reputational dns
play

Reputational DNS with an Introduction to DNS Response Policy Zones - PowerPoint PPT Presentation

Reputational DNS with an Introduction to DNS Response Policy Zones Joo Damas, ISC Background l Concept of DNS reputation isn't new l Used today in virtually all email (SMTP) servers to curtail spam l Some Recursive DNS providers do


  1. Reputational DNS with an Introduction to DNS Response Policy Zones João Damas, ISC

  2. Background l Concept of DNS reputation isn't new l Used today in virtually all email (SMTP) servers to curtail spam l Some Recursive DNS providers do it today l What is new l Response Policy Zones announced by ISC in late July - A common framework for DNS reputation l A blog post by Paul Vixie to facilitate awareness and debate http://www.circleid.com/posts/20100728_taking_back_the_dns/

  3. What is RPZ l DNS policy information inside a specially constructed DNS zone l Enables producers of domain name reputation data and consumers to cooperate in the application of such policy to real time DNS responses l It turns a recursive DNS server into a powerful security tool!

  4. Example Uses of DNS RPZ • Block or redirect malicious sites • Block ability of bots to find the Command&Control • Walled garden treatment for infected clients • IP address reputation can also map into here

  5. Pro Perspective l Modern malware is agile and sophisticated but … traditional defences are not l Based on signatures l Lag time between zero-day of exploit and the deployment of an AV update (if there is one) l There are roadblocks for domain take downs at the domain authorities l Inability of Registries to act or react quickly - Due to policy, resources, risk of liability l Reluctance of Registrars to act or react quickly - Due to risk of liability, resources, loss of revenue

  6. Pro Perspective l RPZ provides a fast, effective and scalable solution for remediation l DNS is ubiquitous – no need for a new system l Puts domain reputation in the hands of the security experts l Buys time for AV companies to update their software l Minimizes spread of infections l Can block would-be fly-by infections l Can inform victims (bots) of their infection while rendering the botnet beign

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend