SGNIC’s Measures Against Domain Name Abuses 26 August 2011 Lim Choon Sai General Manager (SGNIC)

Slides:



Advertisements
Similar presentations
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Advertisements

Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
Quality Check Exempt Advisers Group April Background  Retrospective quality checks to be undertaken to determine if the immigration adviser licence.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Registrar experiences with WHOIS Bruce Tonkin Melbourne IT Ltd.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
FIT3105 Security and Identity Management Lecture 1.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Individual User Logins
Text #ICANN51. Text #ICANN51 15 October 2014 At-large policy round table Holly Raiche Panel 1: Privacy and Proxy 1000 – 1045 Hrs.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
IT security By Tilly Gerlack.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Executive Directors Report Annual General Meeting – 31 July 2008.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.
A. Whether dispute options for registrants should be developed and implemented as part of the policy (registrants currently depend on registrars to initiate.
Protecting Your Assets By Preventing Identity Theft 1.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
(An Anti-Abuse Perspective)
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
06 JULY 2016 NHISSA MEETING mHEALTH REGISTRY M.J. NKGAPELE.
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
Washington D.C., March 23, 2017 Improving Quality and Reliability of Land Records: Germany’s Experience Dr. Nicola Hoischen, LL.M. (Cologne/Paris 1)
Phishing, identity theft, and more
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Misuses of ICT Malpractice and crime © Folens 2008.
Social Engineering Charniece Craven COSC 316.
StudentTranscripts Service Overview
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Getting Started: BCeID Sign Up
How to Protect your Identity Online PIYUSH HARSH
StudentTranscripts Service Overview
StudentTranscripts Service Overview
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
4 ways to stay safe online 1. Avoid viruses and phishing scams
StudentTranscripts Service Overview
Starter What is identity theft?
Use of Biometric Technology in Payments to avoid Frauds
Red Flags Rule An Introduction County College of Morris
Getting Started: BCeID Sign Up
Integrity Filters in eProcurement Systems
StudentTranscripts Service Overview
StudentTranscripts Service Overview
Computer Security.
StudentTranscripts Service Overview
Incident response and intrusion detection
REGISTRATION OF CORPPASS
Spear Phishing Awareness
Scheme for Growth Pilot
Characterizing Pixel Tracking through the Lens of Disposable Services
Presentation transcript:

SGNIC’s Measures Against Domain Name Abuses 26 August 2011 Lim Choon Sai General Manager (SGNIC)

Scope Types of Abuse Measures Identity Verification Detection and Tracking Enforcement Conclusion

Usage Abuse Registration Abuse Types of Abuse Objectionable Domain Names Registration in Wrong Category Sale of Domain Names Incomplete or Incorrect registration details Identity Theft or Fake Identity Cybersquatting Pornographic Socially or politically sensitive Fake Drugs Copyright violations Scam Spam Malware Phishing Abuses that SGNIC is concerned about:

Usage Abuse Registration Abuse Types of Abuse Objectionable Domain Names Registration in Wrong Category Sale of Domain Names Incomplete or Incorrect registration details Identity Theft or Fake Identity Cybersquatting Pornographic Fake Drugs Copyright violations Scam Spam Malware Phishing In some areas, SGNIC feels more effectively measures are required: Socially or politically sensitive

Measures Effective Enforcement Effective Detection and Tracking Effective Identity Verification Registration in Wrong Category Incomplete or Incorrect registration details Identity Theft or Fake Identity Malware Phishing

 scheme  Leverages on National online personal ID authentication (SingPass)  All Singapore Citizens, Permanent Residents and Foreign workers have SingPass ID and password issued by Government.  Must use SingPass ID to access government online services.  Domain Name registrations will be linked to the SingPass authentication system. Registrations require the SingPass ID holder to vouch that the submitted details are complete, accurate and truthful Identity Verification Effective Identity Verification

 Providing inaccurate or incomplete registration information is often a precursor to other domain name abuses  Domain Name Abuse Management System (AMS) provides early warnings by checking the accuracy and completeness of new registrant information – E.g. Checks for address completeness, postal code accuracy Detection and Tracking Effective Detection and Tracking

Detection and Tracking abc.sg [OWNER] : ABC Pte Ltd [Com No.: A] [ADDRESS]: 79,ROBINSON RD, ABC BUILDING #03-00 Singapore [PHONE] : [ ] : ACRA Database (registry of companies) “Company Name” must match with “Company number” must be valid 1 Postal code Database “Postal code” must be valid “Address” must be ‘similar’ with 2 Singapore phone number must start with ‘2’,’3’,’8’ or ‘9’. Highlight if it looks fake: Does contain ‘suspicious’ words? (e.g. ‘buy’, ‘sale’) 4

Examines registration trends. Highlights suspicious bulk registrations from same registrant, , telephone number. e.g. – > 10 domains (all different registrant name) using same in 1 day – > 50 domains (all different registrant name) using same in 30 days Detection and Tracking Bulk Registration TagDescription BR4-166 registrations in 30 days using the BR4-254 registrations in 30 days using the phone no XXXX Example of cases detected:

Automated scanning of domain name against third party security databases for malware distribution/phishing activities. Detection and Tracking A BC D example.sg Clean Risky Clean

AMS continually monitors all domain names  All new names are scanned weekly for 3 months, thereafter monthly scans Detection and Tracking Effective Detection and Trackin Domain names scanned by AMS Flagged as possibly abusive Confirmed Malicious 130, Initial Run results (in end July) :

Actively enforce against all types of abuses. For malware and phishing: Time is of essence: Critical to send quick and timely advices to each party who may be involved (ISP, website hosting provider, registrant, admin and tech contact) for them to take action Formalised collaboration with SingCERT who can provide expert opinion For confirmed cases, will work with SingCERT for further investigation Last straw for serious breaches: suspend or delete - drawing powers from registrant agreement Enforcement Effective Enforce- ment

SGNIC’s experience:  Adopt a more proactive approach in dealing with domain name abuses  For the benefit of the community and upholding the ccTLD/country’s reputation  To assusage concern of the authority  DNS abuse management is a long term commitment and concerted effort by relevant stakeholders  New applications over DNS giving rise to new opportunity for exploitation  No single agency has control over all aspects of DNS abuses Conclusion

Thank you