dns_sinkholing-mrm_mjw

48
DNS Black Listing for Network Security Melissa Muth University of Pennsylvania Matthew Wollenweber The George Washington University Thursday, May 17, 12

Upload: matthew-wollenweber

Post on 08-Aug-2015

33 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: dns_sinkholing-mrm_mjw

DNS Black Listing for Network SecurityMelissa Muth

University of PennsylvaniaMatthew Wollenweber

The George Washington University

Thursday, May 17, 12

Page 2: dns_sinkholing-mrm_mjw

The Problem

Most Internet connections leverage Fully Qualified Domain Names (FQDNs) rather than IP addresses.

This makes browsing the web easier, but it also enable attackers to quickly change virtual hosts.

Thursday, May 17, 12

Page 3: dns_sinkholing-mrm_mjw

We Collectively Know the Malicious Sites

There are many resource that enumerate known bad domains such as:• Malware Domain List• Phish Tank• Conficker Working Group• Zeus Tracker• SES

Thursday, May 17, 12

Page 4: dns_sinkholing-mrm_mjw

Leveraging the Collective Knowledge

• Aggregate all known malicious domains

• Proactively alter DNS records to point to a safe site

Thursday, May 17, 12

Page 5: dns_sinkholing-mrm_mjw

Normal DNS Traffic with an Attacker

Thursday, May 17, 12

Page 6: dns_sinkholing-mrm_mjw

DNS Filtering

Thursday, May 17, 12

Page 7: dns_sinkholing-mrm_mjw

Benefits

• Users can opt-in to the service

• Does not require network choke points

• Easy to deploy (via DHCP)

• Easy to opt-out

• Less invasive than a proxy service

• Cheaper and easier to use than a proxy

Thursday, May 17, 12

Page 8: dns_sinkholing-mrm_mjw

Questions

• What has been your impression/assessment of DNS sink holing until now?

• What would be your greatest concerns or challenges with implementing this on your campus?

Thursday, May 17, 12

Page 9: dns_sinkholing-mrm_mjw

Two Case Studies

• Penn: In-House system

• GWU: Managed solution - OpenDNS

Thursday, May 17, 12

Page 10: dns_sinkholing-mrm_mjw

University of Pennsylvania

Thursday, May 17, 12

Page 11: dns_sinkholing-mrm_mjw

The Case for a New Approach

• Polymorphic Malware

• 50% Effective AV Software

• 0-Day Threats

• Legitimate websites serving malicious 3rd party ads

Thursday, May 17, 12

Page 12: dns_sinkholing-mrm_mjw

The Case - Penn

Variably managed machinesOpen perimeter

Thursday, May 17, 12

Page 13: dns_sinkholing-mrm_mjw

Implementation options

($)_______________________+In-house Proof of Concept

Thursday, May 17, 12

Page 14: dns_sinkholing-mrm_mjw

Implementation: Domain Sources

0%

0%4%

95%

SES MDL ZeusSRI

2%

45%54%

SES MDL Zeus

SESv1 SESv2

Thursday, May 17, 12

Page 15: dns_sinkholing-mrm_mjw

Implementation - platform

Thursday, May 17, 12

Page 16: dns_sinkholing-mrm_mjw

MySQL DB

BIND

Implementation - loadMDL

SES ZeusRaw Domain List

Blacklist

Whitelist

dns_records_1

dns_records_2 Filtered domain list

named.conf

insert_2named.conf

Thursday, May 17, 12

Page 17: dns_sinkholing-mrm_mjw

Implementation - communication

• Terms of Service

• Privacy Policy

• Documentation

• System build

• Maintenance

Thursday, May 17, 12

Page 18: dns_sinkholing-mrm_mjw

Performance - clients

0

500

1,000

1,500

2,000

Jan 2

2 201

2

Feb 5

2012

Apr 1 20

12

Thursday, May 17, 12

Page 19: dns_sinkholing-mrm_mjw

Performance: query/day

0

325,000

650,000

975,000

1,300,000

Jan 2

2 201

2

Apr 1 20

12

Thursday, May 17, 12

Page 20: dns_sinkholing-mrm_mjw

Performance - % malicious

0

20

40

60

80

Jan 2

2 201

2

Apr 1 20

12

Thursday, May 17, 12

Page 21: dns_sinkholing-mrm_mjw

Performance

0

375,000

750,000

1,125,000

1,500,000

Jan 2

2 201

2

Apr 8 20

12

Malicious Portion of RequestsMalicious Non-Malicious

Thursday, May 17, 12

Page 22: dns_sinkholing-mrm_mjw

Results

0%

1%

2%

3%

4%

Before After

0.035

0.001

Monthly compromise %

97% reduction in compromises

Thursday, May 17, 12

Page 23: dns_sinkholing-mrm_mjw

Results - user experience

• No downtime

• Tertiary masked network outage

• False Positives

• 3 from SRI (removed)

• 2 from recently-cleaned domains

Thursday, May 17, 12

Page 24: dns_sinkholing-mrm_mjw

Costs

Out-of-pocket

Hardware $0Out-of-pocket Software $0

TimeBuild 2 person-

weeksTime

Maintenance 30 min/mo

Thursday, May 17, 12

Page 25: dns_sinkholing-mrm_mjw

Lessons Learned

Not a replacement for campus DNS:

a value add

Thursday, May 17, 12

Page 26: dns_sinkholing-mrm_mjw

Lessons Learned - protocol

• DNSSEC

• TTL

Thursday, May 17, 12

Page 27: dns_sinkholing-mrm_mjw

Lessons Learned - privacy

Log as little as possible:domain request

andreferrer

are sensitive

Thursday, May 17, 12

Page 28: dns_sinkholing-mrm_mjw

Lessons LearnedBrandingmatters:

vs

Thursday, May 17, 12

Page 29: dns_sinkholing-mrm_mjw

George Washington University

Thursday, May 17, 12

Page 30: dns_sinkholing-mrm_mjw

The Case

• Projects at GWU are incredibly slow - we needed a solution that could be implemented in a few months

• Network architecture has been organic and not centralized - proxies would be difficult

• Inline packet filtering - infeasible

Thursday, May 17, 12

Page 31: dns_sinkholing-mrm_mjw

The Case

• AV detection (at time of compromise) LESS THAN 30% (via Virus Total and SEP)

• Observed 70-80% correlation between the MDL and detected compromises

Thursday, May 17, 12

Page 32: dns_sinkholing-mrm_mjw

Vendor Selection and Deployment• Few vendors appear to offer cloud based DNS

filtering solutions

• Only OpenDNS met our requirements

• Minimal TTL Increase (faster than GW)

• High coverage of MDL

• No obvious False Positives

• Only malware blocked

• Deployment was via DHCP configuration

• Simple website to change OpenDNS settings

Thursday, May 17, 12

Page 33: dns_sinkholing-mrm_mjw

Configuration

Thursday, May 17, 12

Page 34: dns_sinkholing-mrm_mjw

Configuration

Thursday, May 17, 12

Page 35: dns_sinkholing-mrm_mjw

Configuration

Thursday, May 17, 12

Page 36: dns_sinkholing-mrm_mjw

Configuration

Thursday, May 17, 12

Page 37: dns_sinkholing-mrm_mjw

Management

• Security maintains overall ownership of OpenDNS at GW

• Networking has full administrative rights

• Help desk can unblock any problem sites

• Administration can be delegated to appropriate parties - LSPs, Schools, etc

Thursday, May 17, 12

Page 38: dns_sinkholing-mrm_mjw

OpenDNS Performance• Malware Coverage

• MDL: 85% coverage*

• SES: 88% coverage*

• Others - similar

• Latency is less than local DNS servers

• False Positives

• None reported via help desk in ~1 year

• None detected via testing Alexia top 50k*Exact “coverage” can vary on tolerance to protection versus potential problems. OpenDNS appears to fully ingest MDL, ShadowServer, CleanMX, Zeus Tracker,

and other sources.

Thursday, May 17, 12

Page 39: dns_sinkholing-mrm_mjw

GW Usage

Thursday, May 17, 12

Page 40: dns_sinkholing-mrm_mjw

Thursday, May 17, 12

Page 41: dns_sinkholing-mrm_mjw

Results

Thursday, May 17, 12

Page 42: dns_sinkholing-mrm_mjw

Results

• Deployment extended to most networks in Q1 2012

• 25% reduction between 2010 and 2011

• Currently running 80% reduced compromises from 2011

• On target to reduce detected compromises since 2010 by 87%

Thursday, May 17, 12

Page 43: dns_sinkholing-mrm_mjw

Results

• No complaints

• No downtime

• Little Effort

• More time to investigate less trivial traffic

Thursday, May 17, 12

Page 44: dns_sinkholing-mrm_mjw

Costs• Hardware: [$0 - OpenDNS is cloud-based.  No hardware

needed.]

• Time: [Less than one week for deployment across all GWU locations.  Cloud-based deployment is painless and quick.]

• Install, config, test software: [$0 - No software required.]

• Sporadic rebooting to apply patches [$0 - OpenDNS required no rebooting and no patching.]

• Time (ongoing): [$0 - OpenDNS requires no updates on GWU's end.]

• Annual service fee: Less than 100K

• Peace of mind and protection [Priceless]

• Avoiding GW internal development bureaucracy [Beyond priceless]

Thursday, May 17, 12

Page 45: dns_sinkholing-mrm_mjw

Other Factors• OpenDNS is more reliable than internal DNS at

GW - we peer with OpenDNS and have multiple uplinks but only two old DNS servers

• OpenDNS is a great vendor

• We interact with their CEO

• We interact with their technical folks

• They fix our problems

• If something isn’t perfect, they make it better

• In short, this is perfect as a turn-key solution

Thursday, May 17, 12

Page 46: dns_sinkholing-mrm_mjw

Why Our Numbers aren’t Perfect• Netwitness with Spectrum

• GFI Sandbox

• SourceFire IDS with Defense Center

• Dragon IDS

• DragonSlayer in-house correlation and reporting

• Centralized logging to Splunk including Firewall, AV, VPN logs

• Centralized Netflows

Thursday, May 17, 12

Page 47: dns_sinkholing-mrm_mjw

Conclusions

• We both continue to mutually prefer our specific solutions

• Audience thoughts?

Thursday, May 17, 12