15
Sandeep Discussed at WHP Local Meet Reference: Improved network security with IP & DNS Reputation Services, A Business Whitepaper by HP Tipping Point Solutions

Improving Network Security with IP &DNS Reputation Services

Embed Size (px)

Citation preview

Page 1: Improving Network Security with IP &DNS Reputation Services

Sandeep

Discussed at WHP Local Meet

Reference: Improved network security with IP & DNS Reputation Services, A Business Whitepaper by HP Tipping Point Solutions

Page 2: Improving Network Security with IP &DNS Reputation Services

• Smart Work required by Security Professionalto stay ahead of malicious attacks

• Motivated Hackers using Botnets otherresources for attacks

• Low Risk of Being Caught & Prosecuted

[email protected]

Page 3: Improving Network Security with IP &DNS Reputation Services

Network Traffic Divided into three parts -

Good Traffic: trusted traffic that should pass through thenetwork, unimpeded and uninspected

Bad Traffic: traffic that should be blocked proactivelybefore it can attempt to compromise the network

Ugly Traffic: untrusted traffic that requires deep packetinspection to determine if it is “good” (legitimate) or“bad” (malicious)

[email protected]

Page 4: Improving Network Security with IP &DNS Reputation Services

• Bad Devices can be identified on IP & DNS Addressesand the traffic they spew can be blocked. These Devicesare used as:

Botnet Command and Control (CnC) sites: 5,000 to 6,000 botnet command and control sites

worldwide Botnet CnC servers constantly moving to evade

detection, block efforts from security and network personnel

Techniques used by Botnet Masters to avoid being discovered are as follows: Use of IRC, P2P and HTTP Traffic allows to bypass traditional firewalls and some IPS Security Measures

[email protected]

Page 5: Improving Network Security with IP &DNS Reputation Services

Use of Dynamic Algorithms to select CnC Servers, impossible to be blocked using Firewall ACL’s

Uses both DNS & IP Addresses for identifying CnC Servers

Identifying botnet CnC servers requires detailed botnet analysis and frequent updating of CnC lists.

Malware depots:

2,5002 to 50,0003 devices acting as malware depots or hosting malicious content discovered daily worldwide

[email protected]

Page 6: Improving Network Security with IP &DNS Reputation Services

Malware Depots: Two Types

1. Websites designed to lure victims and then infect their devices

2. Web sites of legitimate businesses that are compromised because they haven’t been properly secured.

Depots used malware drop sites, and for hosting malware software updates

Look up mechanism always DNS Address

[email protected]

Page 7: Improving Network Security with IP &DNS Reputation Services

Malware Depot Identification Process:

1. Monitoring for malware downloads and tracking their origin

2. Evaluating data hosting sites worldwide.

[email protected]

Page 8: Improving Network Security with IP &DNS Reputation Services

Phishing Sites: 50,0004 or more new phishing sites introduced to

the Internet monthly

Tow types of Phishing Sites:

1. Purpose Built sites

2. Sites that appear to be part of a known credible business

[email protected]

Page 9: Improving Network Security with IP &DNS Reputation Services

Compromised Hosts: Most commonly compromised by Bot malware

Stay under the control of a remote botnet master through botnet CnC sites

Compromised host can be used by botnet master to conduct variety of malicious attacks:

Spreading Malware

Compromising additional hosts to create more botnet devices

[email protected]

Page 10: Improving Network Security with IP &DNS Reputation Services

Performing reconnaissance scans

Providing access to local networks for further compromise

Conducting Distributed Denial of Service (DDoS) attacks

Conducting email spam or phishing campaigns

Conducting online-click fraud scams

Compromised host can be used by botnet master to conduct variety of malicious attacks (Contd..) :

[email protected]

Page 11: Improving Network Security with IP &DNS Reputation Services

Determine if a device is “behaving badly”

Block Access to and from Devices that have a known bad reputation

A need of a reputation database with significant metadata on each of these badly behaving devices—identified through IPv4 or IPv6 addresses or DNS names

[email protected]

Page 12: Improving Network Security with IP &DNS Reputation Services

A Security Research Team that can:

Collect large amounts of device data

Correlate these large data sets

Validate the results of the data sets

Provide Frequent Database updates

Assign a reputation score

[email protected]

Page 13: Improving Network Security with IP &DNS Reputation Services

The Research Team must:

Collect real-time attack events with very detailed attack data from a large worldwide community of sensors

Analyze Web traffic and crawl Web sites of interest to collect data on sites hosting malicious content or scams

Conduct careful malware analysis to identify botnet CnC sites, and botnet and malware drop sites

Analyze attacks and scams to identify the devices that are participating in or conducting the attacks

[email protected]

Page 14: Improving Network Security with IP &DNS Reputation Services

Note: The most important component in building a strong

reputation service is the depth of the database. Databasequality depends heavily on the size, scope, and distribution ofthe attack collection sites, and the quality and depth of thecollected attack data

Recommendation: HP Tipping Point IP & DNS Reputation Servicesby HP

Reference: Improved network security with IP and DNS reputation

Business white paper by HP Tipping Point Solutions

[email protected]

Page 15: Improving Network Security with IP &DNS Reputation Services

whitehat ‘People’

About whitehat ‘People’whitehat‘People’ is a an ‘open consortium’ of national intellects delved to security being the sole intent;trained and specialized in the conception of solutions in all areas of our technical consulting services.whitehat‘People’ produces white papers for the industry, present at symposiums, technology andbusiness conferences nationwide, and provide "thought leadership" for next generation technologieswhich are currently being deployed in a rapidly changing and fluid market place. The members includesecurity researchers and consultants who are up-to-date with developments in technology fromhardware and software vendors to ensure they are leading, and not following the market.Whitehat‘People’ adhere to the following ideals:1. "Help government and industry maximize the value of Information security in information technology."2. "Deliver leading-edge information technology and services, support, training and education."3. "Function as a strategic arm for the clients by leveraging new concepts to support strategic goals and conceptual plans."

[email protected]