ithi identifier technology health indicators
play

ITHI: Identifier Technology Health Indicators Defining Metrics - PowerPoint PPT Presentation

ITHI: Identifier Technology Health Indicators Defining Metrics Alain Durand Lacnic 28 / Lacnog 2017 September 2017 ITHI GOAL ITHI: Identifier Technology Health Indicators Track over time a set of indicators that reflect the health


  1. ITHI: Identifier Technology Health Indicators Defining Metrics Alain Durand Lacnic 28 / Lacnog 2017 September 2017

  2. ITHI GOAL ¤ ITHI: Identifier Technology Health Indicators ¤ Track over time a set of indicators that reflect the “health” of the system of identifiers ICANN ¤ The “actual” value of any of those indicators may not as important to us as the trend they are on. ¤ ITHI work will stop at presenting the data and leave it to the community to take any action deemed necessary (e.g. new policy). | 2

  3. ITHI Branches ITHI: 3 branches 2 3 1 Names Numbers Protocol Parameters | 3

  4. ITHI Numbers NRO-Driven Process | 4 | 4

  5. Number Community Participation • The NRO is driving the evaluation of ITHI metrics for the Numbers community. • The RIR registry services have proposed a set of metrics focused on data accuracy. Those metrics are now being reviewed by the RIR community*. • It is expected that this branch of the project will be merged with the overall ITHI initiative at a later point in time. | 5 (*) https://www.nro.net/global-consultation-on-identifier-technical-health-indicators-ithi-project/

  6. ITHI Names | 6 | 6

  7. ITHI: Names ¤ We have identified 5 “Problem Areas”: ¡ DNS Data (In-)Accuracy ¡ DNS Abuse ¡ Overhead in DNS Root Traffic ¡ DNS Leakage ¡ DNS Resolver Misbehavior ¤ Over time, new problem areas could be defined, and/or some could removed. | 7

  8. ITHI Names: Process ¤ For each “Problem Area”, we will put in place a 3-stage pipeline Publication Data Source ITHI Via Analysis Open Data Initiative Processed Data Published Data Raw Data Computed Graphs Published Graphs | 8

  9. Candidate Metric Related to Data (in-)Accuracy M1 Data (In-)Accuracy M1 encompass 2 sub-metrics M1.1 Number of “validated complaints” per million registrations A “validated complaint” is a complaint received by the ICANN compliance department that has been acted on. In other words, this is not an obviously frivolous complaint. M1.2 whois.icann.org/en/whoisars | 9

  10. Candidate Metrics Related to Abuse Number of abuses in M2 the ICANN DAAR* feeds for each TLD M2 encompass 4 sub-metrics M2.1 Spam M2.2 Phishing M2.3 Malware M2.4 Botnet | 10 (*)DAAR: Domain Abuse Activity Reporting: https://www.icann.org/octo-ssr/daar

  11. Candidate Metric Related to Overhead in Root Traffic The overhead to the minimum traffic that would be required in a “best case” M3 scenario where all DNS resolvers were only asking for TLDs that exists and would respect the associated TTLs. M3 encompass 2 sub-metrics M3.1 % of NX domain M3.2 % of queries that should never have been sent (TTL) | 11

  12. Candidate Metric Related to Leakage M4 Leakage M4 encompass a list of “Top-N” strings seen at the root that have not been delegated by ICANN or put on the RFC6761 ”Special Use Names” | 12

  13. Candidate Metric Related to Resolver Misbehavior % of top 10k DNS resolvers interfering with M5 end-user DNS traffic M5 encompass 2 sub-metrics % of top 10k resolvers M5.1 giving falsified answers M5.2 % of top 10k resolvers intercepting port 53 | 13

  14. ITHI Protocol Parameters Scoped to DNS Related Registries | 14 | 14

  15. Candidate Metric Related to DNS Usage DNS M6 Usage M6 encompass 3 sub-metrics M6.1 DNS Protocol Parameter Usage M6.1 encompass the list of parameters and their frequencies plus a list of unregistered parameters (and their frequencies). M6.2 DNSsec signed zones M6.3 TLS usage | 15

  16. Candidate Metric Related to DNS Usage DNS M6 Usage M6 encompass 3 sub-metrics M6.1 DNS Protocol Parameter Usage M6.1 encompass the list of parameters and We need help from DNS recursive their frequencies plus a list of unregistered server operators to parameters (and their frequencies). collect data M6.2 DNSsec signed zones M6.3 TLS usage | 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend