SlideShare a Scribd company logo
1 of 15
#Because detection is cool, but prevent is better!
•What’s CleanDNS?
•Why CleanDNS?
•How CleanDNS works?
•Future of CleanDNS
 Computer viruses are not different from
Biology viruses.To occurs any infection two
principal components are needed:
 A vulnerable “body”:
▪ Low detection rates for that virus or even a weak
immunization system.
 A vector:
▪ Point of entry for that virus to “body”.
 There are many other tools aiming to get a
higher immunization rates or to prevent virus
to enter “body”.
 CleanDNS aims to prevent the first phase of
virus journey to infect a “body”.
 A DNS request/response transaction.
 Why DNS?
 Three major considerations:
▪ Any advanced malware or botnets writer using direct IP
address to callback should be slapped at face.Will be
caught or will be deactivated in a hurry.
▪ DNS is the heart of Internet Protocol (old but gold), any
single request to other protocol (HTTP, SMTP, FTP, SIP,
whatever) will trigger a DNS request first.
▪ Different from others protocols, DNS still is a clean
traffic, nor encrypted or even encoded. (Keep it simple).
 CleanDNS is a DNS Recursive Front-End
technology to prevent DNS malformed or
known malicious request/responses.
 CleanDNS will protect ALLYOUR End Users
and Servers at once with a single DNS
topology rearrangement.
 Spear-PhishingCampaignsTargeting Employees Increased 55 Percent in 2015.
 (Symantec ISTR Report 2015);
 Major SecurityVulnerabilities inThree Quarters of PopularWebsites Put Us All at
Risk.
 (Symantec ISTR Report 2015);
 Ransomware Increased 35 Percent in 2015.
 (Symantec ISTR Report 2015);
 Symantec Blocked 100 Million FakeTechnical Support Scams in 2015.
 (Symantec ISTR Report 2015);
 44% of Information SecurityOfficers consider Phishing as one of majors threats.
 (Ernst &Young Global Research for Information Security – 2015)
 43% of Information Security Officers consider Malware as one of majors threats.
 (Ernst &Young Global Research for Information Security – 2015)
 Do you have IoT antivirus right?
 The volume of Android variants increased by 40
percent in 2015, compared with 29 percent growth in
the previous year.
▪ (Symantec ISTR Report 2015);
 SmartTVs. Hundreds of millions of Internet-
connected TVs are potentially vulnerable to click
fraud, botnets, data theft, and even ransomware,
according to Symantec research.
▪ (Symantec ISTR Report 2015);
 Online advertising (+5% / year) and Mobile
advertising (+60% /year) are growing.
 (KPCB InternetTrends 2016)
 E-Commerce retail sales rates are growing
(+10% of total US retail sales 2015)
 (KPCB InternetTrends 2016)
 By 2020 we will have 20.8 billion internet
connected devices.
 (Symantec ISTR Report 2015);
 OK… Now we are talking about!
 CleanDNS has three Main Security Layers:
 1 – A DNSTraffic INLINE Network IPS;
 2 – A DNS Multisource Malware Domain Sinkhole;
 3 – A Secure DNS Service Last Resource;
 DNSTraffic INLINE Network IPS;
 Protect CleanDNS DNS Service itself;
 Prevent malformed DNS traffic:
▪ LowerTTLs requests;
▪ DNS Floods;
▪ DNS Poisons;
 Prevent DNSTunneling;
 DNS Multisource Malware Domain Sinkhole:
 Download and De-duplicate Malware related and
other malicious activities related domain names:
▪ Open Projects:
▪ Malware Domain Blocklist;
▪ RansomwareTracer;
▪ ZeusTracker;
▪ Malware Domain List;
▪ Url Blacklist;
▪ Commercial (Maybe they can support this Project:
▪ Trend Micro;
▪ Symantec;
▪ McAfee;
 A Secure DNS Service Last Resource:
 CleanDNS uses OpenDNS servers as last resource
to prevent traffic not yet recognized by first two
layers;
 We expect to be part of any Security
Professional strategy as a Simple yet
Powerful concept to prevent malware and
other malicious activities.
#Because detection is cool, but prevent is better!
#Because detection is cool, but prevent is better!
• Project Page: https://www.facebook.com/cleandns
• Download: https://cleandns.sourceforge.net

More Related Content

What's hot

3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!NormShield, Inc.
 
StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware Lancope, Inc.
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the UnionDavid Perkins
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacTicTac Data Recovery
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive PresentationNormShield, Inc.
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JSFestUA
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?Radware
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextThe Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextPriyanka Aash
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionDavid Perkins
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorDavid Perkins
 
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th..."Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...PROIDEA
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarAdelaide Hill
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...PROIDEA
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 

What's hot (20)

Think Like a Hacker
Think Like a HackerThink Like a Hacker
Think Like a Hacker
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
 
StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by Tictac
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextThe Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
 
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th..."Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 

Similar to CleanDNS_enUS

The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machinePriyanka Aash
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityCyphort
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersBlueliv
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
rovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxrovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxacarolyn
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringLancope, Inc.
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Annie-Marie Page
 

Similar to CleanDNS_enUS (20)

The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machine
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
NetWitness
NetWitnessNetWitness
NetWitness
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Web Security.pptx
Web Security.pptxWeb Security.pptx
Web Security.pptx
 
Cloud security
Cloud securityCloud security
Cloud security
 
rovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxrovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docx
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2
 

CleanDNS_enUS

  • 1. #Because detection is cool, but prevent is better!
  • 2. •What’s CleanDNS? •Why CleanDNS? •How CleanDNS works? •Future of CleanDNS
  • 3.  Computer viruses are not different from Biology viruses.To occurs any infection two principal components are needed:  A vulnerable “body”: ▪ Low detection rates for that virus or even a weak immunization system.  A vector: ▪ Point of entry for that virus to “body”.
  • 4.  There are many other tools aiming to get a higher immunization rates or to prevent virus to enter “body”.  CleanDNS aims to prevent the first phase of virus journey to infect a “body”.  A DNS request/response transaction.
  • 5.  Why DNS?  Three major considerations: ▪ Any advanced malware or botnets writer using direct IP address to callback should be slapped at face.Will be caught or will be deactivated in a hurry. ▪ DNS is the heart of Internet Protocol (old but gold), any single request to other protocol (HTTP, SMTP, FTP, SIP, whatever) will trigger a DNS request first. ▪ Different from others protocols, DNS still is a clean traffic, nor encrypted or even encoded. (Keep it simple).
  • 6.  CleanDNS is a DNS Recursive Front-End technology to prevent DNS malformed or known malicious request/responses.  CleanDNS will protect ALLYOUR End Users and Servers at once with a single DNS topology rearrangement.
  • 7.  Spear-PhishingCampaignsTargeting Employees Increased 55 Percent in 2015.  (Symantec ISTR Report 2015);  Major SecurityVulnerabilities inThree Quarters of PopularWebsites Put Us All at Risk.  (Symantec ISTR Report 2015);  Ransomware Increased 35 Percent in 2015.  (Symantec ISTR Report 2015);  Symantec Blocked 100 Million FakeTechnical Support Scams in 2015.  (Symantec ISTR Report 2015);  44% of Information SecurityOfficers consider Phishing as one of majors threats.  (Ernst &Young Global Research for Information Security – 2015)  43% of Information Security Officers consider Malware as one of majors threats.  (Ernst &Young Global Research for Information Security – 2015)
  • 8.  Do you have IoT antivirus right?  The volume of Android variants increased by 40 percent in 2015, compared with 29 percent growth in the previous year. ▪ (Symantec ISTR Report 2015);  SmartTVs. Hundreds of millions of Internet- connected TVs are potentially vulnerable to click fraud, botnets, data theft, and even ransomware, according to Symantec research. ▪ (Symantec ISTR Report 2015);
  • 9.  Online advertising (+5% / year) and Mobile advertising (+60% /year) are growing.  (KPCB InternetTrends 2016)  E-Commerce retail sales rates are growing (+10% of total US retail sales 2015)  (KPCB InternetTrends 2016)  By 2020 we will have 20.8 billion internet connected devices.  (Symantec ISTR Report 2015);
  • 10.  OK… Now we are talking about!  CleanDNS has three Main Security Layers:  1 – A DNSTraffic INLINE Network IPS;  2 – A DNS Multisource Malware Domain Sinkhole;  3 – A Secure DNS Service Last Resource;
  • 11.  DNSTraffic INLINE Network IPS;  Protect CleanDNS DNS Service itself;  Prevent malformed DNS traffic: ▪ LowerTTLs requests; ▪ DNS Floods; ▪ DNS Poisons;  Prevent DNSTunneling;
  • 12.  DNS Multisource Malware Domain Sinkhole:  Download and De-duplicate Malware related and other malicious activities related domain names: ▪ Open Projects: ▪ Malware Domain Blocklist; ▪ RansomwareTracer; ▪ ZeusTracker; ▪ Malware Domain List; ▪ Url Blacklist; ▪ Commercial (Maybe they can support this Project: ▪ Trend Micro; ▪ Symantec; ▪ McAfee;
  • 13.  A Secure DNS Service Last Resource:  CleanDNS uses OpenDNS servers as last resource to prevent traffic not yet recognized by first two layers;
  • 14.  We expect to be part of any Security Professional strategy as a Simple yet Powerful concept to prevent malware and other malicious activities. #Because detection is cool, but prevent is better!
  • 15. #Because detection is cool, but prevent is better! • Project Page: https://www.facebook.com/cleandns • Download: https://cleandns.sourceforge.net