DNS Operation And Security Protection

Slides:



Advertisements
Similar presentations
.CN DNS Operation Status Cuiling Zhang CNNIC
Advertisements

Review iClickers. Ch 1: The Importance of DNS Security.
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
© 2011 Infoblox Inc. All Rights Reserved. Infoblox – control, secure & automate Mike Carroll.
SCADA Security, DNS Phishing
1 | © 2013 Infoblox Inc. All Rights Reserved. 1 | © 2014 Infoblox Inc. All Rights Reserved. Domain Name System (DNS) Network Security Asset or Achilles.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Arbor Multi-Layer Cloud DDoS Protection
MNO Cloud Use Case 2 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_115.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
Harness Your Internet Activity. Zeroing in On Zero Days DNS OARC Spring 2014 Ralf Weber
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Online Game Trojan SecurityLabs.websense.com Hermes Li.
What DNS is Not 0 Kylie Brown, Jordan Eberst, Danielle Franz Drew Hanson, Dennis Kilgore, Charles Newton, Lindsay Romano, Lisa Soros 0 Paul Vixie
Web Application Firewall (WAF) RSA ® Conference 2013.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Application of Content Computing in Honeyfarm Introduction Overview of CDN (content delivery network) Overview of honeypot and honeyfarm New redirection.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Security, For DNS and by DNS ZHOU Yonglin Beijing, Dec 6 th, 2009.
DNS Cache Poisoning. History 1993 – DNS protocol allowed attacker to inject false data which was then cached 1997 – BIND 16-bit transaction ids not randomized,
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
CNNIC UPDATE NIR SIG, 26 th APNIC, Christchurch, New Zealand.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Internet infrastructure 1. Infrastructure Security r User expectations  Reliable service  Reliable endpoints – although we know of spoofing and phishing.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
© 2014 ISC Tales of the unexpected - handling unusual DNS client behaviour UKNOF29 – Cathy Almond, ISC.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
THE DNS (DOMAIN NAME SYSTEM). Before the DNS, all computers connected to the internet through ARPANET (the worlds first operational packet switching network).
High performance recursive DNS solution
Cognitive Wi-Fi.
BUILD SECURE PRODUCTS AND SERVICES
Fundamentals of Information Systems, Sixth Edition
Introduction to SDNS-Mon
Domain Name System (DNS) Network Security Asset or Achilles Heel?
DNS Security.
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Living on the Edge: (Re)focus DNS Efforts on the End-Points
Unit 5: Providing Network Services
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
CHAPTER 3 Architectures for Distributed Systems
DNS Cache Poisoning Attack
DNS security.
Chapter 19 Domain Name System (DNS)
How do we decide where to deploy to next?
Providing Network Services
Subject Name: Computer Communication Networks Subject Code: 10EC71
Computer Networks: Domain Name System 1.
CS4622: Computer Networking
AKAMAI INTELLIGENT PLATFORM™
Home Internet Vulnerabilities
Re-Engineering the Root of the DNS
File Transfer Issues with TCP Acceleration with FileCatalyst
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Chapter 12 End-to-End Networking
(DNS – Domain Name System)
Test Bed Status Zhang Wenhui CNNIC
Computer Networks Presentation
Wireless Spoofing Attacks on Mobile Devices
DNS Cache Poisoning.
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Presentation transcript:

DNS Operation And Security Protection 2016/06

Who am i Mike CNNIC Planning Engineer Responsible for: DNS Projects Planning and Operation Reliability Email: zhangmingkai@cnnic.cn

Contents The Operating Status Of CNNIC Security Monitoring Platform DNS Security Operation And Security Protection Future

1. The Operation Status Of CNNIC The architecture Three centers in two places (CNNIC data center, Yizhuang data center and Chengdu data center) Support IPv6 and DNSSEC 30+ global/Local service nodes. BGP+Anycast for IP broadcast. BGP + IP Anycast ROOT instance(F I J L ) TLD (.CN .中国 .公司 .网络) SLD (cnnic.cn com.cn…) Recursive service (1.2.4.8 and 210.2.4.8) 60+ monitoring nodes for secure and Reliability monitoring 海外节点11个,国内节点21个 平台每年遭受攻击50-100次左右 最高攻击记录160万qps攻击

Number of Domain Names .cn(en) >17.4 million 中文.cn >2.2 million .中国 >500 thousand .公司 >65 thousand .网络 >46 thousand 8 billion + (QPD)

The number of online services are more than 300+ 20+ times service change and upgrading and 3-5 times emergency handling each month The total number of service monitoring up to 14000+, the daily alarm rate reached 2000+!

2. Security Monitoring Platform 2.1 Monitoring Nodes Deployment 2.2 Domain name system monitoring 2.3 Data Processing

2.1 Monitoring Nodes Deployment Cover 6 ISP networks in China 30+ provinces in China Overseas deployment

2.2 Domain name system monitoring Root name server monitoring TLD name server status monitoring Recursive DNS service monitoring VIP domain name monitoring

2.3 Data Processing Big data analysis platform Statistical analysis of domain name data Statistical analysis of domain name based on geographic location Analysis of the change of domain name

3. DNS Security 3.1 DNS Attack types 3.2 Attack Methods Analysis 3.3 DNS Attacks in CNNIC

3.1 DNS Attack types DDOS NXDomain Attack Amplification Attack Cache poisoning DNS hijacking

3.2.1 NXDOMAIN Attack The attacker sends a flood of queries to a DNS server to resolve a non-existent domain name. The recursive server tries to locate this non-existing domain by carrying out multiple domain name queries but does not find it In the process, its cache is filled up with NXDOMAIN results. DNS recursive server waits for responses, outstanding query limit exhausted Target domain’s auth server experiences DDoS

3.2.2 DNS Amplification Attack Combines Reflection and Amplification Uses third-party open resolvers in the Internet (unwitting accomplice) Attacker sends spoofed queries to the open recursive servers Queries specially crafted to result in a very large response

3.2.3 DNS Cache Poisoning  A malicious user attempts to guess that a DNS client or server has sent a DNS query and is waiting for a DNS response. A successful spoofing attack will insert a fake DNS response into the DNS server’s cache For UDP query, the No way to  verify the DNS data is authentic. The DNSSEC will handle it for you!

3.2.4 DNS Hijacking Some ISP will hijack your DNS query (Sometimes webpages with“server not found”status will be replaced by ads web) Internet Censorship DNS hijacking involves a malware, the DNS Cache poisoning involves overwriting your local DNS cache with fake values

3.3 DNS Attacks in CNNIC DNS Attack Attack Case The CNNIC DNS platform suffered more than 30 attacks in 2015. Attack Case DNS Attack Most attack domain are “random.domain.cn” Most attack domain are game or e-commerce related. The src IP addresses are massive Most domain are set ClientHold status. DDoS:1.6 million QPS/s Attack Domain:xxx.dianbaobao.net.cn Target Website:E-commerce

4. Operation And Security Protection 4.1 SOS2 4.2 SDNS-AM 4.3 SDNS-D

4.1 SOS2 Unified management and monitoring system Monitor all server and service status Configuration management

4.2 SDNS-AM Data analysis + monitoring alarm Real time analysis of DNS data (single node 150 thousand) Multidimensional statistics and analysis (20+ categories, 160+ statistical indicators) Network and anomaly detection mechanism (two patent algorithm support) Distributed deployment support, and centralized analysis

4.3 SDNS-D Real-time traffic analysis Traffic statistics QPS, IP, domain name and other information Attack Recognition Fixed IP attack Random field Network Traffic Redirect DNS Data Cleaning

5. Future 5.1 Embrace the open source community 5.2 Big data analysis and visualization

5.1 Embrace the open source community Automation management system with Ansible Docker virtualization to build a fast delivery system Openstack cloud platform to build DNS cloud(Dr Ding) ELK for Big data indexing and processing.

5.2 Big data analysis and visualization Processing and analyzing massive data(log data, event data, etc.) Real time data analytics. Visual data display, make operation work much faster and easier.

Q&A Thanks