Current Issues of Malicious Domains Blocking
Authors | |
---|---|
Year of publication | 2019 |
Type | Article in Proceedings |
Conference | 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) |
MU Faculty or unit | |
Citation | |
Web | https://ieeexplore.ieee.org/abstract/document/8717891 |
Keywords | Malware; Firewall; DNS Response Policy Zones |
Attached files | |
Description | Cyberattackers often use the Domain Name System (DNS) in their activities. Botnet C&C servers and phishing websites both use DNS to facilitate connection to or from its victims, while the protocol does not contain any security countermeasures to thwart such behavior. In this paper, we examine capabilities of a DNS firewall that would be able to filter access from the protected network to known malicious domains on the outside network. Considering the needs of Computer Security Incident Response Teams (CSIRTs), we formulated functional requirements that a DNS firewall should fulfill to fit the role of a cybersecurity tool. Starting from these requirements, we developed a DNS firewall based on the DNS Response Policy Zones technology, the only suitable open source technology available yet. However, we encountered several essential limitations in the DNS RPZ technology during the testing period. Still, our testing results show that simple DNS firewall can prevent attacks not detected by other cybersecurity tools. We discuss the limitations and propose possible solutions so that the DNS firewall might be used as a more complex cybersecurity tool in the future. Lessons learned from the deployment show that while the DNS firewall can indeed be used to block access to malicious domains, it cannot yet satisfy all the requirements of cybersecurity teams. |
Related projects: |