PPT-Data Exfiltration over DNS
Author : tatyana-admore | Published Date : 2018-01-16
Yeo Deng Jie DJ July 2016 Every device application user end point relies on DNS DNS The importance of DNS DNS is a core networking service DNS is exploited for
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Data Exfiltration over DNS" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Data Exfiltration over DNS: Transcript
Yeo Deng Jie DJ July 2016 Every device application user end point relies on DNS DNS The importance of DNS DNS is a core networking service DNS is exploited for malicious activity IoT. 20 1027200 1048830 1054860 1081860 1126920 1137390 1180200 1192470 1229340 1282710 O7 826440 864840 882600 896730 922290 947580 976770 1005900 1035120 1126920 1204380 O6 612540 672960 717120 717120 719850 750720 754770 754770 797670 873510 918030 O5 Curtis Taylor. taylorcr@ornl.gov. Craig . Shue. cshue@. ornl.gov. Outline. Automated Attacking. Costs to Organizations. Some Observations. Our Approach. Lightweight Capabilities. Fast Flux Defense. Future Directions. Sophisticated Criminals or . Babytown. Frolics?. Ryan Merritt. Josh Grunzweig. Who We Are. Josh Grunzweig. Security Researcher. Malware Reverser. Dabbles in Ruby. Homebrewer. Ryan Merritt. Security Researcher. Assessing their server availability.. Quantifying their world-wide delay performance.. How to improve delay performance by adding servers.. ABSTRACT. Conduct extensive and thorough measurements that accurately characterize the performance of two large-scale commercial CDNs: Akamai and Limelight.. Magda El Zarki. Prof. of CS. Univ. of CA, Irvine. Email: . elzarki@uci.edu. http: . www.ics.uci.edu. /~. magda. Network Address . Translation - NAT. 3. Private Network. Private IP . network is an IP network that is not directly connected to the Internet. Jun Ho Huh. Research Scientist. Cybersecurity Lab. . Saurabh Verma, . Ali Hamieh, Jun Huh Ho, Siva Raj Rajagopalan, Maciej Korczynski, Nina Fefferman.. . 1. Motivation . money talks!. . 2. It’s becoming very serious!. Threats. Efficient IP Company Overview. Americas Headquarters - West Chester, Pennsylvania. European Headquarters - Paris, France. First Commercial . R. elease 1998. Branded EfficientIP In 2004 – Innovative DDI Software Company. . draft-savolainen-mif-dns-server-selection-04. Teemu Savolainen (Nokia). Jun-ya Kato (NTT). MIF WG meeting @ IETF#79. 11-Nov-2010. Related MIF milestone. 1) DNS server selection solution: a specification for describing a way for a network to communicate to nodes information required to perform advanced DNS server selection at name resolution request granularity in scenarios involving multiple namespaces. The specification shall describe the information to be delivered for nodes and the protocol to be used for delivery.. . Abhishek Madav(86378148). . Suhas Tikoo(22363556). . Urjit Khadilkar(24449837). Motivation. We plan to device . a heterogeneous service . that would monitor the resolution of the user’s . 1. Fundamental Problems of . Network Security. Internet was designed without security in mind. Initial design focused more on how to make it work, than on how to prevent abuses. Initial environment mostly consisted of research institutions---assumption on the benign behaviors of users. Sylvia Ratnasamy. http://inst.eecs.berkeley.edu/~ee122. /. Material thanks to Ion . Stoica. , Scott . Shenker. , Jennifer Rexford, Nick . McKeown. , and many other colleagues. Announcements. Project 3 out on Wednesday, Oct 30. Michaelson. . APNICLabs. October 2012. What are the questions?. What proportion of DNS resolvers are . capable of performing DNS queries using IPv6?. What proportion of users are using . IPv6-capable DNS . Mick Douglas. Problem statements. Exceptionally difficult to get enough qualified staff.. Many . InfoSec. tools are no longer working well against current attacks.. Cloud computing, . BYOD. , work from home, etc have greatly confounded our network topologies.. Making Windows DNS Server Cloud Ready. ~Kumar Ashutosh, Microsoft. Windows DNS Server. Widely deployed in enterprises . Fair presence in the DNS resolver . space. Standards compliant and interoperable.
Download Document
Here is the link to download the presentation.
"Data Exfiltration over DNS"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents