Vulnerabilities / Threats
10/28/2016
05:30 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

And Now A PREDATOR To Fight DNS Domain Abuse

Researchers at Princeton and elsewhere demo a new tool for spotting people registering domains for malicious purposes.

Security researchers at Princeton University, Google, and three other organizations have developed a software tool designed to let domain name registration companies detect and block people attempting to register domains intended for malicious purposes.

The researchers provided details of the new Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration (PREDATOR) in a technical paper presented at the ACM Conference on Computer and Communications Security this week.

They described the tool as an evolution of existing domain reputation systems that work by first observing domain use and then assigning a reputation score to it based on type of content hosted and other factors.

The goal with PREDATOR is to equip security professional and domain registrars with the ability to do such reputation scoring before the actual domain registration takes place by observing and evaluating so-called time-of-registration features.

"The intuition has always been that the way that malicious actors use online resources somehow differs fundamentally from the way legitimate actors use them," Nick Feamster, acting director of Princeton’s Center for Information Technology Policy said in a statement announcing PREDATOR.

"We were looking for those signals: what is it about a domain name that makes it automatically identifiable as a bad domain name?"

Early evaluations of the tool using registration logs of .com and .net domains over a five-month period showed it to achieve a 70% detection rate and a false-positive rate of 0.35%, the researchers claimed in the paper. The results suggest the tool offers an effective and early first line of defense against DNS domain misuse, they noted. “It predicts malicious domains when they are registered, which is typically days or weeks earlier than existing DNS blacklists.”

Researchers from the University of California, Santa Barbara, the University of California, Berkeley, Google, the International Computer Science Institute and Princeton University contributed to PREDATOR.

The work on PREDATOR builds on previous research focused on evaluating DNS preregistration data to predict future DNS traffic, says Feamster in comments to Dark Reading. He pointed to a patent that Verisign filed in 2012 as one example of previous work in this area.

The idea is to make it harder for threat actors to register websites for sending spam, for launching phishing and denial-of-service campaigns and other malicious activities. Cybercriminals routinely register thousands of domains on a daily basis for such purposes.

The Anti-Phishing Work Group for instance counted nearly 630,500 sites being used for phishing alone between Q1 and Q3 last year, with the US hosting the most number of such sites.

Others have worked to fight domain name abuse in different ways. Recently, researchers at Georgia Tech for instance demonstrated a method for spotting attackers hiding behind reputable domains or hijacking domains previously associated with malicious uses. Last year, internet pioneer Paul Vixie proposed introducing a short waiting period between when a domain is registered and when it goes live, to deter abuse.

Current blacklisting tools only allow for after-the-fact action. So criminals are able to launch new domains to support their activities almost as quickly as old ones are taken down. “If we can identify in advance that a DNS domain name is going to be used for malicious purposes we could prevent it from being registered,” Feamster says.

People registering domain names with malicious intent often exhibit certain behaviors, he says. For example, someone planning on using domain names in an attack campaign might register hundreds and even thousands of domains over a very small window of time. Similarly, it is not unusual for such domains to have names that are not necessarily human readable or names that are minor variations of a single name, he says.

By detecting such patterns and blocking automatic domain registration until vetting takes place, registrars can make it much harder for malicious actors to abuse DNS domains, Feamster says.

The hope is to be able to make the technology commercially available eventually, he adds.

Related stories:

 

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
TimTonne
50%
50%
TimTonne,
User Rank: Apprentice
6/21/2017 | 6:55:30 AM
achja
nnn
bradprat
50%
50%
bradprat,
User Rank: Apprentice
6/14/2017 | 7:52:16 PM
Re: Bollywood story
It is no longer safe
juliazz
50%
50%
juliazz,
User Rank: Apprentice
3/26/2017 | 7:06:34 AM
here
I get a DNs abuse and its not funny at all... Thx for the post
Benefiter
50%
50%
Benefiter,
User Rank: Apprentice
11/2/2016 | 4:55:52 PM
Re: here I got the tips!
It's actually a cool and useful piece of information. I am glad that you shared this helpful information with us. Please keep us informed like this. Thank you for sharing.
tomysong
50%
50%
tomysong,
User Rank: Apprentice
11/2/2016 | 2:16:43 PM
here
I don't even know how I stopped up right here, but I believed this submit used to be good. I do not recognize who you might be however certainly you're going to a famous blogger in the event you aren't already. Cheers!
amiee
50%
50%
amiee,
User Rank: Apprentice
11/1/2016 | 6:45:21 PM
here I got the tips!
Its like you learn my mind! You seem to understand a lot about this, like you wrote the e-book in it or something. I believe that you could do with some percent to pressure the message house a bit, but instead of that, this is great blog. A fantastic read. I'll certainly be back.
kasstri
100%
0%
kasstri,
User Rank: Strategist
11/1/2016 | 5:04:39 PM
thanks
I have learn several good stuff here. Definitely value bookmarking for revisiting. I surprise how much attempt you set to create this sort of magnificent informative site.
jalair105
50%
50%
jalair105,
User Rank: Apprentice
10/31/2016 | 9:31:47 AM
Food for thought
Interesting name for this process. Have any safeguards been thought of before a "Government or Political NGO" decides that the "malicious actors" with an alternative viewpoint should not be on the web.
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.