Designing a Secure DNS Architecture

Similar documents
TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

WHITEPAPER. Top Reasons Why Enterprises Must Automat DNS, DHCP and IP Address Management

WHITE PAPER. Why Infoblox for DDI. It is time to migrate from BIND and Microsoft

Are You Fully Prepared to Withstand DNS Attacks?

August 14th, 2018 PRESENTED BY:

WHITE PAPER Hybrid Approach to DDoS Mitigation

Future-ready security for small and mid-size enterprises

DDoS MITIGATION BEST PRACTICES

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

AKAMAI CLOUD SECURITY SOLUTIONS

IBM Security Network Protection Solutions

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

Securing Your Amazon Web Services Virtual Networks

DNS SECURITY BEST PRACTICES

Securing Your Microsoft Azure Virtual Networks

Comprehensive datacenter protection

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE

SONICWALL SECURITY HEALTH CHECK PSO 2017

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Preparing your network for the next wave of innovation

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Symantec Network Access Control Starter Edition

SONICWALL SECURITY HEALTH CHECK SERVICE

Symantec Network Security 7100 Series

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Intelligent and Secure Network

Defend Against the Unknown

FIREWALL BEST PRACTICES TO BLOCK

SONICWALL SECURITY HEALTH CHECK SERVICE

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

RSA INCIDENT RESPONSE SERVICES

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Imperva Incapsula Product Overview

SUPERCHARGE YOUR DDoS PROTECTION STRATEGY

RSA INCIDENT RESPONSE SERVICES

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

The Evolving Threat of Internet Worms

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Detecting Internal Malware Spread with the Cisco Cyber Threat Defense Solution 1.0

The threat landscape is constantly

Protecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Total Threat Protection. Whitepaper

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

A10 DDOS PROTECTION CLOUD

DNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER

ForeScout ControlFabric TM Architecture

Snort: The World s Most Widely Deployed IPS Technology

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Are we breached? Deloitte's Cyber Threat Hunting

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Symantec Network Access Control Starter Edition

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

Validating the Security of the Borderless Infrastructure

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

SentinelOne Technical Brief

Neustar Security Solutions Overview

Symantec Network Access Control Starter Edition

The Interactive Guide to Protecting Your Election Website

The F5 Intelligent DNS Scale Reference Architecture

Enterprise D/DoS Mitigation Solution offering

Changing face of endpoint security

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Next Generation Privilege Identity Management

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Encrypted Traffic Security (ETS) White Paper

DDoS Managed Security Services Playbook

Security for the Cloud Era

A Better Way to a Redundant DNS.

SIEM Solutions from McAfee

Reducing the Cost of Incident Response

A Firewall Architecture to Enhance Performance of Enterprise Network

Check Point DDoS Protector Introduction

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Integrating Nixu IPAM with Microsoft AD. White Paper January 2011

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

The Future of Threat Prevention

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Multi-vector DDOS Attacks

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Maximizing IT Security with Configuration Management WHITE PAPER

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

Transcription:

WHITE PAPER Designing a Secure DNS Architecture In today s networking landscape, it is no longer adequate to have a DNS infrastructure that simply responds to queries. What is needed is an integrated secure DNS architecture that also enables smart growth.

Introduction DNS is an essential part of any modern-day organization. DNS, or Domain Name System, is the protocol used for converting fully qualified domain names (FQDNs) like www.google.com into machine-usable IP addresses that computers use to communicate with each other. Without a working DNS protocol, it would be almost impossible to have an Internet of Things that communicate with each other. While there are multiple ways to classify a DNS server, one that is especially relevant to this paper is the difference between primary and secondary DNS servers. A primary DNS server can be defined as one that holds the master copy of a DNS zone; while a secondary server stores copies of the zone that it receives from the primary server. There could be many reasons for having a secondary DNS server, such as performance or a desire to hide your primary server. Your customers use your DNS system to reach your website. Without a proper DNS infrastructure, your organization would not have a presence in cyberspace. ecommerce companies would not be able to sell their services. Even brick-andmortar companies need DNS servers to advertise their products. In short, the Internet as we know it would not exist without DNS protocol. Architecting Your DNS As the demand for an organization s services grows, so does the load on its DNS servers. At some point, whether it is due to legitimate traffic or a malicious distributed denial of service (DDoS) attack, the load on the DNS server exceeds the capacity of the server. At this point every organization looks for ways to increase DNS queries-per-second (QPS) capacity. One approach to this problem is to augment the primary DNS server with a faster, secondary DNS server. This approach works more efficiently if the two servers are integrated and use the same database and interfaces. Using two separate DNS servers here can introduce some interoperability issues in basic features like backup and restore, reporting, and management in general. A unified interface is also an important consideration here and can ensure preservation of your investment, and lower total cost of ownership (TCO). Another solution here is to deploy several DNS servers behind a load balancer. This approach works best if the DNS servers are unified to ensure ease of management and deployment consistency to all servers. When designing a DNS infrastructure, it is important to build an environment that is not only sufficient for current needs, but also provides room for future growth. In addition, while architecting your DNS, it is also important to understand the security threats the DNS might be vulnerable to. We will discuss these next. 1 WHITE PAPER Designing a Secure DNS Architecture

Securing the DNS Platform Hacking of DNS servers is becoming more prevalent every day. Conventional DNS servers have multiple attack surfaces and extraneous ports such as port 80 and port 25 that are open for attack. Hackers can use these ports to access the operating system (OS) and hack your servers. If your DNS servers don t support tiered security privileges, any user could potentially gain access to OS-level account privileges and cause configuration changes that could make your servers vulnerable to hacks. Moreover, updates to conventional DNS servers often require time-consuming manual processes. Defending against DNS Attacks Another consideration is protection of your DNS infrastructure from external attacks. Authoritative DNS servers are reachable from the Internet. This makes them potentially vulnerable to attacks such as DNS flood and amplification, which can effectively stop your DNS server from responding. It is also important to prevent these servers from becoming a tool to attack other servers (DNS reflection attack). Reflection attacks can damage your company s reputation and cost money in the long run. Even though your authoritative server sits behind a firewall, most of these attacks cannot be mitigated by typical firewalls. Firewalls are ill-prepared to protect you against application-layer attacks. The ones that do, the so-called NextGen firewalls, tend to have very little coverage for DNS protocols. These solutions typically spread their security policies across a large number of protocols and sacrifice depth for breadth of coverage. Load balancers offer some basic level of protection against DNS floods like NXDOMAIN DDoS attacks. However, there is a whole suite of DNS-based attacks that can target your external authoritative DNS servers, and the mitigation capabilities of load balancers fall short when it comes to addressing all of them. For example, load balancers cannot protect against bad or malformed DNS queries. Load balancers respond to DDoS attacks at the DNS security perimeter by scaling performance and spreading the load across multiple devices using IP Anycast. Merely adding more load balancers to the environment can prove to be an inefficient and costly method of handling attacks. Regardless of the protection technique that you use, it is important to stay one step ahead of the attackers. Keeping protection up-to-date is key as the DNS threat landscape continuously evolves, and attacks change form. It is also essential to ensure that the update of protection rules is done automatically. With the new level of sophistication that we are seeing in modern-day attacks, it is not possible to manually create and add detection rules to your DNS. Enterprises need specialized and automated DNS protection. Your DNS infrastructure should protect itself against inevitable DNS attacks on your organization. These attacks can take one of two major forms: volumetric and DNS-specific attacks. 2

Volumetric Attacks These attacks, sometimes referred to as DoS or DDoS, rely on exhausting a device s resources. A typical DNS DDoS sends 10s or 100s of thousands of queries per second to a DNS server in order to exhaust the resources on the DNS server and cause a service outage. The historical approach to a DNS DDoS attack has been to increase your capacity by either placing your DNS infrastructure behind a load balancer or to use a faster secondary DNS server to augment your primary server. The problem with this approach is that it is a temporary patch. According to Arbor Networks, 2013 included several DNS DDoS attacks of 100 Gbps or more. With DNS-based volumetric attacks making 10% of overall volumetric attacks and growing, we can only expect this number to grow. Putting a load balancer or a faster secondary server in front of the DNS server is not a cost-effective approach to DDoS protection. This amounts to a temporary patch and requires the organization to ramp up its infrastructure every time the bad guys catch up to them. You need intelligent DNS DDoS protection that does not respond to queries indiscriminately but distinguishes legitimate traffic from attack traffic. DNS-specific Attacks Another soft spot for a DNS infrastructure is the actual protocol. When DNS protocol was developed, few could have envisioned a world where malicious agents or disgruntled workers could exploit or bring down your DNS server. Today we realize that any DNS server can be the target of DNS-specific attacks. These take many forms: DNS reflection DNS amplification DNS exploits DNS protocol anomalies DNS tunneling Cache poisoning The various intentions of these types of attacks are to: Congest outbound server bandwidth (in the case of amplification attacks), overwhelming network components like firewalls in the path Flood the DNS server with traffic to slow it down and prevent it from responding to legitimate queries Cause the DNS server to crash by exploiting its vulnerabilities A proper DNS infrastructure should protect your DNS server against these businessimpacting attacks. Preventing Malware and APTs from Using DNS Data breaches are growing at a staggering pace, and over 100,000 new Malware samples are being catalogued every day. In 2013, there were 3,000 security incidents with a total of 822 million records exposed worldwide. Many of the breaches were driven by Malware and advanced persistent threats (APTs). Investing in next-generation firewalls or intrusion prevention systems (IPSs) can stop some Malware from entering the network, but not all. Trends like bring your own device (BYOD) complicate the situation further and provide new avenues for Malware to enter and go undetected for longer periods of time. 3 WHITE PAPER Designing a Secure DNS Architecture

Malware and APTs evade traditional security defenses by using DNS to find and communicate with botnets and command-and-control servers. Botnets and command-and-control servers hide behind constantly changing combinations of domains and IP addresses. Once internal machines connect to these devices, additional malicious software is downloaded or sensitive company data is exfiltrated. Sometimes Malware and APT attacks are hidden or disguised by external attacks on networks. During an external attack, IT staff are distracted in protecting the network, and might miss alerts or warning logs about Malware and APT activity within the network. By having a single integrated and centrally managed DNS infrastructure (external and internal) with visibility into both external attacks and Malware and APT activity, IT will be able to comprehend the totality of events and take appropriate action. Infoblox Secure DNS Infoblox Purpose-built Appliance and OS Infoblox provides hardened, purpose-built DNS appliances with minimized attack surfaces with: No extra or unused ports open to access the servers No root login access with the OS Role-based access to maintain overall control All access methods are secured: Two-factor authentication for login access Web access using HTTPS for encryption SSL encryption for appliance interaction via API The DNS appliances are Common Criteria EAL2 certified, which covers verification of hardware, software, and manufacturing processes. In addition, OS and application updates happen through a single centralized process, allowing for simple and centralized management and control. All of the above secures the DNS platform and helps protect DNS services from various hacks. Infoblox Advanced DNS Protection Infoblox s Advanced DNS Protection solves the problems of external attacks that target your DNS. Advanced DNS Protection provides built-in, intelligent attack protection that keeps track of source IPs of the DNS requests as well as the DNS records requested. It can be used to intelligently drop excessive DNS DDoS requests from the same IP, therefore saving resources to respond to legitimate requests. The figure below shows Advanced DNS Protection under attack, and its response to good DNS queries. While the attacks were being launched (red line graph), Advanced DNS Protection also received 50k good DNS queries per second, all of which it responded to (blue line graph), even as the attacks peaked. The test was done using an independent third-party security and performance-testing platform. 4

550 500 450 DNS Queries per Second 400 350 300 250 200 150 Attacks Response to good queries 100 50 0 0 25 50 75 100 125 150 175 200 225 250 275 300 Timestamp (Seconds) Figure 1: Advanced DNS Protection response rate under attack It is important to understand the difference between this technology and BIND s response rate limiting (RRL). With BIND, requests are received and processed, and only responses are rate limited. This is not an efficient approach since it uses valuable CPU and memory resources to process requests that the DNS server should never respond to. This makes it more likely for the DNS server to exhaust its resources and crash which is the aim of a DDoS attack to begin with. With Infoblox s technology, bad requests are dropped before they reach the central processing unit. Hence, it is a much more efficient approach. This technology is available out of the box. Of course, an attack on a mid-sized organization would not have the same characteristic of one against a large enterprise. While Infoblox is responsible for creating and maintaining protection rules with Advanced DNS Protection, users can tune the parameters associated with each rule and customize them for their environments. These new adjustments are entered through a graphical user interface (GUI) but verified before they are applied to the rule engine, ensuring that the system operates at peak performance. A typical load balancer does not provide this level of customization. Some vendors might provide a scripting language that enables users and consultants to create their own rules. These vendors do not maintain these rules, and users are ultimately applying them at their own risk. This can cause confusion and compatibility problems every time that a change is made in the product line. As mentioned earlier, another attack vector that could be used against a DNS server is protocol-based attacks. These include DNS amplification, reflection, and cache poisoning. Advanced DNS Protection provides prebuilt rules to protect DNS servers against these and similar attacks. Infoblox actively monitors the latest DNS-based vulnerabilities and ensures that it provides protection against these attacks out of the box. Another advantage of Advanced DNS Protection s rule set is that it is automatically applied to DNS servers. It does not require manual intervention, either through writing scripts or applying them. This automatic deployment of protection rules can save precious time during an attack. 5 WHITE PAPER Designing a Secure DNS Architecture

Infoblox DNS Firewall Infoblox DNS Firewall addresses the problem of Malware and APTs using DNS to communicate with botnets and command-and-control servers to exfiltrate data. It detects and mitigates communication attempts by Malware to malicious domains and networks by: Enforcing response policies on traffic to suspicious domains, such as blocking it, re-directing users, or allowing the traffic to pass through, so that administrators can decide what to do when a client tries to connect with a suspicious domain Leveraging up-to-date threat data both on known malicious domains and zero-day APTs Providing timely reporting on malicious DNS queries and pinpointing infected devices that are making the queries External attacks Le Re c gi on tim na at e is sa nc e Tr af fic ts Ex Le Re fle c gi tio n/ tim pl at e oi ca Am pl ifi Automated Threat Update Service Rule updates for DNS-based attacks Tr af fic tio n INTERNET Block DNS attacks Infoblox Advanced DNS Protection Infoblox DNS Caching Server Send data for reports DMZ Infoblox Reporting Server Infoblox Advanced DNS Protection with DNS Firewall Malware/APT ne lin g Tr af fic Internal attacks D N S Tu n at e tim gi Le Po i he Ca c Le gi tim at e so ni Tr af fic T AP al w ar e/ ng Send data for reports M INTRANET DNS Query Updates for DNS-based attacks and Malware/APT Endpoints Figure 2: Secure DNS Deployment 6

Flexibility and Ease of Use Regardless of what technology is used to protect an organization against external attacks, it is important to consider soft benefits of the technology. After all, the best technical solution might become shelfware if it is unrealistically difficult and cumbersome to implement. Most of today s technologies rely heavily on command-line interfaces (CLIs) and scripting languages. While these technologies look promising in architecture diagrams, the implementation phase for them is too expensive and they are too hard to maintain, resulting in enterprises never implementing the full solution. Infoblox offers its patented Infoblox Grid technology. Important features like highavailability, disaster recovery, maintenance and configuration, and backup and recovery have been built into the Grid. A network administrator can manage and configure just about everything related to DNS from the GUI, without having to get into a CLI or having to script. This significantly reduces the possibility of mistyping commands and configurations and enables the routine day-to-day activities to be delegated to junior admins. Ultimately, this helps save organizations money and enables them to provide better service to their customers. Reporting An often-overlooked aspect of DNS architecture is reporting. A modern DNS architecture should include a reporting technology that provides centralized visibility and allows users to evaluate the load on the system, diagnose problems, and be alerted when the system is under attack. Conclusion Figure 3: Infoblox Reporting Designing a scalable and secure DNS architecture requires more than increased bandwidth and QPS. What looks simple in a small test lab tends to become very complex in a larger deployment. Infoblox Secure DNS Architecture, combined with Infoblox Grid technology, provides a comprehensive, secure, and scalable DNS solution that not only provides low latency and high throughput, but also ensures availability of essential infrastructure to enable your organization to both grow and stay protected without the need for frequent infrastructure upgrades. 7 WHITE PAPER Designing a Secure DNS Architecture

About Infoblox Infoblox (NYSE:BLOX) helps customers control their networks. Infoblox solutions help businesses automate complex network control functions to reduce costs and increase security and uptime. Our technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP, and IP address management (IPAM) for applications and endpoint devices. Infoblox solutions help over 7,100 enterprises and service providers in 25 countries control their networks. 8

Corporate Headquarters: +1.408.986.4000 +1.866.463.6256 (toll-free, U.S. and Canada) info@infoblox.com www.infoblox.com EMEA Headquarters: +32.3.259.04.30 info-emea@infoblox.com APAC Headquarters: +852.3793.3428 sales-apac@infoblox.com 2014 Infoblox Inc. All rights reserved. infoblox-whitepaper-designing-secure-dns-architecture-april2014