Cisco: Debunking the myths of DNS security

For years, we’ve been pioneering the use of DNS to enforce security. We recognized that DNS was often a blind spot for organizations and that using DNS to enforce security was both practical and effective. Why? Because DNS isn’t optional. It’s foundational to how the internet works and and is used by every single device that connects to the network. If you’re considering using DNS for security, it’s important to understand the facts so you can combat the fiction.Myth: DNS can only provide limited insights for threat intelligence.
Thanks to DNS, we have a view of the internet that is unlike any other security provider. Using a combination of historical and live data from over 140B+ daily requests across 90 million daily users, we apply multiple statistical and machine-learning models. We then derive meaningful insights from this diverse data set, which allows us to:
- Associate attacks with specific domains, IPs, ASNs, file hashes, and email addresses in order to map out attacker infrastructure.
- Use WHOIS record data to see domain ownership and uncover other malicious domains registered with the same contact information
- See suspicious spikes in global DNS requests to a specific domain.
- Predict where future attacks might be staged by identifying related domains and IPs that are associated with malware.
- Detect fast flux domains and domains created by Domain Generation Algorithms.
- Access a massive passive DNS database to see historical data about domains.
We’ve resolved 175,427,918,134,461 (and counting!) DNS requests since 2006 –– ask other security providers if their data for threat intelligence can match this scale. You can learn more about our intelligence here: umbrella.cisco.com/products/our-intel
Read the entire article here, Debunking the myths of DNS security
Via the fine folks at Cisco Systems.
White Papers
Application Lifecycle Management with Stratusphere UX – White Paper
Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]
Share this:
2018 Will Be The Year of Citrix Migration! eG Innovations and DABCC Survey Reveals Industry Trends for XenApp and XenDesktop 7.x Migration
IGEL Community Releases Free “How-To Install and Configure the IGEL Software Platform” Made Easy Book
IGELl’s Security Enhancements for Thin Clients – White Paper
White Paper: IT Performance Monitoring Tools – Reading Between the Lines
Does Deploying Citrix in the Cloud Make Performance Monitoring Easier? – White Paper