Network Security for Service Providers Understanding and Addressing the Threat of Criminal and Hacker Activity Doug Miller doug.miller@nominum.com September 19, 2012 Company Overview We are the WORLD LEADER in DNS & DHCP solutions Our solutions run the world’s MOST DEMANDING networks • Our Chairman, Dr. Paul Mockapetris, invented the DNS • Team comprised of BIND 8, BIND 9 & ISC-DHCP creators • 40 Issued and pending patents • A decade of network operator experience • Over 140 Fixed and Mobile network operators • Serving over 1 trillion worldwide DNS queries per day The first & only DNS/DHCP INTEGRATED ECOSYSTEM • DNS/DHCP engines provide efficiency, lower costs, higher QoS • N2 Data Platform enable agility & faster application development • Applications create differentiation and new revenue sources EMPOWERING SOME OF THE MOST IMPORTANT BRANDS IN THE WORLD 2 Nominum IDEAL Ecosystem 3rd PARTY CERTIFIED APPS NOMINUM APPS Unified User Interface Content Filtering Subscriber Safety Personal Internet Message Center NetView OTT Video Analytics Network Security Nominum Configuration Manager Configuration Management Future SIEM More… ISP-DEVELOPED APPS Custom Custom More… Interoperability (SDK & APIs) Network and Security Subscriber Analytics 3 Understanding the Threat Putting Telecom into Perspective Source: Chetan Sharma Consulting – 2012 5 Connected Devices per User Source: Cisco IBSG, 2011 6 Internet-Based Crime is Profitable • Hackers and criminals run a business – Marketing – Operations – Competition • Crime follows the market – – – – Initially focused on basic exploits Moved to crude DDoS with little financial gain Began to focus on wired broadband networks Increasingly moving into mobile networks – new growth market • Greatest profits come from the largest networks – Must use unsuspecting users to complete missions – Created the need for bots and bot networks – Networks increase strength and shield the hackers 7 Profitability is Great Online Fraud Trend Online banking fraud Cashing Phishing Theft of electronic funds Total Total market share, % 21.3% 16.0% 2.4% 1.3% 41.0% Amount, million USD $490 $367 $55 $30 $942 Spam Trend Spam Pharma and counterfeits Fake software Total Total market share, % 24.0% 6.2% 5.9% 36.1% Amount, million USD $553 $142 $135 $830 Internal market (C2C) Trend Sale of traffic Sale of exploits Sale of loaders Anonymization Total Total market share, % 6.6% 1.8% 1.2% 0.4% 10.0% Amount, million USD $153 $41 $27 $9 $230 Other Trend DDoS attacks Other Total Total Source: Group IB Total market share, % 5.6% 7.3% 12.9% Amount, million USD $130 $168 $298 100% $2,300 8 Millions of Hosts First Evidence of Attacks Storm Sasser Zeus SQL Slammer Attack Code Red Worm I Love You Internet Hosts Droid Dream Conficker 900 800 700 600 500 400 300 200 100 0 Melissa Bots and Malware Landscape 9 Don’t Lose Sight of Simple Attacks • Attacks are generally very basic – don’t forget that – It’s too easy to talk about the exotic attacks • The fact is that most attacks are relatively simple* – 92% of all data breaches were from external agents • E.g. Malware installed on to machines to execute tasks • 58% driven by organized crime • 65% from Eastern Europe – “External agents have created economies of scale by refining standardized, automated, and highly repeatable attacks” *Note: Information drawn from 2011 Data Breach Investigations Report; Verizon, US Secret Service, and Dutch High Tech Crime Unit 10 The Lifecycle of a Bot Network Botnet C&C Bot Master 3 – Bot gets instructions from Command and Control (C&C) server 2 – User visits site and is infected via “drive by download” Malware and becomes part of Botnet 1 – Spam entices user to badsite.com Innocent User 4 – Newly infected machine (bot) joins Botnet in DDOS attack on a legitimate Web site 11 Mobile Malware Distribution 12 Cache Poisoning Threat – Kaminsky • Attacker redirects unsuspecting customers – Entries in cache are changed by an attacker – Customer going to www.mybank.com is given incorrect information • Does not require phishing or any unsafe behavior – Attacker directs customers to controlled sites • Financial and identity theft, malware installation, etc. • Statistical attack – Send query so server listening for answer – Send guesses while target DNS waits for real answer – Repeat until success 13 Addressing the Issue Network and User Security Solution • Security needs span across mobile & fixed networks – The threat on broadband networks is clear – Mobile networks are the new playground for hackers and thieves – End user threats are not just a PC problem • “Mobile threats are evolving quickly—sophistication that took decades to reach on the PC is taking just a few years on mobile” - Lookout Mobile • Addressing the security problem on multiple levels – Protect DNS network assets • Server security ensures network access is available – Caching data is highly valuable • End users must be confident they’re going where they want to – The network must be clean • Think about spectrum efficiency – End users Options • Network-based solutions remove complexity and confusion 15 Protecting the DNS Assets • Client rate limiting – Limit any subscriber to a maximum amount of QPS (e.g. 1,000) – Queries-per-second (QPS) limit defined by administrator • Limit recursion contexts – Recursion context is an authoritative query out to the Internet – Limit maximum number of recursion contexts – Default limit per Vantio of 2,000 simultaneous recursion contexts Limit inbound DNS queries Limit outbound DNS queries Internet Client 16 Protecting the Caching Data Action Layer Impact Stop attacks using the following: Deterrence Defense Detect and Defend (D&D) Detect spoofed response and switch to TCP Resistance Remediation Randomize transaction ID (QID) UDP Source Port Randomization (USPR) Case (query name) Randomization (0x20) E.g. 0x20 Failures switch to TCP “Glue Segregation” Discard unsolicited answers Notification and Reporting All TCP transaction, including 0x20 and D&D Decrease the probability of a successful attack Significantly slow the progress of an attack (100x or more) Eliminate the opportunity for an attacker to insert a fake record Isolate the attacker and take remedial measures Protecting the Cache is Vital 17 Protecting the Network Nominum Bot Domain Feed Visibility and Reporting goodsite1.com Response Vantio Caching Engine botC&C.com NXDomain goodsite2.com Service Provider Network Response 18 Protecting the End User • A brief introduction – Opt-in service for managing both fixed and mobile data access – Broad application categories supporting multiple services • Online Security • Parental Control • Scheduling – Network-based DNS service • No need to download anything to the end-user mobile device 19 Layered Caching Security Action Layer Impact Stop attacks using the following: Deterrence Defense Detect and Defend (D&D) Detect spoofed response and switch to TCP Resistance Remediation Randomize transaction ID (QID) UDP Source Port Randomization (USPR) Case (query name) Randomization (0x20) E.g. 0x20 Failures switch to TCP “Glue Segregation” Discard unsolicited answers Notification and Reporting All TCP transaction, including 0x20 and D&D Decrease the probability of a successful attack Significantly slow the progress of an attack (100x or more) Eliminate the opportunity for an attacker to insert a fake record Isolate the attacker and take remedial measures Protecting the Cache is Vital 20 Enabling Legal Compliance • Leveraging the same ecosystem – Filter government-mandated lists – Comply with legal requirements – Minimize operational impacts 21 Business Benefits of Security Executive Better brand recognition as a security leader • Improved Industry and Government relations Marketing Increase customer satisfaction from • Faster Internet service • Decreased computer issues Better service means Greater control over network and operations costs Dedicated focus on end user experience • Prevent bad traffic • Protection from harm • “Good Corporate Citizen” • Lower churn • Greater ability to upsell services • Lower calls into customer support No news about attacks • High brand recognition • Customer loyalty Operations Lower variability in network traffic • Limited unplanned or unexpected spikes • Ability to sustain peak periods of traffic More predictable network growth • Focus only on “good traffic” and not bad • Decreased bandwidth from bot traffic Lower call volume • Computer issues • Network outages • Slow service Security Complete visibility into bot traffic trends Integrated and automated mitigation • No third party requirements • No complex processes More predictable customer behavior • Easier to highlight potentially dangerous trends 22 www.nominum.com Twitter: @Nominum Facebook: http://www.facebook.com/nominum YouTube: http://www.youtube.com/nominumwebinars LinkedIn: http://www.linkedin.com/company/nominum Doug Miller doug.miller@nominum.com