Blacklists aggregator: New service by TCI Dmitry Belyavsky, TCI ENOG 9 Kazan, Russia, 9-10 June 2015.

Slides:



Advertisements
Similar presentations
Dynamics of Online Scam Hosting Infrastructure
Advertisements

Network Security Highlights Nick Feamster Georgia Tech.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
© 2003 Public Interest Registry Whois Workshop Introduction to Registry/Registrar Issues Presented by Bruce W. Beckwith VP, Operations June 23, 2003 Serving.
Text Competition, Consumer Choice and Trust Metrics IAG-CCT Call 18 June 2014 I. Update on metric evaluation II. Baselines collected to date III. New metrics.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Design and Evaluation of a Real-Time URL Spam Filtering Service
Did You Know? Number of spam s sent each day? 100 billion.
Threat infrastructure: proxies, botnets, fast-flux
What is ? A new, more secure Internet domain for the banking community An identifiable channel for trusted communications A place for growth and innovation.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Reporting Phishing Incidents Heather Kimley June 13, 2012.
3rd Nordic Marketing conference, W2 Helsinki June, Audronė Miškinienė Head, Public Relations Division, SL WG 2.
Chapter 9: Cooperation in Intrusion Detection Networks Authors: Carol Fung and Raouf Boutaba Editors: M. S. Obaidat and S. Misra Jon Wiley & Sons publishing.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
In Dec-2010 ICANN Board requested advice from ALAC, GAC, GNSO and ccNSO on definition, measures, and 3- year targets, for competition, consumer trust,
FluXOR: Detecting and Monitoring Fast-Flux Service Networks Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, and Danilo Bruschi 5th international.
Why ICANN failed Milton Mueller Associate Professor, Syracuse University School of Information Studies.
1 ICANN update Save Vocea APSTAR retreat, Taipei, TW 24 February 2008.
Content Control Stewart Duncan Technical Manager.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
United Nations Statistics Division Registry of national Classifications.
The Challenges of Technology Internet Safety. Basic philosophy Messenger services Web sites Social networking sites Monitoring.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
 Introduction to Computing  Computer Programming  Terrorisom.
Proposals on standardisation process in ESS, The Hague_ ESS net Preparation of Standardisation 1 Proposals on standardisation process.
Logjam: new dangers for secure protocols Dmitry Belyavskiy, TCI ENOG 9, Kazan, June 9-10, 2015.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Invitation to ICANN GNSO ISPCP RIPE65 – September, 2012 The Internet Service Providers Connectivity Providers Constituency, ICANN Generic Names Supporting.
1 Proposed Wait Listing Service (WLS) Presented by Chuck Gomes VeriSign Global Registry Services (VGRS)
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
Governmental Advisory Committee Public Safety Working Group 1.
1 November 17, 2009 Jim Russell - EOPM Review GATS AIM Data Accessibility John McNabb, AIM Project Data Center Manager Hampton University.
.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.
The European ccTLD Landscape Peter VAN ROSTE - ICANN Briefing – Brussels - 25 June 2013.
1 Domain Name Marketplace Patrick Jones Registry Liaison Manager 29 March 2007.
FTS monitoring work WLCG service reliability workshop November 2007 Alexander Uzhinskiy Andrey Nechaevskiy.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
1 Overview of WLS. 2 Proposed Wait Listing Service (WLS) Presented by Chuck Gomes VeriSign Global Registry Services (VGRS) Potential registrants subscribe,
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
Server Implementation. NETGATE 2 Netgate2 Spam Firewall and Server deliver the most robust, effective and easy to manage security available.
GAC SESSION 7: PSWG Update. PUBLIC SAFETY WORKING GROUP (PSWG) – UPDATE TO THE GAC Agenda Item 7 | ICANN 56 | 28 June 2016.
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
The 5 Step System for Managing Your Online Reputation.
Welcomes you.  Norton antivirus is a type of anti-malware software developed by semantic corporation since  It provides the feature of spam.
Anti-Spam Managing Spam with Kerio Connect
Public Safety Working Group (PSWG)
GCSE ICT SECURITY THREATS.
Summary of the « New gTLD Program Safeguards » context before the Statistical Analysis of DNS Abuse in gTLD Farell FOLLY, Africa 2.0 Foundation .
ISYM 540 Current Topics in Information System Management
Dissemination of Energy Statistics in Russia
DNS Privacy: Problem and solutions
Update on ICANN Domain Name Registrant Work
Welcome to DCISD Technology
פחת ורווח הון סוגיות מיוחדות תהילה ששון עו"ד (רו"ח) ספטמבר 2015
Welcome to MATT from the Southville Deli.
Cybercrime and TLS.
The Domain Abuse Activity Reporting System (DAAR)
Spam control Old emphasis: detect spam
What is ? A new, more secure Internet domain for the banking community
Presentation transcript:

Blacklists aggregator: New service by TCI Dmitry Belyavsky, TCI ENOG 9 Kazan, Russia, 9-10 June 2015

Internet is dangerous SPAM Phishing FastFlux Malware What else???

Previous project The 1 st in Russia unique analytical resource, the Netoscope project aims at making the Russian domain space safer for users

Some statistics

New gTLDs start Abuse monitoring of TCI.дети.москва.moscow.tatar etc… ICANN: abuse monitoring Welcome to us!

Blacklists aggregator Filter for interesting domains Sources: SURBL, Netoscope, etc… Filter for interesting domains Aggregate Unify classification - TBD Reports (daily, monthly…)

Implemented with Perl Pluggable architecture to add new lists PostgreSQL Domain – source – categories – details ftp, WebDaV, Daily Report Nothing extraordinary!

Implemented for… Now Registries Required by ICANN for new gTLDs Tomorrow Registrar After day? Hosters Who can watch yoursite.com?

Questions? Drop them at: