Proactive Network Protection Through DNS

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Verma - ICISS 2014 R easoning M ining NLP Defense Rakesh M. Verma ReMiND Laboratory Catching Classical and Hijack-based Phishing Attacks.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Botnets An Introduction Into the World of Botnets Tyler Hudak
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Name Resolution Domain Name System.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
What DNS is Not 0 Kylie Brown, Jordan Eberst, Danielle Franz Drew Hanson, Dennis Kilgore, Charles Newton, Lindsay Romano, Lisa Soros 0 Paul Vixie
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Swiss NREN protection with DNS RPZ
Ideal in addition to fast VPN Service Provider using Secure VPN Access.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
Host Identifier Revocation in HIP draft-irtf-hiprg-revocation-01 Dacheng Zhang IETF 79.
Understand Protection LESSON Security Fundamentals.
BUILD SECURE PRODUCTS AND SERVICES
DNS Forensics & Protection
Security Issues with Domain Name Systems
Fortinet NSE8 Exam Do You Want To Pass In First Attempt.
Everything You need to know
DNS Security Advanced Network Security Peter Reiher August, 2014
Daniel “3ICE” Berezvai Reverse Proxy Presentation by:
Chapter 7: Identifying Advanced Attacks
Common Methods Used to Commit Computer Crimes
Module 5: Resolving Host Names by Using Domain Name System (DNS)
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
Instructor Materials Chapter 7 Network Security
Configuring Windows Firewall with Advanced Security
IMPLEMENTING NAME RESOLUTION USING DNS
Configuring and Troubleshooting DNS
Threat Management Gateway
VCE Practice Test Questions Answers
Web Security for Field Engineers practice-questions.html.
CPS 512 midterm exam #1, 10/5/17 Your name please: NetID:_______ Sign for your honor:____________________________.
Client Client 4) Hello , please give me the website
DNS security.
Introduction to DNSWatch
Jon Peppler, Menlo Security Channels
What’s New in Fireware v12.1.1
Call AVG Antivirus Support | Fix Your PC
Information Security Session October 24, 2005
New Functionality in ARIN Online
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Unit 1.6 Systems security Lesson 2
A New Approach to DNS Security (DNSSEC)
Chapter 4: Protecting the Organization
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
The Internet: Encryption & Public Keys
The DNS Firewall Architecture
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Slides Credit: Sogand Sadrhaghighi
Securing web applications Externally
Presentation transcript:

Proactive Network Protection Through DNS Hello In next 20 minutes I’m going to talk how to use DNS to protect your network and users from common attacks. S. Alireza Vaziri

Agenda Today Security Challenges Methods of Network Protection DNS and DNSSEC DNS RPZ Threat Intelligence Machine Learning Classifier Agenda We are facing dozens of security challenges these days in our network, unpatched machines getting involved in botnet activities, some of our clients sends spams and uneducated users get caught in phishing attacks.

Alireza Vaziri Me Network Engineer Security Practitioner We are facing dozens of security challenges these days in our network, unpatched machines getting involved in botnet activities, some of our clients sends spams and uneducated users get caught in phishing attacks.

🤕 Today’s Headache Botnets Spams Phishing We are facing dozens of security challenges these days in our network, unpatched machines getting involved in botnet activities, some of our clients sends spams and uneducated users get caught in phishing attacks.

Worst Botnet Countries 🤦🏻‍♂️

Technical Malware Controls Firewall IDPS Antivirus Patch Management Technical Malware Controls Are we secure? NO! Are we secure? No!

🧐🧐 RIP DPI Resource Hungry Everything is Encrypted Polymorphic Malwares RIP DPI 🧐🧐 Let’s accept that DPI is dead, since everything is encrypted deep down and with today’s bandwidths you have to spend tens of thousand of dollars on a single DPI appliance. What about malwares? Modern malwares change themselves as they distribute, so it is hard to detect new types of traffic with signature based models.

NetFlow Based Botnet Detection Flow Based Analysis on malware traffic Machine Learning based prediction NetFlow Based Botnet Detection I have tired to control botnet activities using ML and NetFlow, analyzing malicious flow and training the machine to find similar flows. Mainly it detects botnet activity at IP layer. But something was missing in detection method, most of modern malwares use DNS for their activities. You can find the talk in RIPE75 archive.

Malware Distribution URLs afobal.cl alvoportas.com.br bestdove.in.ua blogerjijer.pw bright.su dau43vt5wtrd.tk domnicpeter.in.net dzitech.net fadzulani.com hruner.com Malware Distribution URLs ☠️ As I have mentioned, most of the modern malwares use domain names` to distribute and connecting back to their command and control server. This is a little portion of Zeus botnet.

😣

DNS-Based Malware Control Fast Cheap Easy to deploy DNS-Based Malware Control As long as most of the networks have their own DNS server, protecting network and users with existing infrastructure wouldn’t be a noticeable cost for the network operators.

DNS is vulnerable by design Stateless Query Easy to hijack No integrity check RFC 3833 DNS is vulnerable by design Before protecting your users from malwares, we have to make sure that our DNS infrastructure is safe. DNS, one of the key role in internet is vulnerable by design. Unfortunately DNS queries are prone to hijacking and a MITM could redirect a user to malicious IP, despite the user have typed the correct address. RFC 3833 has some of the threats that DNS have. So what is the solution?

DNSSEC Answers are signed Resolver check integrity DNSSEC is a security extension to the legacy DNS. It make sure that DNS answers to queries haven’t been manipulated during transit in network by signing the answers with keys. As long as DNS servers are using DNSSEC we are sure that users are being directed to legitimate IP address of the website. But what about malicious domains that we don’t want our users have access to?

DNS RPZ (Response Policy Zone) Zone being updated periodically Check Query and Response for malicious records Return bad domains with NXDOMAIN Redirect user to custom page Block C&C, Phishing, Malware DNS RPZ (Response Policy Zone) ✋🏻🏻 DNS RPZ or Response Policy Zone, DNS Server check a custom zone to see if users query or response is listed in the zone. It returns NXDOMAIN to the user or redirect user to a custom page for educational purpose. It protects users from visiting malicious websites or connecting to a CnC server.

BIND RPZ response-policy { zone "rpz"; }; $TTL 300 @ IN SOA  localhost. need.to.know.only. (                        201802121 ; Serial number                        60        ; Refresh every minute                        60        ; Retry every minute                        432000    ; Expire in 5 days                        60 )      ; negative caching 1 minute IN NS   LOCALHOST. example.com IN CNAME . *.example.com IN CNAME . This is a simple BIND RPZ configuration which block example.com

Quad9 OpenDNS CloudFlare DNS Success Stories These are the services that have protected users for FREE! But you can keep your data in house using your local DNS server.

😄

Zone Update Automatic Multiple Source (Blacklists) Manually added hosts AXFR/IXFR Zone Update So how do we update the zone? RPZ could be updated automatically and manually from different sources.

Local Threat Intelligence Detecting New Malicious Domain Holding Reputation Score (ASN, IP, Domain) Local Threat Intelligence `

👮🏻 Background Check Alexa Rank Google Page Rank Number of subdomain Number of – and . Domain age in WHOIS PTR record ASN Background Check 👮🏻 I have started to do a background check on domains that have been queried to my DNS server. These data helped me to create reputation score based on fetched data.

Protect Top Hosts from Phishing Shaparak.ir Bankmellat.ir Bmi.ir Tamin.ir Protect Top Hosts from Phishing 🎣 These are some of the most popular websites that have been under heavy phishing attack, and unfortunately hundreds of identity and credit card data have been stolen from unaware users.

Fuzzy Logic Used in Google search Some of the phishing domains are similar to their legitimate one. Fuzzy logic is the one that google uses for it’s search recommendation. When you type something wrong, it suggest you the correct term. These typos might get user getting into phishing attacks.

🧠 Machine Learning Dataset from Phishtank and RBLs Domain Background Check Train and Test data Machine Learning 🧠 There are thousands of malicious domains in public blacklists, So I have fetched them and gather data for reputation score. Based on the data I have trained a ML model to detect new malicious domains based on the trained model.

Procedure Blacklist fetching Fetch Extra Data Train ML model Check DNS logs Add new domains to list Procedure

KNN Classifier Domain Type Trusted Malicious Dataset 1000 700 KNN 10 6 Train/Test 50/50 Accuracy 85.7% 82.2%

What is missing? DNS RPZ is not a total solution (Domain Fronting) RPZ cannot control direct IP connectivity RPZ cannot control URLs What is missing? There is no single security solution to secure your network, RPZ could add another layer of defense to your network. As long as request goes through DNS server, RPZ could help, but for any reason if traffic being redirected from DNS server, you don’t have any control over it with your DNS server. Detecting and analyzing URLs is playing major role in phishing detection, which you cannot do it with DNS server.

What do we need? Public Threat Intelligence feed STIX, TAXII, CybOX Public Resolver Shadowserver What do we need? We Desperately need a Public Threat Intelligence Feed to handle cyber attacks, I ask our network providers, Please do something!

Publish https://github.com/aliereza/MLDNS We Desperately need a Public Threat Intelligence Feed to handle cyber attacks, I ask our network providers, Please do something!

Questions?