Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.

Slides:



Advertisements
Similar presentations
Dynamics of Online Scam Hosting Infrastructure
Advertisements

11/20/09 ONR MURI Project Kick-Off 1 Network-Level Monitoring for Tracking Botnets Nick Feamster School of Computer Science Georgia Institute of Technology.
1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.
ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
© 2003 Public Interest Registry Whois Workshop Introduction to Registry/Registrar Issues Presented by Bruce W. Beckwith VP, Operations June 23, 2003 Serving.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Trojan Horse Program Presented by : Lori Agrawal.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
Introduction to Security Computer Networks Computer Networks Term B10.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Registrars and Security Greg Rattray Chief Internet Security Advisor.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
Threat infrastructure: proxies, botnets, fast-flux
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
MNO Cloud Use Case 2 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_115.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Beyond DDoS: Case Studies on Attack Mitigation for Financial Services Mike Kun and Patrick Laverty, Akamai CSIRT.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Botnets An Introduction Into the World of Botnets Tyler Hudak
9.1. The Internet Domain Names and IP addresses. Aims Be able to compare terms such as Domain names and IP addresses URL,URI and URN Internet Registries.
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Cyber Crimes.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
«FAST-FLUX problem & domains registrars» Pavel Khramtsov Slovenia-2009 The centre of registration of domains.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
FluXOR: Detecting and Monitoring Fast-Flux Service Networks Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, and Danilo Bruschi 5th international.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Kenya Network Information Centre (KENIC). Introduction KENIC is the registry for the.KE ccTLD. Local and non-profit organization Mandate is to Manage.
DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor Craig Shue
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
Chap1: Is there a Security Problem in Computing?.
.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Cybersecurity Test Review Introduction to Digital Technology.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
(An Anti-Abuse Perspective)
Understand Protection LESSON Security Fundamentals.
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
Under the Shadow of sunshine
BUILD SECURE PRODUCTS AND SERVICES
Instructor Materials Chapter 7 Network Security
Unit 36: Internet Server Management
Rachel Akisada & Melanie Kingsley
Internet Worm propagation
Introduction to Internet Worm
Presentation transcript:

Fast Flux Hosting and DNS ICANN SSAC

What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of web sites used for illegal purposes Technique –Host illegal content at many web sites –Send phishing with links to web site's domain name –Rapidly change the locations of the web site so that no one site is used long enough to isolate and shut down

e-version of age-old scam 3 card monte, a classic street corner scam Bet on which card is the Ace of Diamonds! In basic fast flux attacks, the web site is the Ace of Diamonds

Eluding the beat cop In the brick-and-mortar world, 3 card Monte is run on a street corner Lookouts warn the scam artist when the beat cop is approaching The scam artist packs up his game and moved to another corner In the e-world, scammers alter the DNS to "change corners" –This is called Name Server Fluxing –Double flux combines basic and name server fluxing

Variations on a theme… Basic fast flux hosting –IP addresses of illegal web sites are fluxed Name Server (NS) fluxing –IP addresses of DNS name servers are fluxed Double flux –IP addresses of web sites and name servers are fluxed

bot herder "leases" botnet to "customer" 2 bot herder infects hosts, gathers herd into botnet 1 Customer "acquires" phishing kit from malware author 3 Via a registrar, customer registers nameserverservicenetwork.tld and boguswebsitesexample.tld 4 5 Via a registrar, customer fluxes NS records for nameserverservicenetwork.tld to TLD zone file with $TTL 180 Customer spams phishing to lure victims to bogus web site 8 STEPS 5-7 repeat as TTLs expire… Anatomy of an attack 6 Customer uses C&C to load zone file onto selected bots; flux host A records for boguswebsitesexample.tld have $TTL 180 Customer uses botnet C&C channel to load bogus web site onto hosts identified in the zone file for boguswebsitesexample.tld 7

Mitigation Alternatives 1.Shut down the bots (botnets) that host fast flux 2.Shut down the fast flux hosts 3.Remove domains used in fast flux hosting from service

Bots number in the 100,000s or 1Ms Current mitigation techniques –Anti-malware on desktops and at gateways –Education and awareness –Current efforts not close to stemming the tide Possible additional techniques include –Process and executable white listing –Network access/admission controls for private networks and public Internet service –Inclusion of bot detection in “unified threat management” security Can we shut down the bots?

Can we shut down fast flux hosts? Today, –Responders and law enforcement collect information (and obtain court orders) to shut down fast flux hosts –The shut down process operates at a real world pace –Fast flux is designed to thwart these activities –Fast flux hosts remain operational well beyond the average illegal site lifetime of 4 days Possible additional measures –Accelerated domain name suspension procedures –Information sharing among responders, CERTS, LEAs –Accredited list of responders, acknowledged by registrars and registries

Can we remove domains used in fast flux hosting from service? Some domains are easier to delete than others –Obscure strings, WHOIS inaccuracies, rapidly changing TTLs, … Other domains are HARD to take down –Illegal sites hosted on legitimate but compromised servers on bulletproof hosts where other "safe harbor" conditions are available Overly simplistic detection methods may result in false positives

Additional practices we can consider Practiced today (but not uniformly) –Authenticate contacts before allowing NS record changes –Rate-limit NS record changes –Detect and block automated NS record changes –Enforce a minimum TTL (e.g., 30 minutes) Whitelist or exception handling for registrants with legitimate uses –Abuse monitoring systems to report excessive DNS configuration changes Domain name quarantining (and honeypotting) –Prohibit use of domains and hosting services to abet illegal activities Universal Terms of Service agreements –Resolve suspended domains to antiphishing education page

Who is "we"? More than SSAC, more than ICANN SSAC's role –Publish its findings –Share information with antiphishing and anticrime groups –Make recommendations to the ICANN Board ICANN –work with registries and registrars on aspects of domain name registration and DNS that abet double flux in matters of policy and common/best practices Constituencies and communities –Education and outreach to ISPs, broadband Internet users, businesses

SSAC Findings Fast flux hosting exploits domain name resolution and registration services to abet illegal activities Fast flux hosting hampers current methods to detect and shut down illegal web sites Current methods to thwart fast flux hosting by detecting and dismantling botnets are not effective Frequent modifications to NS records and short TTLs in NS A records in TLD zone files can be monitored to identify possible abuse Effective countermeasures against fast flux include enforcing a minimum TTL > 30 minutes and blocking, rate-limiting, and monitoring to detect automated changes to DNS info