The Domain Abuse Activity Reporting System (DAAR)

Slides:



Advertisements
Similar presentations
© 2003 Public Interest Registry Whois Workshop Registrant/User Classification & Current Practices Panel Presented by Bruce W. Beckwith VP, Operations October.
Advertisements

ICANN Strategic planning process Draft key priorities for the July 2006 – June 2009 Plan for community comment November 2005.
Whois Task Force GNSO Public Forum Wellington March 28, 2006.
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC.
Governmental Advisory Committee New gTLD Program Briefing 19 June 2010.
© 2003 Public Interest Registry Whois Workshop Introduction to Registry/Registrar Issues Presented by Bruce W. Beckwith VP, Operations June 23, 2003 Serving.
Registrar experiences with WHOIS Bruce Tonkin Melbourne IT Ltd.
Text Competition, Consumer Choice and Trust Metrics IAG-CCT Call 18 June 2014 I. Update on metric evaluation II. Baselines collected to date III. New metrics.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Registrars and Security Greg Rattray Chief Internet Security Advisor.
Introduction to ICANN’s new gTLD program. A practical example: the Dot Deloitte case. Jan Corstens, Partner, Deloitte WIPO Moscow, 9 Dec 2011.
Implementation Recommendation Team (IRT) Proposal Comments Sue Todd, Director, Product Management Monday 11 May 2009, San Francisco.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Text #ICANN51. Text #ICANN51 15 October 2014 At-large policy round table Holly Raiche Panel 1: Privacy and Proxy 1000 – 1045 Hrs.
Blacklists aggregator: New service by TCI Dmitry Belyavsky, TCI ENOG 9 Kazan, Russia, 9-10 June 2015.
Text Competition, Consumer Choice and Trust Metrics IAG-CCT Call 18 April 2014 I. Possible overlapping metrics II. Metrics for discussion.
1 Updated as of 1 July 2014 Issues of the day at ICANN WHOIS KISA-ICANN Language Localisation Project Module 2.3.
Supporting a Healthy, Stable, Resilient Internet.
In Dec-2010 ICANN Board requested advice from ALAC, GAC, GNSO and ccNSO on definition, measures, and 3- year targets, for competition, consumer trust,
ICANN COMMUNITY STRATEGIC PLANNING DISCUSSION Brussels, June
Update from ICANN staff on SSR Activities Greg Rattray Tuesday 21 st 2010.
Chapter 17 E-Commerce and Digital Law
The Changing World of Endpoint Protection
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Securing Future Growth: Getting Ready for IPv6 NOW! ccTLD Workshop, 8 th April 2011 Noumea, New Caledonia Miwa Fujii, Senior IPv6 Program Specialist, APNIC.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Governmental Advisory Committee Public Safety Working Group 1.
.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
1 Domain Name Marketplace Patrick Jones Registry Liaison Manager 29 March 2007.
Law Enforcement Recommendations for RAA ammendment ICANN Brussels 2010 Protective Marking : Protect.
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
(An Anti-Abuse Perspective)
GAC SESSION 7: PSWG Update. PUBLIC SAFETY WORKING GROUP (PSWG) – UPDATE TO THE GAC Agenda Item 7 | ICANN 56 | 28 June 2016.
Tools for Effective Evaluation of Science InCites David Horky Country Manager – Central and Eastern Europe
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Side event organised by ICANN and the Council of Europe
WP2 - INERTIA Distributed Multi-Agent Based Framework
Under the Shadow of sunshine
Project Statistical Analysis of DNS Abuse in gTLDs (SADAG) Consortium: SIDN and TU Delft Requested by: Competition, Consumer Choice, and Trust Review Team.
Public Safety Working Group (PSWG)
Discussion of pti survey
TMG Client Protection 6NPS – Session 7.
Barracuda Web Security Flex
Domain Name Service (DNS) Network Registry
Summary of the « New gTLD Program Safeguards » context before the Statistical Analysis of DNS Abuse in gTLD Farell FOLLY, Africa 2.0 Foundation .
Data Protection/Privacy Activities
Community Session - Next-Generation gTLD Registration Directory Service (RDS) Policy Requirements RDP PDP WG | ICANN59 | 26 June 2017.
Abuse Mitigation + NG RDS PDP
ICANN’s Policy Development Activities
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
ICANN Update APStar Retreat | 21 Feb 2016
Update on ICANN Domain Name Registrant Work
Digital Analytics Best Practices for Financial Services Environments
Jon Peppler, Menlo Security Channels
Matt G change over point ?
The Challenge of Spam Spam is a harmful, costly, and evolving threat to Internet users. A collaborative approach is needed to provide the best spam-mitigation.
Draft Framework Elements for Unified Access Model
A New Phishing Detection Approach
Home Internet Vulnerabilities
حمایت از علائم تجاری در قانون تجارت الکترونیک ایران
Secure once, run anywhere Simplify your security with Sophos
Internet Technological Evolution and the Role and Impact of ICANN
APNIC’s Engagement on Security
TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation By Prudhvi raju G id:
Presentation transcript:

The Domain Abuse Activity Reporting System (DAAR) Fahd Batayneh Stakeholder Engagement Manager, Middle East ICANN Middle East Network Operators Group 2019 (MENOG19) Beirut, Lebanon Wednesday 3 April 2019

What is DAAR? A system for reporting on domain name registration and abuse data across Top Level Domain registries and registrars

How different is DAAR from other reporting systems? Studies all gTLD registries and registrars for which we can collect zone and registration data Employs a large set of abuse feeds; i.e. blocklists Accommodates historical studies Studies multiple threats: phishing, botnet, malware, and spam Takes a scientific approach; i.e. transparent and reproducible

The purpose of DAAR is to provide data to support Usage of DAAR Data Report on threat activity at TLD or registrar level Study historical security threats or domain registration activity Help operators understand or consider how to manage their reputations, their anti-abuse programs, or terms of service Study malicious registration behaviors Assist operational security communities The purpose of DAAR is to provide data to support community, academic, or sponsored research and analysis for informed policy consideration

>>> Let us look at each in more details <<< DAAR Data Sources DAAR system uses data from public, open, and commercial sources DNS Zone Data WHOIS Data Open Source or Commercial Abuse Threat (RBL) data >>> Let us look at each in more details <<<

i. DNS Zone Data gTLD zones for gTLD domain and registry analytics Uses publicly available methods to collect zone data such as Centralized Zone Data Service (CZDS) and zone transfer Uses domain names that appear in zone files Collect zone files from Approximately 1220 gTLDs Approximately 192 million domains i. DNS Zone Data

ii. WHOIS DAAR uses published registration data (WHOIS) Uses registrar name and IANA ID Reliable, accurate registrar reporting depends on WHOIS Scaling data collection from WHOIS is a big challenge

DAAR uses multiple abuse Reputation Blocklist (RBL) datasets to Generate daily counts of domains associated with phishing, malware hosting, botnet command and control (C&C), and spam Calculate daily total and cumulative abuse domains Calculate monthly/yearly newly added abuse domains Create visual analytics regarding abuse trends in gTDLs DAAR counts “unique” abuse domains A domain that appears on any abuse datasets reporting to DAAR is included in the counts once DAAR reflects how entities external to ICANN community see the domain ecosystem iii) Abuse Threat Data

Reputation Block Lists : Identifying Threats

Usages of Reputation Block Lists Browsers Cloud and Content-Serving Systems Social Media Tools Commercial Firewalls and UTM devices Enterprise mail/messaging Systems Third-Party Email Service Providers DNS

DAAR Criteria for RBL Data RBLs must provide threat classification that match our set of security threats RBLs have positive reputations in academic literature RBLs have positive reputations in operational and security communities for accuracy and clarity of process RBLs are broadly adopted across operational security community Feeds are incorporated into commercial security systems Used by network operators to protect users and devices Used by email and messaging providers to protect users

Current Reputation Datasets Used by DAAR SURBL lists (domains only) Spamhaus Domain Block List Anti-Phishing Working Group (APWG) Malware Patrol (Composite list) Phishtank Ransomware Tracker Feodotracker

DAAR Is Not an Abuse List Service ICANN does not compose its own reputation blocklists DAAR presents a composite of the data that external entities use to block threats DAAR collects the same abuse data that is reported to industry and Internet users and is used by Commercial security systems Academia and industry Academic studies and industry use validate these datasets exhibit accuracy, global coverage, reliability, and low false positive rates

Project Status

DAAR and the ICANN Open Data Program Open Data Program aims to facilitate access to data that ICANN organization or community creates or curates In cases where licensing permits, DAAR data or reports will be published and included in the Open Data Program

Project Next Steps Investigating publication of data into the Open Data Program Improving the system based on comments and reviews. Write to us anytime at daar@icann.org Further developing new metrics and analytics based on current and future research based on DAAR Having discussions with registries who are interested in viewing their own data ICANN does this in the context of sharing and learning from other security professionals in the industry

Visualizing DAAR Data

Overall Abuse Distribution in DAAR Data (January 2019)

Distribution of Abused Domains in gTLDs

Distribution of Domains with Different Abuse Types in gTLDs

Write to us at daar@icann.org Questions? Write to us at daar@icann.org