the importance of dns in preventing global cyber attacks
play

The Importance of DNS in Preventing Global Cyber Attacks Ricardo - PowerPoint PPT Presentation

The Importance of DNS in Preventing Global Cyber Attacks Ricardo Rodrigues Effective Internet Security Has Never Been More Important The cost of security incidents has increased, driven by Ransomware $ 20,752 6M 1.6M $8,699 2013 2016


  1. The Importance of DNS in Preventing Global Cyber Attacks Ricardo Rodrigues

  2. Effective Internet Security Has Never Been More Important The cost of security incidents has increased, driven by Ransomware $ 20,752 6M 1.6M $8,699 2013 2016 Average ransomware cost to Average ransomware cost to a Attack queries grew 270 percent a consumer from Fall 2016 to Spring 2017 business Source: Nominum Source: Symantec Source: SBIR 2

  3. Mobile & IoT Devices Are At Risk As IoT Attacks Are on the Rise End-user Devices Remain Unprotected Worldwide Mirai Infections Mirai botnet Source: 360 and Nominum 3

  4. The Dream of the Connected Life 4

  5. IoT: Internet of Things? or… Internet of Threats? 5

  6. Cyber Attack Ladder STAGE Steps Action ATTACK Cyber Attack Ladder C&C Installation INTRUSION Exploitation Delivery Reconnaissance PREPARATION Weaponization 6

  7. Cyber Attacks • BYOD, IoT and botnets bring new challenges – What to do if the attack comes from inside your network? • Block thousands of infected subscribers? – How to mitigate the attack without harm to the subscriber? • It is imperative to block the malicious traffic and allow the good • Is this possible to be proactive? – How to identify infected subscribers? – Is this possible to avoid that infected subscribers generate attacks? • Is this required to change the network architecture? – Or can we have a better usage of the existing elements? 7

  8. DNS and the Security Architecture 8

  9. DNS Can Help at Every Stage of an Attack STAGE How DNS Helps Steps – Block purpose-built DNS Amp domains – Rate-limit dual-use DNS Amp domains Action – Block malicious subdomains (PRSD) ATTACK Cyber Attack Ladder C&C – Block DNS tunneling domains – Block command and control domains – Block phishing domains – Block domains hosting exploit kits Installation – Block malware download domains INTRUSION Exploitation – Redirect & block HTTP paths for compromised websites – Block malware drop sites Delivery – Block domains used to download files for encryption – Monitor or block domains assoc. with criminal infrastructure Reconnaissance – Monitor or block traffic to illegal download sites PREPARATION Weaponization – Block categories of domains frequently serving malware – Identify anomalous DNS request for further investigation 9

  10. Threat Landscape 01

  11. New DNS Domains – every 24 hours 11

  12. Threat Tracker 2016 3X growth 94,000 in queries and domains domains added daily to block list 82 million malicious queries daily (by end of Aug) 12

  13. Threat Tracker 2017 13

  14. Phishing - Time to Block 14

  15. Main Threats Identified 02

  16. Top Threats by Function 16

  17. ATTACK STAGE | Ransomware Attacks Up 270% Fall 2016-Spring 2017 17

  18. ATTACK STAGE | Mirai Across the Globe 18

  19. ATTACK STAGE | Mirai Source Code Right shifts of 3 bits from an 8-bit number means that the result is between 0-31 characters, which corresponds exactly to the 32-character string above. 19

  20. Localization of the Threats 03

  21. C&C – World 21

  22. C&C – USA 1. California 2. Virginia 3. Arizona 4. Texas 5. Florida 22

  23. Hosting of Malware World USA 23

  24. DNS-Based DDoS Deep Dive in 04

  25. 12 Minutes of a PRSD Attack

  26. DNS Amplification

  27. WannaCry: views from 04 the DNS frontline http://www.nominum.com/tech-blog/wannacry-views-dns-frontline

  28. WannaCry Timeline Kill-switch domain: iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com 28

  29. WannaCry: Newly Affected Clients per Minute 29

  30. WannaCry: Top 3 Groups of Infected Subscribers Top 3 groups identified: – Gamers – Teamviewer users – Previously infected subscribers 30

  31. Conclusions High growth of DDoS, BYOD and IoT bring new DNS is key for Prevention botnet and ransomware challenges and Mitigation attacks 31

  32. Final Thoughts • Download Nominum Data Science Security Reports: http://nominum.com/resource/security-report-nn - Spring 2017 http://nominum.com/resource/security-report-home - Fall 2016 • For Thought: – Does your DNS Server always answer the correct answer? – Does the correct answer protects the subscriber? 32

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend