TIDE: Proactive threat detection
Olivier van der Toorn <o.i.vandertoorn@utwente.nl> 2019-06-20
University of Twente, Design and Analysis of Communication Systems
TIDE: Proactive threat detection Introduction Ph.D. student from - - PowerPoint PPT Presentation
2019-06-20 Olivier van der Toorn <o.i.vandertoorn@utwente.nl> University of Twente, Design and Analysis of Communication Systems TIDE: Proactive threat detection Introduction Ph.D. student from the University of Twente System
Olivier van der Toorn <o.i.vandertoorn@utwente.nl> 2019-06-20
University of Twente, Design and Analysis of Communication Systems
(ftp.nl.debian.org/ftp.snt.utwente.nl?)
Contact details tide-project.nl
1
2
3
3
4
4
We want to improve attack detection:
The advantages of an proactive approach are:
5
We want to improve attack detection:
The advantages of an proactive approach are:
5
We want to improve attack detection:
The advantages of an proactive approach are:
5
We want to improve attack detection:
The advantages of an proactive approach are:
5
We want to improve attack detection:
The advantages of an proactive approach are:
5
We want to improve attack detection:
The advantages of an proactive approach are:
5
Three components:
normal?)
6
Three components:
normal?)
6
Three components:
normal?)
6
Three components:
normal?)
6
Use case Does proactive security work? Snowshoe spam domains Yes! DDoS domains Maybe DNS TXT records Maybe Combo-squat domains No
7
Use case Does proactive security work? Snowshoe spam domains Yes! DDoS domains Maybe DNS TXT records Maybe Combo-squat domains No
7
Use case Does proactive security work? Snowshoe spam domains Yes! DDoS domains Maybe DNS TXT records Maybe Combo-squat domains No
7
Use case Does proactive security work? Snowshoe spam domains Yes! DDoS domains Maybe DNS TXT records Maybe Combo-squat domains No
7
Use case Does proactive security work? Snowshoe spam domains Yes! DDoS domains Maybe DNS TXT records Maybe Combo-squat domains No
7
covered domains once every 24 hours
.com, .net, .org, .info, .mobi, .aero, .asia, .name, .biz, .gov + almost 1200 “new” gTLDs (.xxx, .xyz, .amsterdam, .berlin, ...)
.nl, .se, .nu, .ca, .fi, .at, .dk, .ru, .рф, .us, <your ccTLD here?>
8
9
Internet
9
Internet Spam
9
Internet Spam
9
Internet Spam Snowshoe Spam
9
Internet Spam Snowshoe Spam
While snowshoe spammers are hard to detect, but still leave a trace in the DNS.
10
While snowshoe spammers are hard to detect, but still leave a trace in the DNS. Snowshoe spam + SPF
10
While snowshoe spammers are hard to detect, but still leave a trace in the DNS. Snowshoe spam + SPF Many hosts + a DNS record for each host or a long SPF record
10
While snowshoe spammers are hard to detect, but still leave a trace in the DNS. Snowshoe spam + SPF Many hosts + a DNS record for each host or a long SPF record Domain with many records or long SPF records
10
While snowshoe spammers are hard to detect, but still leave a trace in the DNS. Snowshoe spam + SPF Many hosts + a DNS record for each host or a long SPF record Domain with many records or long SPF records Active DNS measurements are a good way to detect snowshoe spam domains.
10
11
OpenINTEL (DNS data source) Machine Learning (processing) Realtime Blackhole List (storage) SURFnet (validation)
37 features
These features are not computed for every domain in OpenINTEL.
12
37 features
These features are not computed for every domain in OpenINTEL.
12
37 features
These features are not computed for every domain in OpenINTEL.
12
37 features
These features are not computed for every domain in OpenINTEL.
12
13
14
OpenINTEL (DNS data source) Machine Learning (processing) Realtime Blackhole List (storage) SURFnet (validation)
20 40 40% 60% 80% 100%
11.2 16.6
Number of A records CDF spam ham 20 40 60 80 100 90% 92% 94% 96% 98% 100%
77.0
Number of MX records CDF spam ham
15
Domain A records MX records (ham) google.com 1 5 (spam) giftiedan.com 61 1 (spam) twirlmore.com 1 253
16
Domain A records MX records (ham) google.com 1 5 (spam) giftiedan.com 61 1 (spam) twirlmore.com 1 253
16
Domain A records MX records (ham) google.com 1 5 (spam) giftiedan.com 61 1 (spam) twirlmore.com 1 253
16
17
17
Δt < 2 days
17
Δt < 2 days
Δt ≥ 2 days
17
Δt < 2 days
Δt ≥ 2 days
17
Δt < 2 days
Δt ≥ 2 days
17
Δt < 2 days
Δt ≥ 2 days
17
Δt < 2 days
Δt ≥ 2 days
18
20 40 60 80 100 120 140 160 180 Detection in advance (days) 1 10 100 1000 10000 Number of detected domains
Δt < 2 days Δt ≥ 2 days
19
20
20
Δt < 2 days
20
Δt ≥ 2 days
20
domain not on existing blacklist yet
20
20
In DDoS attacks the amplification factor is important. Domains crafted for DDoS attacks typically have:
21
In DDoS attacks the amplification factor is important. Domains crafted for DDoS attacks typically have:
21
Possible methodology could be:
TXT record
22
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
500 1000 1500 2000 2500 3000 3500 4000 Estimated ANY size (bytes) Attacks observed A NS SOA TXT
Possible methodology could be:
TXT record
22
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
500 1000 1500 2000 2500 3000 3500 4000 Estimated ANY size (bytes) Attacks observed A NS SOA TXT
Possible methodology could be:
TXT record
22
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
500 1000 1500 2000 2500 3000 3500 4000 Estimated ANY size (bytes) Attacks observed A NS SOA TXT
Possible methodology could be:
TXT record
22
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
500 1000 1500 2000 2500 3000 3500 4000 Estimated ANY size (bytes) Attacks observed A NS SOA TXT
Possible methodology could be:
TXT record
22
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
500 1000 1500 2000 2500 3000 3500 4000 Estimated ANY size (bytes) Attacks observed A NS SOA TXT
Possible methodology could be:
TXT record
22
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
500 1000 1500 2000 2500 3000 3500 4000 Estimated ANY size (bytes) Attacks observed A NS SOA TXT
Possible methodology could be:
TXT record
22
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
500 1000 1500 2000 2500 3000 3500 4000 Estimated ANY size (bytes) Attacks observed A NS SOA TXT
Possible methodology could be:
TXT record
22
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
2 1 5
500 1000 1500 2000 2500 3000 3500 4000 Estimated ANY size (bytes) Attacks observed A NS SOA TXT
23
2015-07 2016-01 2016-07 2017-01 2017-07 2018-01 2018-07
Date
20 M 30 M 40 M 50 M 60 M 70 M 80 M
Number of TXT records
Crypto Coins Email Encoded Miscellaneous Other Patterns Verification
23
2015-07 2016-01 2016-07 2017-01 2017-07 2018-01 2018-07
Date
20 M 30 M 40 M 50 M 60 M 70 M 80 M
Number of TXT records
Crypto Coins Email Encoded Miscellaneous Other Patterns Verification
23
2015-07 2016-01 2016-07 2017-01 2017-07 2018-01 2018-07
Date
20 M 30 M 40 M 50 M 60 M 70 M 80 M
Number of TXT records
Crypto Coins Email Encoded Miscellaneous Other Patterns Verification
One of the hightlights of this ‘other’ category is single character records.
24
One of the hightlights of this ‘other’ category is single character records.
24
One of the hightlights of this ‘other’ category is single character records.
24
One of the hightlights of this ‘other’ category is single character records.
24
25
Are these records useful for threat detection?
26
Many types of squatting domains: Type Example (target: utwente.nl) Typosquatting utwent.nl Combosquatting utwente-login.nl Bitsquatting utwenpe.nl Homograph-Based squatting utvvente.nl
27
We started out by developing a general machine-learning based detection model. Feeding the detection model a list of trademarks worked a lot better! Trademark Number of domains Apple 8751 Paypal 1241 Microsoft 711
28
We started out by developing a general machine-learning based detection model. Feeding the detection model a list of trademarks worked a lot better! Trademark Number of domains Apple 8751 Paypal 1241 Microsoft 711
28
We started out by developing a general machine-learning based detection model. Feeding the detection model a list of trademarks worked a lot better! Trademark Number of domains Apple 8751 Paypal 1241 Microsoft 711
28
However, a larger problem is the life time of a combosquat domain.
29
However, a larger problem is the life time of a combosquat domain.
29
Where it works:
Where it might work:
Where it doesn’t work:
30
Where it works:
Where it might work:
Where it doesn’t work:
30
Where it works:
Where it might work:
Where it doesn’t work:
30
What have we learned from these use cases?
(in our case >1d)
31
What have we learned from these use cases?
(in our case >1d)
31
What have we learned from these use cases?
(in our case >1d)
31
We realize that our solution is not perfect.
32
We realize that our solution is not perfect. We think the “ultimate” solution is to combine passive and active measurements.
32
We think the “ultimate” solution is to combine passive and active measurements. Use proactive threat detection to prime passive approaches.
32
We should move towards proactive threat detection.
Use the early warning from these methods to feed passive detection approaches.
from active measurements
33
We should move towards proactive threat detection.
Use the early warning from these methods to feed passive detection approaches.
from active measurements
33
We should move towards proactive threat detection.
Use the early warning from these methods to feed passive detection approaches.
from active measurements
33
34
Thank you for listening! Any questions?
Contact details tide-project.nl
35