SlideShare a Scribd company logo
1 of 27
Download to read offline
1© 2014 Architelos and/or its affiliates. All rights reserved.
Reality Check: Domain Name
Abuse
Alexa Raad, CEO
Architelos
www.architelos.com
Feb 12, 2015
Singapore Feb 2015 GAC Meeting
2© 2014 Architelos and/or its affiliates. All rights reserved.
Agenda
•  Definition
•  Abuse Primer
•  Best Practices
•  Key Components
© 2014 Architelos and/or its affiliates. All rights reserved. 3
Abuse = Exploiting Internet Users
• Purposes that are deceptive, malicious
• Categories are not mutually exclusive
© 2014 Architelos and/or its affiliates. All rights reserved. 4
Relationship
© 2014 Architelos and/or its affiliates. All rights reserved. 5
About Spam…
•  Unsolicited email
•  The problem: domains advertised in spam
•  Spam is the distribution/delivery mechanism for phishing,
malware, fraud, identity theft, etc.
•  85% of all email sent in the world is spam*. Most of it is not
just harmless advertising, it’s part of illegal and/or illicit
activities.
* M3AAWG statistics; also http://www.senderbase.org/static/spam/
© 2014 Architelos and/or its affiliates. All rights reserved. 6
Example Spam Email - Jan 17, 2015
Hello,
Dear [redacted]
To get back into your account, you'll need to confirm your account . It's easy: Click the link
below to open a secure browser window. Confirm that you're the owner of the account and
then follow the instructions.
By Clicking Here
[hxxp://www.amazoon.company/seller/index/web/index.php?
cmd=5885d80a13c0db1f22d2300ef60a67593b79a4d03747447e6b625328d36121a1f9e08eb
1299421ca1639745433caa407f9e08eb1299421ca1639745433caa407]
Or contact paypal Member Services Team. We're available 24 hours a day, 7 days a week. If
you have recently updated your billing information, please disregard this message as we are
processing the changes you have made
© 2014 Architelos and/or its affiliates. All rights reserved. 7
..for Phishing Attack
© 2014 Architelos and/or its affiliates. All rights reserved. 8
Factors that Allow Abuse to Succeed
Low price
Economic incentive
Lax registration policies
Lack of enforcement, or…
lax and/or inconsistent enforcement
9© 2014 Architelos and/or its affiliates. All rights reserved.
ABUSE PRIMER
© 2014 Architelos and/or its affiliates. All rights reserved. 10
1.  “Not all abuse is created equal” – Some are
more dangerous than others
ex: Spear phishing attack on Sony
© 2014 Architelos and/or its affiliates. All rights reserved. 11
2.  Abuse can morph over time
Time
Severity
© 2014 Architelos and/or its affiliates. All rights reserved. 12
3.  They all start with a domain name
registration
© 2014 Architelos and/or its affiliates. All rights reserved. 13
4.  Different TLDs have different profiles
• Different business models
• Open vs. eligibility criteria restrictions vs. .brand/closed
• Price
• Distribution model
= Different risks
© 2014 Architelos and/or its affiliates. All rights reserved. 14
5.  Existence/prevalence of abusive domains
in a TLD does not necessarily indicate
mismanagement by the Registry
What matters in effective and consistent mitigation to
reduce “time to harm”
Ignoring abuse over time, and letting it flourish, is
mismanagement.
© 2014 Architelos and/or its affiliates. All rights reserved. 15
6.  Abuse patterns for a TLD varies over time
Abuse patterns vary to find exposures in policies and operations.
Day to day pattern Month by month
© 2014 Architelos and/or its affiliates. All rights reserved. 16
7.  Virtually every TLD has at least some
abuse
By the end of 2014, new gTLDs had 1/4th the levels of
abuse found in established gTLDs
Almost every ccTLD and legacy gTLD has some abuse.
This is a consequence of usage, and it is inevitable.
© 2014 Architelos and/or its affiliates. All rights reserved. 17
8.  Effective abuse mitigation is also good for
business
Abuse à reputation of the TLD, which in turn affects:
•  Use (ex: applications can block the TLD altogether)
•  New registrations (adoption by legitimate registrants)
•  Renewals
© 2014 Architelos and/or its affiliates. All rights reserved. 18
9.  Effective mitigation is about reducing “time
to harm”
IP Address
Domain Name
Website
email
Internet Browser
Device(s)
Applications
“Mitigation”
Less Effective
Criminals
More Effective
“Damage
Assessment”
© 2014 Architelos and/or its affiliates. All rights reserved. 19
Best Practices
•  Align operational procedures and processes to support policy
Consistency (same bad behavior should consistently result in same enforcement)
Measure, learn over time, and adjust
•  Understand what's happening in the domain space
Continuous monitoring (and not periodic technical analysis)
Use multiple data sources to get the complete picture
•  Analyze and prioritize
Mitigate most egregious domain abuses
Look for correlation and relationships to idenitfy problem spots
Ex: abusive domain names à problem registrars
•  Focus on reducing time to “Time to Harm”
How long the abusive domain is active and therefore able to cause harm. Most damage is
done within first two hours in a phishing attack
© 2014 Architelos and/or its affiliates. All rights reserved. 20
Putting Best Practices to Work
•  Well designed procedures, processes and workflows
•  Abuse data detection
•  Analysis & prioritization
•  Notification & communication
•  Enforcement
(Ex: suspension, takedown, deletion etc.)
•  Documentation (record keeping)
•  Measurement
Effectiveness? Accuracy?
•  Complaint & redress
© 2014 Architelos and/or its affiliates. All rights reserved. 21
Processes
(e.g. regular and exception work flows)
Procedures
(ex: Whois validation, Abuse verification,
Escalation, Registrar notification, Suspension
or takedown, Documentation)
Policies
(Abuse Policy, Registration
Policy, Acceptable Use, etc)
Principles
(Security/Safety,
Privacy, Transparency,
Accountability, Fairness,
Redress, Consistency)
Procedures are a set of
operational actions which
support one or more
policies.
•  Consistently applied
•  Contradictory
•  Nullify other procedures
•  Nullify other policies
Each procedure may have multiple processes to help
achieve the objective. Ex: Escalation procedure may
have various processes (i.e. IF X exists, then do…Y, If
X does not exist then proceed to Z). Processes are
defined in terms of workflows.
A Complete
Abuse Mitigation
System
© 2014 Architelos and/or its affiliates. All rights reserved. 22
Abuse data detection
•  Choose reputable data which report on one or more abuse types
At a minimum, look for data feeds and sources that cover spam, phishing,
malware, botnets
Some data sources are specialists in an abuse type
No one vendor will catch all the abuse
•  Data should have:
Validation mechanisms in place so as to eliminate or minimize false
positives
Mechanisms to remove resolved abuse from their lists
•  Multiple Data Sources: Reporting the same abuses independently
adds confidence
•  Some invoke actions from third-parties, such as law enforcement
© 2014 Architelos and/or its affiliates. All rights reserved. 23
For it to work, at a minimum you need to assume:
•  Spam=Phishing=Malware=Botnet
•  No correlation or commonality between abuse types
•  Abuse patterns stay the same over time
•  Abuse follows a Normal Distribution curve
Or simply put, depending on when you sample you can get widely different
results
Monitoring versus Sampling
© 2014 Architelos and/or its affiliates. All rights reserved. 24
Analysis and Prioritization
•  Different abuse types have different urgency:
•  Some may need to be taken down immediately
•  Some have different notification paths
•  Verifying Abuse
•  Verification is Data vendor work ideally, Registries and Registrars
are not specialists and it’s not cost effective for most entities to
have in-house specialists
•  False positives undermine confidence, but in good quality data
providers, they are extremely rare.
•  Some forms of abuse legally have to be verified or handled with
third parties, such as child pornography
© 2014 Architelos and/or its affiliates. All rights reserved. 25
DATA
Information
(=Data + Data +Data)
Knowledge
(=info+ info + info)
How they Fit
Wisdom
Registrar data
Malware
Mitigation, Enforcement
Reputation
Correlation & Relationships
Context
Analysis
Prioritization
Detection
© 2014 Architelos and/or its affiliates. All rights reserved. 26
Is the Cost Prohibitive?
•  It's good for business
•  Responsible new gTLD registries planned for this,
because:
• Had to describe anti-abuse plans and costs in their applications.
• Included in Registry contract
•  Options are: “Do-it-Yourself” or outsource
• For a medium-sized registry: usually one person part-time
• Outsourced Abuse Desk consulting
• Basic commercial detection services are available for ~ US$250 -
$400/month*
* Domain Assured and NameSentry
© 2014 Architelos and/or its affiliates. All rights reserved. 27
Thank you!
Questions?

More Related Content

What's hot

What's hot (17)

Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
File000168
File000168File000168
File000168
 
Ht t17
Ht t17Ht t17
Ht t17
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
File000166
File000166File000166
File000166
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
File000164
File000164File000164
File000164
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breach
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
 

Viewers also liked

Andrew Hewertson - Visual CV 2010
Andrew Hewertson - Visual CV 2010Andrew Hewertson - Visual CV 2010
Andrew Hewertson - Visual CV 2010
andrewhewertson
 

Viewers also liked (14)

Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...
Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...
Uncover Hidden Secrets Of T Sql Scripts With Microsoft Sql Server Management ...
 
Archstones property solutions
Archstones property solutionsArchstones property solutions
Archstones property solutions
 
Ccaption help
Ccaption helpCcaption help
Ccaption help
 
Fonttable help
Fonttable helpFonttable help
Fonttable help
 
Evento baby lesly michelle
Evento baby lesly michelleEvento baby lesly michelle
Evento baby lesly michelle
 
Trabajos para mamá
Trabajos para mamáTrabajos para mamá
Trabajos para mamá
 
Santi sadan man group bandra_archstones property solutions_asps_bhavik_bhatt
Santi sadan man group bandra_archstones property solutions_asps_bhavik_bhattSanti sadan man group bandra_archstones property solutions_asps_bhavik_bhatt
Santi sadan man group bandra_archstones property solutions_asps_bhavik_bhatt
 
SERTIFIKAT HSE CEPAT
SERTIFIKAT HSE CEPATSERTIFIKAT HSE CEPAT
SERTIFIKAT HSE CEPAT
 
Announcements 12.20.15
Announcements 12.20.15Announcements 12.20.15
Announcements 12.20.15
 
Andrew Hewertson - Visual CV 2010
Andrew Hewertson - Visual CV 2010Andrew Hewertson - Visual CV 2010
Andrew Hewertson - Visual CV 2010
 
Cali poem!new2
Cali poem!new2Cali poem!new2
Cali poem!new2
 
The Revelation of Jesus Christ Chapters 1-3
The Revelation of Jesus Christ Chapters 1-3The Revelation of Jesus Christ Chapters 1-3
The Revelation of Jesus Christ Chapters 1-3
 
Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)
Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)
Komplexithoden - Keynote by Niels Pflaeging at GPM Region Münster (Münster/D)
 
Volvo and Geely
Volvo and GeelyVolvo and Geely
Volvo and Geely
 

Similar to Architelos gac domain abuse best practices feb 12

Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
Lancope, Inc.
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
FraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
Dale White
 

Similar to Architelos gac domain abuse best practices feb 12 (20)

Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
#FIRMday Manchester - 15 Oct 2015 - Best practice in people screening programmes
 
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
#FIRMDAY 15th October 2015 Manchester - Best practice in people screening pro...
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
 
Presentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due DiligencePresentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due Diligence
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 

More from DNS Entrepreneurship Center

More from DNS Entrepreneurship Center (20)

Inta useof tmsindomainnamespresentation
Inta useof tmsindomainnamespresentationInta useof tmsindomainnamespresentation
Inta useof tmsindomainnamespresentation
 
Final udrp webinar slidesv4
Final udrp webinar slidesv4Final udrp webinar slidesv4
Final udrp webinar slidesv4
 
Dot tba financial plans
Dot tba financial plansDot tba financial plans
Dot tba financial plans
 
Domainnamesandtrademarkslegalissuesclarkewaltonppt2588
Domainnamesandtrademarkslegalissuesclarkewaltonppt2588Domainnamesandtrademarkslegalissuesclarkewaltonppt2588
Domainnamesandtrademarkslegalissuesclarkewaltonppt2588
 
Centr presentation v4
Centr presentation v4Centr presentation v4
Centr presentation v4
 
2013 july gac webinar for tom
2013 july gac webinar for tom2013 july gac webinar for tom
2013 july gac webinar for tom
 
Radix marketing final
Radix marketing finalRadix marketing final
Radix marketing final
 
Promotion & sales guide 071114 club
Promotion & sales guide 071114 clubPromotion & sales guide 071114 club
Promotion & sales guide 071114 club
 
Mktgplan dot tld_tmsunrise
Mktgplan dot tld_tmsunriseMktgplan dot tld_tmsunrise
Mktgplan dot tld_tmsunrise
 
Marketing plan 2015 public me
Marketing plan 2015 public  meMarketing plan 2015 public  me
Marketing plan 2015 public me
 
4psofmarketing nowata-130731093251-phpapp01
4psofmarketing nowata-130731093251-phpapp014psofmarketing nowata-130731093251-phpapp01
4psofmarketing nowata-130731093251-phpapp01
 
13. managed dns for registrars product overview and opportunity outline - f...
13. managed dns for registrars   product overview and opportunity outline - f...13. managed dns for registrars   product overview and opportunity outline - f...
13. managed dns for registrars product overview and opportunity outline - f...
 
11. open srs sales_material
11. open srs sales_material11. open srs sales_material
11. open srs sales_material
 
10. tmch prelaunch webinar_presentation
10. tmch prelaunch webinar_presentation10. tmch prelaunch webinar_presentation
10. tmch prelaunch webinar_presentation
 
9. tmch presentation
9. tmch presentation9. tmch presentation
9. tmch presentation
 
5. icann registrar accreditation
5. icann registrar accreditation5. icann registrar accreditation
5. icann registrar accreditation
 
11. tlds coexisting-in-new-environment
11. tlds coexisting-in-new-environment11. tlds coexisting-in-new-environment
11. tlds coexisting-in-new-environment
 
9. ries trout-brand-positioning-1231961903820264-3
9. ries trout-brand-positioning-1231961903820264-39. ries trout-brand-positioning-1231961903820264-3
9. ries trout-brand-positioning-1231961903820264-3
 
8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...
8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...
8. azcibusinessplandevelopment pullingitalltogether2-2013final-130221112000-p...
 
6. timeline infographic 01
6. timeline infographic 016. timeline infographic 01
6. timeline infographic 01
 

Recently uploaded

6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 

Recently uploaded (20)

Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 

Architelos gac domain abuse best practices feb 12

  • 1. 1© 2014 Architelos and/or its affiliates. All rights reserved. Reality Check: Domain Name Abuse Alexa Raad, CEO Architelos www.architelos.com Feb 12, 2015 Singapore Feb 2015 GAC Meeting
  • 2. 2© 2014 Architelos and/or its affiliates. All rights reserved. Agenda •  Definition •  Abuse Primer •  Best Practices •  Key Components
  • 3. © 2014 Architelos and/or its affiliates. All rights reserved. 3 Abuse = Exploiting Internet Users • Purposes that are deceptive, malicious • Categories are not mutually exclusive
  • 4. © 2014 Architelos and/or its affiliates. All rights reserved. 4 Relationship
  • 5. © 2014 Architelos and/or its affiliates. All rights reserved. 5 About Spam… •  Unsolicited email •  The problem: domains advertised in spam •  Spam is the distribution/delivery mechanism for phishing, malware, fraud, identity theft, etc. •  85% of all email sent in the world is spam*. Most of it is not just harmless advertising, it’s part of illegal and/or illicit activities. * M3AAWG statistics; also http://www.senderbase.org/static/spam/
  • 6. © 2014 Architelos and/or its affiliates. All rights reserved. 6 Example Spam Email - Jan 17, 2015 Hello, Dear [redacted] To get back into your account, you'll need to confirm your account . It's easy: Click the link below to open a secure browser window. Confirm that you're the owner of the account and then follow the instructions. By Clicking Here [hxxp://www.amazoon.company/seller/index/web/index.php? cmd=5885d80a13c0db1f22d2300ef60a67593b79a4d03747447e6b625328d36121a1f9e08eb 1299421ca1639745433caa407f9e08eb1299421ca1639745433caa407] Or contact paypal Member Services Team. We're available 24 hours a day, 7 days a week. If you have recently updated your billing information, please disregard this message as we are processing the changes you have made
  • 7. © 2014 Architelos and/or its affiliates. All rights reserved. 7 ..for Phishing Attack
  • 8. © 2014 Architelos and/or its affiliates. All rights reserved. 8 Factors that Allow Abuse to Succeed Low price Economic incentive Lax registration policies Lack of enforcement, or… lax and/or inconsistent enforcement
  • 9. 9© 2014 Architelos and/or its affiliates. All rights reserved. ABUSE PRIMER
  • 10. © 2014 Architelos and/or its affiliates. All rights reserved. 10 1.  “Not all abuse is created equal” – Some are more dangerous than others ex: Spear phishing attack on Sony
  • 11. © 2014 Architelos and/or its affiliates. All rights reserved. 11 2.  Abuse can morph over time Time Severity
  • 12. © 2014 Architelos and/or its affiliates. All rights reserved. 12 3.  They all start with a domain name registration
  • 13. © 2014 Architelos and/or its affiliates. All rights reserved. 13 4.  Different TLDs have different profiles • Different business models • Open vs. eligibility criteria restrictions vs. .brand/closed • Price • Distribution model = Different risks
  • 14. © 2014 Architelos and/or its affiliates. All rights reserved. 14 5.  Existence/prevalence of abusive domains in a TLD does not necessarily indicate mismanagement by the Registry What matters in effective and consistent mitigation to reduce “time to harm” Ignoring abuse over time, and letting it flourish, is mismanagement.
  • 15. © 2014 Architelos and/or its affiliates. All rights reserved. 15 6.  Abuse patterns for a TLD varies over time Abuse patterns vary to find exposures in policies and operations. Day to day pattern Month by month
  • 16. © 2014 Architelos and/or its affiliates. All rights reserved. 16 7.  Virtually every TLD has at least some abuse By the end of 2014, new gTLDs had 1/4th the levels of abuse found in established gTLDs Almost every ccTLD and legacy gTLD has some abuse. This is a consequence of usage, and it is inevitable.
  • 17. © 2014 Architelos and/or its affiliates. All rights reserved. 17 8.  Effective abuse mitigation is also good for business Abuse à reputation of the TLD, which in turn affects: •  Use (ex: applications can block the TLD altogether) •  New registrations (adoption by legitimate registrants) •  Renewals
  • 18. © 2014 Architelos and/or its affiliates. All rights reserved. 18 9.  Effective mitigation is about reducing “time to harm” IP Address Domain Name Website email Internet Browser Device(s) Applications “Mitigation” Less Effective Criminals More Effective “Damage Assessment”
  • 19. © 2014 Architelos and/or its affiliates. All rights reserved. 19 Best Practices •  Align operational procedures and processes to support policy Consistency (same bad behavior should consistently result in same enforcement) Measure, learn over time, and adjust •  Understand what's happening in the domain space Continuous monitoring (and not periodic technical analysis) Use multiple data sources to get the complete picture •  Analyze and prioritize Mitigate most egregious domain abuses Look for correlation and relationships to idenitfy problem spots Ex: abusive domain names à problem registrars •  Focus on reducing time to “Time to Harm” How long the abusive domain is active and therefore able to cause harm. Most damage is done within first two hours in a phishing attack
  • 20. © 2014 Architelos and/or its affiliates. All rights reserved. 20 Putting Best Practices to Work •  Well designed procedures, processes and workflows •  Abuse data detection •  Analysis & prioritization •  Notification & communication •  Enforcement (Ex: suspension, takedown, deletion etc.) •  Documentation (record keeping) •  Measurement Effectiveness? Accuracy? •  Complaint & redress
  • 21. © 2014 Architelos and/or its affiliates. All rights reserved. 21 Processes (e.g. regular and exception work flows) Procedures (ex: Whois validation, Abuse verification, Escalation, Registrar notification, Suspension or takedown, Documentation) Policies (Abuse Policy, Registration Policy, Acceptable Use, etc) Principles (Security/Safety, Privacy, Transparency, Accountability, Fairness, Redress, Consistency) Procedures are a set of operational actions which support one or more policies. •  Consistently applied •  Contradictory •  Nullify other procedures •  Nullify other policies Each procedure may have multiple processes to help achieve the objective. Ex: Escalation procedure may have various processes (i.e. IF X exists, then do…Y, If X does not exist then proceed to Z). Processes are defined in terms of workflows. A Complete Abuse Mitigation System
  • 22. © 2014 Architelos and/or its affiliates. All rights reserved. 22 Abuse data detection •  Choose reputable data which report on one or more abuse types At a minimum, look for data feeds and sources that cover spam, phishing, malware, botnets Some data sources are specialists in an abuse type No one vendor will catch all the abuse •  Data should have: Validation mechanisms in place so as to eliminate or minimize false positives Mechanisms to remove resolved abuse from their lists •  Multiple Data Sources: Reporting the same abuses independently adds confidence •  Some invoke actions from third-parties, such as law enforcement
  • 23. © 2014 Architelos and/or its affiliates. All rights reserved. 23 For it to work, at a minimum you need to assume: •  Spam=Phishing=Malware=Botnet •  No correlation or commonality between abuse types •  Abuse patterns stay the same over time •  Abuse follows a Normal Distribution curve Or simply put, depending on when you sample you can get widely different results Monitoring versus Sampling
  • 24. © 2014 Architelos and/or its affiliates. All rights reserved. 24 Analysis and Prioritization •  Different abuse types have different urgency: •  Some may need to be taken down immediately •  Some have different notification paths •  Verifying Abuse •  Verification is Data vendor work ideally, Registries and Registrars are not specialists and it’s not cost effective for most entities to have in-house specialists •  False positives undermine confidence, but in good quality data providers, they are extremely rare. •  Some forms of abuse legally have to be verified or handled with third parties, such as child pornography
  • 25. © 2014 Architelos and/or its affiliates. All rights reserved. 25 DATA Information (=Data + Data +Data) Knowledge (=info+ info + info) How they Fit Wisdom Registrar data Malware Mitigation, Enforcement Reputation Correlation & Relationships Context Analysis Prioritization Detection
  • 26. © 2014 Architelos and/or its affiliates. All rights reserved. 26 Is the Cost Prohibitive? •  It's good for business •  Responsible new gTLD registries planned for this, because: • Had to describe anti-abuse plans and costs in their applications. • Included in Registry contract •  Options are: “Do-it-Yourself” or outsource • For a medium-sized registry: usually one person part-time • Outsourced Abuse Desk consulting • Basic commercial detection services are available for ~ US$250 - $400/month* * Domain Assured and NameSentry
  • 27. © 2014 Architelos and/or its affiliates. All rights reserved. 27 Thank you! Questions?