENTRADA: DNS Big Data Platform ENhanced Top-level domain Resilience through Advanced Data Analysis Goal: Develop and evaluate big data applications To Safeguard stability of '.nl' To increase the safety of the (Dutch) Internet To Detect botnets and abuse Non-goal: commercial use What about privacy?

ENTRADA: DNS Big Data Platform DNS autoconfig service User UserInterfaces Interfaces Services Servicesen enapplicaties applicaties statistics dashboard ENTRADA ENTRADAplatform platform Algortimes Algortimes Basisfaciliteiten Basisfaciliteiten Storage Storage HTTP EPP RDAP DNS Bronnen Bronnen(intern (internen enextern) extern) ATLAS

Resolver Root operator ISP netwerk Resolvers TLD Operator (bijv..nl) ENTRADA ENTRADA Platform Platform Gebruiker HTTP www.sidn.nl Child operator (sidn.nl)

(Potential) Personal Data in DNS Queries IP Address Queried name 'other' Timestamps Protocol flags Etc.

WBP Dutch Data Protection Act (Wet Bescherming Persoonsgegevens, WBP) Personal Data: 'any piece of information regarding an identified or identifiable natural person' Processing: any action or sequence of actions involving personal data, including but not restricted to the collection, recording, sorting, [ ] deletion or destruction of such data

Requirements for Processing Public Function Contractual obligation Legitimate Basis Explicit consent Purpose Limitation Personal data may only be used for the purpose for which it was collected Special Personal Data explicitely forbidden Religion Political views Etc.

WBP and ENTRADA We are not using 'Public Function': too weak besides, we are not government Explicit consent not possible So we need to be completely transparent Legitimate basis + Purpose Limitation The goal is for the benefit of the users themselves

WBP and ENTRADA: IP Addresses Can't simply anonimize them Most addresses are from resolvers (shared by users) BUT: Resolvers may be 'home' systems

Number of Queries per Resolver per Day

WBP and ENTRADA: IP Addresses Most individual resolvers are 'home' resolvers Few users, so addresses likely to be personal data 'Big' resolvers either ISP or domainers In the second case, still personal data Better metrics are future work Problem: to decide whether the address is personal data, you need to process it

WBP and ENTRADA: Queried names Single query does not say much 'www.universityoftilburg.nl' Not even associated with Tilburg University ;) Combined data can be considered personal Query patterns, pre-fetching Query names may include other personal data Personal names (firstname.lastname.mycloud.nl) IP addresses (192.0.2.1.customer-adsl.example.nl) Can also be combined with IP address of resolver (previous slides)

WBP and ENTRADA: IP Addresses in Queried names

Privacy Framework: Requirements Purpose limitation Per type of use of the data (i.e. per application) Verifiable Transparency Simple Extensible

Privacy Framework: Policies One policy per application Policy describes: Purpose Data that is used Filters on the data Access to the data Type of application (Research vs. Production) Other security measures

Privacy Framework: Data Filters at PEPs Anonimization Pseudonimization Aggregation Etc.

Privacy Framework: Privacy Board Reviews and approves policies Members: Legal Technical Organisational Publishes approved policies

Privacy Framework: Overview Legal and organisational ENTRADA data platform (technical) ENTRADA privacy framework R&D licence PEP-U Security Securityand andstability stability services servicesand anddashboards dashboards PEP-A Data Dataanalysis analysis algorithms algorithms Adjustments Database queries Template Author (Application Developer) Draft Policy Privacy Board Policy PEP-S Storage Storage DNS packets (PCAP) PEP-C Collection Collection.nl name servers DNS queries and responses Resolvers

Privacy Framework: Position Paper Currently at https://sidnlabs.nl

Privacy Framework: Conclusions DNS Data can be personal data DNS Data processing needs privacy-protecting measures Not 'just' technical

Privacy Framework: Questions on sharing Put 'share' in policy? Requirements for that? Is is possible to 'license' open data? Is full anonimisation possible? Is data still useful then?

Got questions? Jelte Jansen jelte.jansen@sidn.nl sidn.nl sidnlabs.nl