Tuesday, July 29, 2008

30 Days of DNS attack activity

 The people over at Arbor Networks have
been posting some very interesting work recently. The most recent post
presents a cursory overview of the last 30 days of DNS attack activity.

When analyzing single packet DNS version queries (i.e., in order to generate lists of vulnerable or immune servers) targeting ATLAS sensor IPs (millions of unique IPv4 addresses distributed globally) we saw a 49.8% increase in the past 30 days over the prior 30 days. While UDP/53 traffic doesn't represent a considerable amount of the total activity observed by our darknet sensors, the version queries themselves represent ~87% of all UDP/53 traffic we receive on our ATLAS sensors. These queries are targeting IPs that have no valid resolvers or authoritative DNS servers, or legitimate hosts, for that matter, so it's either misconfigured or malicious traffic, and most likely the latter. While much of this "malicious" traffic is likely vulnerable DNS server "census" queries from research types, a good bit of it is likely attributed to miscreant reconnaissance as well.


Source: http://asert.arbornetworks.com/2008/07/30-day-of-dns-attack-activity/

Thank you to the people over at Arbor Networks for sharing this kind of data with the community! Hard data is hard enough to get by and as long as we realize that this sample originates from a product vendor, it is better than not having any information at all. Very informative and worth the read.


No comments:

Post a Comment

Please share your view and opinions on what I wrote. In order to maintain quality, all comments will be moderated for merit. Contributions that call me out on statements that appear unfounded, wrong, or simply with which you disagree are highly appreciated and are even encouraged. Spam and 'me too' answers will be ignored.