Application Security

8/28/2017
01:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Rohde & Schwarz Cybersecurity Launches DNS Tunneling Detection

Company launches enhanced traffic analysis capabilities to detect Domain Name Server (DNS) tunneling.

Leipzig, Germany – Rohde & Schwarz Cybersecurity, a leading IT security company, today announced the launch of enhanced traffic analysis capabilities to detect DNS (Domain Name Server) tunneling. The new functionality provided by the deep packet inspection (DPI) engine R&S PACE 2 can be utilized by IT security solutions to reliably detect malicious activity in network traffic in real time caused by DNS tunneling.

DNS is a core component of the Internet and of paramount importance to the operation of the World Wide Web. It provides the mapping service between a domain name and the corresponding IP, translating human-friendly domain names into IP addresses.

As DNS is a trusted protocol it is often overlooked for security as no one considers using the protocol for data transmission. The use of DNS, especially with port 53, for data theft is called DNS tunneling. In tunneling, cybercriminals use the DNS protocol as an established pathway to direct the exchange of information for malicious purposes. Several tools have been developed to bypass traditional IPS or firewall inspection and network security measures to reach the Internet.

With the enhanced DNS tunneling detection functionality of the DPI engine R&S PACE 2, Rohde & Schwarz Cybersecurity now provides a highly scalable OEM software solution for network protection products. When embedded in a firewall, IT security vendors are able to inspect the entire DNS query for deeper markers of either good or bad behavior. This way, malicious attacks that bypass common security policies via DNS tunneling can be identified and prevented.

According to the DNS Threat Survey 2017 by Efficient IP, 94% claim DNS security is critical for their business. This is not surprising as in the past year, 76% of organizations around the world have been subjected to a DNS attack and a third suffered data theft. In addition, DNS tunneling was one of the leading causes besides malware, DDoS and cache poisoning attacks. If not secured properly, DNS attacks could cost businesses over $2 Billion annually in data exfiltration, loss of business or application downtime, says EfficientIP. The new DNS protocol classification feature not only adds further value to cybersecurity solutions but also improves their reliability and credibility that enterprises can rely on.

Besides the ability to detect DNS tunneling, R&S PACE 2 also provides reliable detection of tunneling in the HTTP protocol.

The DPI software library R&S PACE 2 provides powerful and reliable detection and classification of thousands of applications and protocols by combining deep packet inspection and behavioral traffic analysis – regardless of whether the protocols use advanced obfuscation, port-hopping techniques or encryption. DPI is needed everywhere in the network where intelligent decisions need to be made based on the nature of IP traffic, whether it is wanted or unwanted traffic, good or malicious.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-10727
PUBLISHED: 2018-07-20
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive ...
CVE-2018-8018
PUBLISHED: 2018-07-20
Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a spe...
CVE-2018-14415
PUBLISHED: 2018-07-20
An issue was discovered in idreamsoft iCMS before 7.0.10. XSS exists via the fourth and fifth input elements on the admincp.php?app=prop&do=add screen.
CVE-2018-14418
PUBLISHED: 2018-07-20
In Msvod Cms v10, SQL Injection exists via an images/lists?cid= URI.
CVE-2018-14419
PUBLISHED: 2018-07-20
MetInfo 6.0.0 allows XSS via a modified name of the navigation bar on the home page.