Zscalerのブログ

Zscalerの最新ブログ情報を受信

Products & Solutions

What's in a name? The importance of DNS

image
CLINTON KARR
December 16, 2013 - 2 分で読了

In my last blog, I reviewed some of the major security trends in 2013. Today, I want to turn an eye to 2014. If you haven't read it yet, Zscaler recently published its 2014 Security Cloud Forecast. One of our predictions is that DNS will become more central to cyber attacks and cyber security.

The high-profile attacks are an indication that even major organizations (with major security budgets) are seeing attackers in their networks, often for a long period of time. That doesn’t mean that these are the only networks being compromised, just that those attacks made the headlines.

Assume, then, that attackers are waltzing in and out of your network. How could you know that was happening?

Attackers have been using DNS trickery to set up their command-and-control servers and keep them under the radar. Analyzing DNS traffic—an infrequent practice for most companies—can help you see evidence of these attacks.

Specifically, look for young domains, odd domains that only a few IP addresses are querying, and a preponderance of failed lookups. Attackers attempt to keep their command-and-control servers under wraps by registering new domains; defend against this by blocking domains that are less than 24 hours old. Look for traffic to unique and esoteric domains; a lot of traffic to an odd domain from one or two internal systems could well indicate communication with a command and control server. (Since malware moves laterally through the organization, don’t restrict your DNS detective work based on the number of client systems accessing the domain.)

Finally, look for failed lookups. These could indicate new malware infections as the newly infected system strives to call back and download more malware, trying a large number of domains without reaching them (which is consistent with the pattern of attackers setting up and tearing down domains to avoid detection, often using domain generation algorithms to create new random domains). Since the ability of the malware to reach the command-and-control server is critical, the malware is designed to persist until it reaches a valid domain, trying and failing as many times as needed.

form submtited
お読みいただきありがとうございました

このブログは役に立ちましたか?

免責事項:このブログは、Zscalerが情報提供のみを目的として作成したものであり、「現状のまま」提供されています。記載された内容の正確性、完全性、信頼性については一切保証されません。Zscalerは、ブログ内の情報の誤りや欠如、またはその情報に基づいて行われるいかなる行為に関して一切の責任を負いません。また、ブログ内でリンクされているサードパーティーのWebサイトおよびリソースは、利便性のみを目的として提供されており、その内容や運用についても一切の責任を負いません。すべての内容は予告なく変更される場合があります。このブログにアクセスすることで、これらの条件に同意し、情報の確認および使用は自己責任で行うことを理解したものとみなされます。

Zscalerの最新ブログ情報を受信

このフォームを送信することで、Zscalerのプライバシー ポリシーに同意したものとみなされます。