SESSION ID: GPS1-R09 Extending Your Security beyond Traditional Safe Borders with OpenDNS #RSAC Demetris Booth Head, Product & Solutions Marketing – APJC Cisco Systems July 2016 #RSAC Today’s Objective Security Challenges Against Sophisticated Attacks Introduce a Different Method of Extending Security Deeper View Into More Holistic DNS-Layer Security Block Presenter’s Company Logo – replace on master slide 2 #RSAC The Security Problem Subhead if needed #RSAC Are we Completely secure? Presenter’s Company Logo – replace on master slide #RSAC Typical Attack Victim clicks link unwittingly 3 http://welcome.to.jangle.com/exploit.php Perimeter (Inbound) 4 2 1 Research targets (SNS) Spear Phishing (you@gmail.com) Bot installed, back door established and receives commands from C2 server 5 Scan LAN for vulnerable hosts to exploit & retain alternative back door + find privileged users Lateral Movement Attacker enterprise network (Scanning, Pivoting, Privilege Privileged account found.etc.) Occupy Escalation,6 Brute Force, directory service. Access to database C2 Server backup, then copy them to staging server Admin Node 8 Block Presenter’s Company Logo – replace on master slide System compromised and data breached. Retain backdoor to collect more targeted data, otherwise erase all traces or wipe whole disk (e.g. Shamoon malware) Perimeter (Outbound) 7 Zip data, slice it to multiple files, and send those out to external site over HTTPS Major Challenge: Where Do You Enforce Security? NGFW NETFLOW PROXY SANDBOX AV Endpoint AV Endpoint AV Perimeter Perimeter Perimeter ROUTER/UTM ROUTER/UTM Block AV AV Presenter’s Company Logo – replace on master slide #RSAC CHALLENGES AV AV AV INTERNET MALWARE C2/BOTNETS PHISHING AV AV Too Many Alerts via Appliances & AV Wait Until Payloads Reaches Target Too Much Time to Deploy Everywhere #RSAC DNS: Major Security Blind Spot 91.3% of malware uses DNS Block Presenter’s Company Logo – replace on master slide 68% of organizations don’t monitor it #RSAC OpenDNS Security Subhead if needed #RSAC DNS is the fastest way to establish Security Everywhere IOCs VPN DNS off on Block Presenter’s Company Logo – replace on master slide DNS is the Internet’s control plane Where Do You Enforce Security? INTERNET MALWARE C2/BOTNETS PHISHING #RSAC MID LAYER LAST LAYER NGFW NETFLOW PROXY SANDBOX AV B l o c k AV You Gain: Endpoint AV AV AV AV MID LAYER Perimeter Perimeter ROUTER/UTM Block FIRST LAYER AV AV Presenter’s Company Logo – replace on master slide MID LAYER Perimeter ROUTER/UTM AV AV Endpoint LAST LAYER Reduced Alerts to Improves Your SIEM Traffic & Payloads Never Reach Target Quickly Provision #RSAC You know one IOC OpenDNS knows all its relationships Your local intelligence Global context Presenter’s Company Logo – replace on master slide Leverage a Single Global Recursive Who Resolves Your DNS Requests? DNS Service #RSAC ISP ?? ISP CHALLENGES BENEFITS Multiple Internet Global Internet Service Visibility Providers Activity Home Users mobile mobile carrier carrier Mobile Devices Direct-to-Internet Network Security Branch Offices w/o Adding Latency B l o c k Users Forget to Consistent Policy Always Turn VPN On Enforcement Different DNS Internet-Wide Log Formats Cloud App Visibility Block Presenter’s Company Logo – replace on master slide ISP ?? ISP Roaming Laptops Enterprise Location A ISP 11 Internal Infoblox Appliance Enterprise Location B ISP 22 ISP Internal Windows DNS Server Enterprise Location C Internal BIND Server ISP ?? ISP Remote Sites Authoritative DNS for Intranet Domains Recursive DNS for Internet Domains ISP 33 #RSAC Security Built into the Internet Fabric Block Presenter’s Company Logo – replace on master slide #RSAC See where attacks are staged Presenter’s Company Logo – replace on master slide #RSAC Deeper View Subhead if needed #RSAC How Stuff Works: Intelligent Proxy Internet Locations Connections are only made to safe Internet locations by modifying the original destination Security Controls DNS provides Internet-wide enforcement, then proxy provides deep inspection at URL-level Block Page Block Presenter’s Company Logo – replace on master slide Original Destination 1010101110100100100 1010101100010110010 0010101000111100010 1010001010010101011 DNS Resolver Proxy Powered by Security Graph Distributed in Global Network ✓ ✕ Network Traffic On- and off-network devices send requests to our resolvers, then connections are implicitly enforced Content Modified Destination STEP 1: DNS Request three (3) possible IP responses per domain query ✕ ✓ ? STEP 2: TCP/IP Connection three (3) possible routes per connection #RSAC Security Classification Ingest Apply Identify millions of data points per second statistical models and human intelligence probable malicious sites a.ru b.cn 7.7.1.3 e.net p.com/jpg Block Presenter’s Company Logo – replace on master slide 5.9.0.1 #RSAC The power behind this: Security Graph Live & historical DNS Live Internet Routes (BGP) Security Graph Block Presenter’s Company Logo – replace on master slide Partner Feeds Predictive Intelligence #RSAC How Security Labs Develops Models Method 1 1 Analyze DNS logs and apply data mining techniques 2 Identify patterns and abnormalities 3 Write logic and create a model Method 1: Data Driven Block Presenter’s Company Logo – replace on master slide 4 Tune by feeding more data and analyzing output #RSAC Example: C-Rank Model (Domain Co-Occurrences) Other domains looked up in rapid succession of a given domain uncovers related domains that could be associated with an attack Block 1 2 3 4 Analyzed raw DNS log files Applied visualization/data mining techniques; identified patterns Wrote logic and created a model Trained and tuned model Presenter’s Company Logo – replace on master slide #RSAC How Security Labs Develops Models Method 2 1 2 Start with a list of domains related to a specific attack Check our data and extract relevant information 3 4 Write logic and create a model Tune by feeding more data and analyzing output Method 2: Attack/Incident Driven Block Presenter’s Company Logo – replace on master slide #RSAC NLPRank Model (natural language processing) Identifies malicious domain-squatting and targeted C2 or phishing domains 1 Read APT reports 2 3 4 Patterns in domains used in attacks Checked data & confirmed intuition Built model and continue to tune Domain spoofing used to obfuscate Often saw brand names and terms like “update” Examples: update-java[.]net adobe-update[.]net Block Presenter’s Company Logo – replace on master slide Dictionary words & company names merged Changed small # of characters to obfuscate Domains hosted on ASNs unassociated w/company Different webpage fingerprints Detects fraudulent brand domains: 1inkedin.net linkedin.com #RSAC Anomaly Detection: Live DGA Detection N-gram” analysis Do letter pairings match normal language patterns? yfrscsddkkdl.com qgmcgoqeasgommee.org iyyxtyxdeypk.com diiqngijkpop.ru Block Presenter’s Company Logo – replace on master slide Does the probability distribution of letters appear random? #RSAC Reputation Analysis SecureRank Score Infected hosts often connect to known bad sites Domains requested primarily by infected host are most likely malicious Block Presenter’s Company Logo – replace on master slide IP/subnet/ASN Reputation Malicious hosts often found in the same areas Flags “sketchy” neighborhoods based on the number of malicious sites hosted there #RSAC Determining a Malicious Domain Traffic patterns Check hosting infrastructure Determine it’s a fast flux domain Hosted by hundreds of different IPs across 28+ countries Low TTL Compromised domain model Determine it’s an exploit kit domain Users are redirected to this domain from another compromised site Based on aggregation of output from multiple models Co-occurrences Block Presenter’s Company Logo – replace on master slide DGA detection #RSAC Co-Occurrences • Identifies other domains looked up in rapid succession of a given domain • Correlations uncover other domains related to an attack NLPrank Model (Natural Language Processing) • Detect domain names that spoof brand and tech terms in real-time Spike Rank (Sprank) OpenDNS Statistical Models • Detect domains with sudden spikes in traffic • Finds domains involved in active attacks Predictive IP Space Monitoring • Analyzes how servers are hosted to detect future malicious domains • Identifies steps that precede malicious activity And Many Other Models… Block Presenter’s Company Logo – replace on master slide Early & Accurate Predictions & Classifications #RSAC Wrap-Up Subhead if needed #RSAC Key To OpenDNS Protection xyz.com DNS 1.2.3.4 Global Network Using Recursive DNS Predictive Intelligence Using Statistical Models Off-Network Security Using Lightweight Agent just point DNS from your network devices, our virtual appliance, or our roaming client to our global network observes relationships in global DNS requests & BGP routes to discover where attacks are staged does not scan system or run in kernel space, so it will not crash, hog memory, or pester the end user Block Presenter’s Company Logo – replace on master slide Top Use Cases to Add DNS Security to Your Security Stack #RSAC OFFNETWORK SECURITY SECURE DIRECT-TONET OFFICES NEW LAYER OF PREDICTIVE SECURITY SPEED UP INCIDENT RESPONSE AUTOMATE ENFORCEMENT & VISIBILITY 50% of PCs are already mobile1 70% of offices already go direct2 70-90% of malware is unique to each org3 Only 4% of alerts are investigated per week mean time-to-contain threats 26-39 hours4 WHY? Presenter’s Company Block Logo – replace on master slide Sources: (1) Gartner, (2) Forrester, (3) Verizon, and (4) Ponemon What We’ve Covered Need For Extending Security Beyond Current Perimeters Ransomware/Malware Impact Need To Go Beyond Deeper View on OpenDNS How it Works OpenDNS Architecture Use Cases Block Presenter’s Company Logo – replace on master slide 30 #RSAC #RSAC Thank You – Questions? Subhead if needed