the Presentation

Download Report

Transcript the Presentation

Domain Name System (DNS)
Network Security Asset or Achilles Heel?
1
Arya Barirani, VP Product Marketing / Infoblox
November 2014
| © 2013
2014 Infoblox Inc. All Rights Reserved.
Agenda
• What is DNS and How Does it Work?
• Threat Landscape Trends
• Common Attack Vectors
̶ Anatomy of an attack: DNS Hijacking
̶ Anatomy of an attack: Reflection Attack
̶ Anatomy of an attack: DNS DDoS
• How To Protect Yourself?
• Q&A
2 | © 2013
2014 Infoblox Inc. All Rights Reserved.
What is the Domain Name System (DNS)?
• Address book for all of internet
• Translates “google.com” to 173.194.115.96
• Invented in 1983 by Paul Mokapetris (UC Irvine)
Without DNS, The Internet & Network Communications Would Stop
3 | © 2013
2014 Infoblox Inc. All Rights Reserved.
How Does DNS Work?
WWW.GOOGLE.COM
“That’s in my cache,
it maps to:
173.194.115.96
“Great, now I know how
to get to
www.google.com”
ROOT DNS
SERVER
173.194.115.96
“Great, I’ll put that in
my cache in case I get
another request”
“That domain is not in
my server, I will ask
another DNS Server”
173.194.115.96
“I need directions to
www.google.com”
4 | © 2013
2014 Infoblox Inc. All Rights Reserved.
ISP
DNS SERVER
For Bad Guys, DNS Is a Great Target
DNS is the
cornerstone of the
Internet used by
every business/
Government
DNS is fairly easy
to exploit
Traditional
protection is
ineffective against
evolving threats
DNS Outage = Business Downtime
5 | © 2013
2014 Infoblox Inc. All Rights Reserved.
The Rising Tide of DNS Threats
Are You Prepared?
In the last
year alone
there has been
an increase of
200%
58%
DNS attacks1 DDoS attacks1
28M
Pose a significant threat
to the global network
infrastructure and can
be easily utilized in DNS
amplification attacks2
of open
33M Number
recursive DNS servers
2
1. Quarterly Global DDoS Attack Report, Prolexic, 1st Quarter, 2013 2. www.openresolverproject.org
6 | © 2013
2014 Infoblox Inc. All Rights Reserved.
With possible amplification up to
100x
on a DNS attack, the
amount of traffic delivered
to a victim can be huge
2M
With enterprise level businesses receiving an
average of 2 million DNS queries every single
day, the threat of attack is significant
The Rising Tide of DNS Threats
DNS attacks are rising
for 3 reasons:
1 Easy to spoof
2
Asymmetric
amplification
3
High-value
target
7 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Countries of origin for the most DDoS attacks in
the last year
China
US
Brazil
Russia
France
India
Germany
Korea
Egypt
Taiwan
DNS Attack Vectors
8 | © 2013
2014 Infoblox Inc. All Rights Reserved.
The DNS Security Challenges
1
Securing the DNS Platform
2
Defending Against DNS Attacks
DDoS / Cache Poisoning
3
Preventing Malware from using DNS
9 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Anatomy of an Attack
Syrian Electronic Army
10 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Anatomy of an Attack
Distributed Reflection DoS Attack (DrDoS)
How the attack works
Combines reflection and amplification
Internet
Uses third-party open resolvers in
the Internet (unwitting accomplice)
Attacker sends spoofed queries
to the open recursive servers
Uses queries specially crafted to
result in a very large response
Attacker
Causes DDoS on the victim’s server
Target Victim
11 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Anatomy of an Attack
DNS DDoS For Hire
• DDoS attacks against major
U.S financial institutions
• Launching (DDoS) taking
advantage of Server bandwidth
• 4 types of DDoS attacks:
̶ DNS amplification,
̶ Spoofed SYN,
̶ Spoofed UDP
̶ HTTP+ proxy support
• Script offered for $800
12 | © 2013
2014 Infoblox Inc. All Rights Reserved.
The Rising Tide of DNS Threats
TCP/UDP/ICMP floods:
DNS amplification:
Flood victim’s network with large
amounts of traffic
Use amplification in DNS reply to
flood victim
DNS cache poisoning:
Protocol anomalies:
Corruption of a DNS cache
database with a rogue address
Malformed DNS packets causing
server to crash
Top
DNS tunneling:
Tunneling of another protocol
through DNS for data ex-filtration
10
DNS attacks
DNS hijacking:
Subverting resolution of DNS queries
to point to rogue DNS server
DNS based exploits:
Reconnaissance:
Exploit vulnerabilities in
DNS software
Probe to get information on network
environment before launching attack
DNS reflection/DrDos:
Fragmentation:
Use third party DNS servers to
propagate DDoS attack
Traffic with lots of small out of
order fragments
13 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Protection Best Practices
14 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Help Is On the Way!
DNSSEC
Dedicated
Appliances
Collaboration
RPZ
Monitoring
Advanced
DNS
Protection
15 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Get the Teams Talking – Questions to Ask:
• Who in your org is responsible for DNS Security?
• What methods, procedures, tools do you have in place to detect and
mitigate DNS attacks?
• Would you know if an attack was happening, would you know how to
stop it?
IT OPS
Team
IT Apps
Team
Security
Team
Network
Team
16 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Hardened DNS Appliances
Conventional Server Approach
Hardened Appliance Approach
Threat
Update
Service
Secure
Access
Multiple
Open Ports
Limited
Port Access
 Dedicated hardware with no unnecessary logical
or physical ports
– Many open ports subject to attack
– Users have OS-level account privileges on
server
– Requires time-consuming manual updates
 No OS-level user accounts – only admin accts
 Immediate updates to new security threats
 Secure HTTPS-based access to device
management
 No SSH or root-shell access
 Encrypted device to device communication
17 | © 2013
2014 Infoblox Inc. All Rights Reserved.
17
Monitoring & Alert on Aggregate Query Rate
18 | © 2013
2014 Infoblox Inc. All Rights Reserved.
DNSSEC
• Fixes Kaminsky Vulnerability
• DNS Security Extensions
• Uses public key cryptography to verify the authenticity of
DNS zone data (records)
̶ DNSSEC zone data is digitally signed using a private key for that
zone
̶ A DNS server receiving DNSSEC signed zone data can verify the
origin and integrity of the data by checking the signature using the
public key for that zone
19 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Legitimate Traffic
Advanced DNS Protection
Automatic
updates
Advanced DNS
Protection
(External DNS)
Data for
Reports
Updated
ThreatIntelligence
Server
Advanced DNS
Protection
(Internal DNS)
Reporting
Server
Reports on attack types, severity
20 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Response Policy Zones - RPZ
Blocking Queries to Malicious Domains
1
An infected device brought into
the office. Malware spreads to
other devices on network.
4
2
Malicious
domains
Reputational Feed:
IPs, Domains, etc.
of Bad Servers
2
Malware makes a DNS query
to find “home.” (botnet / C&C).
DNS Server detects & blocks
DNS query to malicious domain
Internet
Query to malicious domain logged
Malware /
APT
Intranet
3 security teams can now identify
requesting end-point and attmept
DNS Server
with RPZ
Capability
Blocked attempt
sent to Syslog
remediation
1
RPZ regularly updated with
3
2
Malware / APT spreads
within network; Calls home
21 | © 2013
2014 Infoblox Inc. All Rights Reserved.
4 malicious domain data using
available reputational feeds
Call to Action
• DNS security vulnerabilities pose
a significant threat
• Raise the awareness of DNS and
DNS security vulnerabilities in
your organization
• There are multitudes of
resources available to help
• Seek help if needed to protect
DNS
22 | © 2013
2014 Infoblox Inc. All Rights Reserved.
Take the DNS Security Risk Assessment
1. Analyzes your organization’s DNS setup to assess level of risk
of exposure to DNS threats
2. Provides DNS Security Risk Score and analysis based on answers given
3. www.infoblox.com/dnssecurityscore
Higher score = higher DNS security risk!!
23 | © 2013
2014 Infoblox Inc. All Rights Reserved.
About Infoblox
Total Revenue
Founded in 1999
(Fiscal Year Ending July 31)
Headquartered in Santa Clara, CA
with global operations in 25 countries
$300
($MM)
$250.3
Leader in technology
for network control
$250
Market leadership
$200
$225.0
$169.2
• DDI Market Leader (Gartner)
• 50% DDI Market Share (IDC)
7,500+ customers
74,000+ systems shipped to 100
countries
55 patents, 29 pending
IPO April 2012: NYSE BLOX
24 | © 2013
2014 Infoblox Inc. All Rights Reserved.
$150
$132.8
$102.2
$100
$56.0
$50
$61.7
$35.0
$0
FY2007 FY2008 FY2009 FY2010 FY2011 FY2012 FY2013 FY2014
Thank you!
For more information
www.infoblox.com
25 | © 2013
2014 Infoblox Inc. All Rights Reserved.