Farsight Long View

Being an Internet Packrat

Written by: 
Published on: 
Aug 26, 2015
On This Page
Share:

Introduction

Data passes across the Farsight Security, Inc.Security Information Exchangeevery second of every day. While a significant percentage of it is related toPassive DNS replication, we occasionally participate in sinkhole administrationefforts for botnet cleanup operations. We forward that information in realtime to participating organizations that in turn fan that data out to ISPs andInternet security companies to help identify and remediate affected clients.

As part of curating that feed, and with the permission of the sinkholeoperator, we also normally archive that data. Doing so has paid off forapproved and vetted researchers as we can make that data available forsubsequent retrospective analysis.

Some examples follow.

“Post-Mortem of a Zombie: Conficker Cleanup After Six Years”

The Conficker sinkhole is the longest effort we’ve facilitated. After theConficker botnet wassinkholed, infected Windows clientshave continued to try to “phone home” for updates for almost seven years.Today, the Conficker botnet may be about a sixth of the size it was at itspeak, but it’s still present, on up to one million clients.

We’ve kept a Conficker data archive online in our data centers for download byresearchers and remediators alike, but it wasn’t until recently that a teamfrom Technical University Delft (NL) completed a study of long-term remediationefforts utilizing that data. Their work was accepted and presented at UsenixSecurity 2015 earlier this month (see link above).

”DNS Changer Remediation Study”

When we took part in the takedown of the DNS Changer botnet, we made periodic archives available for download bydifferent remediation teams, and we maintained the data for as long as wecould. A group from Georgia Tech (US) was able to take the data and use it tocompare different notification methods utilized during remediation efforts todetermine which were more effective.

“Developing Security Reputation Metrics for Hosting Providers”

More recently, DNS researchers at TU Delft (NL) wanted to look back, on a dailybasis, at Passive DNS DNSDB data, something we don’t normally keep (it getsrolled up into monthly databases). By special arrangement, we kept daily DNSDBdatabase dumps going long enough for them to utilize correlations from DNSresources to develop security metrics for ISPs and hosting providers. Theirwork was also just recently published earlier this month at Usenix Security(CSET ’15).

Lessons Learned

Along the way we’ve learned many lessons about long-term storage that might behelpful for other projects:

YYYY/MM/DD

Conclusion

Farsight Security is proud of our past and current public-private collaborationwith law enforcement, researchers, and Internet security organizations that putDNS and sinkhole data to good use. We look forward to making resourcesavailable for similar future efforts. If you’re a researcher that needs dataor an operator that wants to make sinkhole data available to researchers and/orindustry on a real-time basis, we encourage you to contact us.

Eric Ziegast is a Senior Distributed Systems Engineer for Farsight Security,Inc.