ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC.

Slides:



Advertisements
Similar presentations
Dynamics of Online Scam Hosting Infrastructure
Advertisements

1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
Sep 2008ALAC Webinar 1 DNS Response Modification David Piscitello Senior Security Technologist ICANN.
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
MIRAGE MALWARE SIDDARTHA ELETI CLEMSON UNIVERSITY.
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
Cyber X-Force-SMS alert system for threats.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Registrars and Security Greg Rattray Chief Internet Security Advisor.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
Threat infrastructure: proxies, botnets, fast-flux
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
IBM Security Network Protection (XGS)
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
APA of Isfahan University of Technology In the name of God.
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
PART THREE E-commerce in Action Norton University E-commerce in Action.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
«FAST-FLUX problem & domains registrars» Pavel Khramtsov Slovenia-2009 The centre of registration of domains.
APT29 HAMMERTOSS Jayakrishnan M.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Digital Automata Unit 7-1 Managing the Digital Enterprise By Professor Michael Rappa.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
ICANN COMMUNITY STRATEGIC PLANNING DISCUSSION Brussels, June
Update from ICANN staff on SSR Activities Greg Rattray Tuesday 21 st 2010.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Phishing Problem Kristián Kučerák Milan Just. Abstract In this age of broadband, wireless, and network interconnectivity, we enjoy the unprecedented power.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Topic 5: Basic Security.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
(An Anti-Abuse Perspective)
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
Botnets A collection of compromised machines
DNS Hijacking – KL Tech Meet-up - May 2015
Botnets A collection of compromised machines
Lecture 3: Secure Network Architecture
The Domain Abuse Activity Reporting System (DAAR)
Introduction to Internet Worm
An overview over Botnets
Presentation transcript:

ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC

What is Fast Flux Hosting? An evasion technique Using fast flux hosting, an attacker –Hosts illegal content at a web site –Sends phishing containing URLs that point to compromised computers he commands –Commands the compromised computers (proxies) to forward user requests to the attackers web site –Rapidly changes the IP addresses of the proxies to avoid detection and takedown Several variants –Double flux changes addresses of name servers as well as proxies –Domain names are key element of FF attacks

Who benefits from fast flux? Question misses the mark –Dynamic authority spreading and other adaptive networking techniques may look like fast flux attacks –Calls attention to need to distinguish beneficial from harmful uses of adaptive networking techniques Who benefits from adaptive networking? –Organizations that require high availability, have highly targetable assets, or operate highly adaptive networks (Content Delivery Networks, military networks, …) –Free speech and and advocacy groups Who benefits from fast flux attacks? –Criminals, anyone who uses the technique for harmful purposes ICANN SSAC, Cairo Nov 2008 Page 3

Who is harmed by fast flux attacks? Some debate as to the extent to which FF attacks contribute to the overall impact of e-crime –Same set of victims whether fast flux is used or not –fast flux attacks have considerable influence in the duration and efficacy of harmful activities Users –Are victims of fraud or criminal activities –Are unwitting accomplices: their PCs hosts FF malware –Bear of the cost to detect and remediate infected systems Registrants and registrars targets for phishing and attacks that result in unauthorized access to domain accounts and DNS exploitation ICANN SSAC, Cairo Nov 2008 Page 4

Are registrars involved? Varying opinions! Involvement has many interpretations: –Reputable registrars are uninvolved –Certain registrars are unwitting participants (ignorant of problematic registrations) –Certain registrars appear to lack competence in managing abuse –The actions of certain registrars (or lack thereof) create the appearance of facilitation or complicity ICANN SSAC, Cairo Nov 2008 Page 5

Fast Flux Poses Many Challenges Purview –Does this matter fall within ICANNs remit? –What parties other than ICANN should be involved? Relationships? –Is Fast Flux unique enough to merit policy development? Activities –What kinds of monitoring are needed? –How should monitored data be reported, published, shared? –What actions (responses) are appropriate? Roles of players –Who monitors Fast Flux activities today? –Are parties who work to take down domains trustworthy? –Are registrars and registries expected to monitor Fast Flux activity? –Are FF data collected sufficient to justify a domain suspension? –What is an acceptable false positive rate when identifying a domain as a maliciously fluxing domain results in suspension? ICANN SSAC, Cairo Nov 2008 Page 6

How can ICANN community respond? Purview –A very large set of players currently pursues fast flux attackers –When flux hosting involves domain names, ICANN cannot avoid being involved at some level –Is policy needed? remains an open question Activities –Offer examples of monitoring, "data of value" to monitor –Describe a range of existing and possible mitigation techniques Roles of players –Multiple views on the kinds of roles ICANN, registries, registrars and broader ICANN community can play ICANN SSAC, Cairo Nov 2008 Page 7

ICANN SSAC, Cairo Nov 2008 Page 8 Lets Characterize FF Attack Nets Some network nodes run on compromised hosts (bots –Bots run proxies, DNS and web servers, or botnet C&Cs Network nodes change to sustain the networks lifetime, to spread network software, and to conduct attacks –Member nodes are monitored to if that a host has been shut down Network node IP addresses changed (frequently) via DNS (low TTLs) Network nodes distributed across multiple ASNs Network nodes distributed across multiple IP allocation blocks –in-addrs of IPs fall within consumer broadband allocation blocks WHOIS characteristics –Domain registration is "recent" –Contact information quality and accuracy is poor –Registration was fraudulently altered or purchased Not all characteristics must be present to positively identify a network as a fast flux attack network

ICANN SSAC, Cairo Nov 2008 Page 9 Technical Challenges Original characterizations of fluxing attacks is too narrow –Not all flux attacks are "fast Fluxing is not limited to short TTLs: attackers "flux" in response to loss of communication between bots and their command and control computers –Fluxing alone is insufficient to conclude criminal activity Short TTLs for NS records or other adaptive techniques are found in production networks where high availability is paramount What additional characteristics distinguish beneficial from criminal fluxing behaviors?

Any best practices today? What are some of the best practices available with regard to protection from fast flux? –Cited Anti-Phishing Best Practices Recommendations for Registrars from APWG stPractices.pdf –Cited SAC 025 –Enumerated subset of recommendations from both that FF WG believes to be applicable ICANN SSAC, Cairo Nov 2008 Page 10

ICANN SSAC, Cairo Nov 2008 Page 11 Where should ICANN and SSAC focus future studies? Improve data sharing and analysis among registry, registrar and anticrime/antiphishing communities Reduce fraudulent registrations and account theft Adopt an accelerated domain suspension plan Study algorithms and automated means of detecting domains used in fast flux attacks –How effective are current detection algorithms? –Can automation adapt to change as quickly as attackers? –What is an acceptable false positive rate? –Can we couple automation with manual inspection to further reduce probability of false positives? In parallel, consider evolution of attack strategies –Srizbi and Conficker

Questions? ICANN SSAC, Cairo Nov 2008 Page 12