/
FastFlux Activity Data - Initial Draft
FastFlux Activity Data - Initial Draft
DRAFT -- for discussion purposes only
Framing
- What facts would we need in order to understand its scale and scope?1a. How many IP addresses are known to be participating as fastflux nodes?
1b. How many domains names use fastflux?
1c. How many unique name servers support fastflux domains?
1d. What fraction of those unique name servers are themselves served on
fastflux IPs?
1e. What registrars or registration service providers have been used to
create fastflux domains?
1f. If notified that a customer's domain is fast fluxing, what (if anything)
will a registrar or registration service provider do? How long does it
take them to do it? If they do nothing, why? If they do do something,
what do they do?
1g. If notification is made to ISPs, will they pass those notifications
along to the infected customers? If so, do the customers, once notified,
appear to be remediated (or at least cease to be seen as fastflux nodes?)* Where could we get those facts?2a. Accept a feed of fastflux domain name candidates, and verify the IP
addresses on which they live.
2b. From the 2a list, extract name servers and registrars/registration
service providers
2c. Contact the registrar/registration service provider with the observed
data, and note their response (including the time required to make
those reports, and the time required for the registrar/registration
service provider to respond/react). Truncating the right tail of the
response window at some reasonable time period may be desirable.
2d. Track individual fastflux IP's over time, including noting time of
ISP notification.* Are the statistics being collected now? how well -- is the data credible?3. I'm a big believer of data replication and validation. I'd encourage folks
who feel likewise to participate in measuring this phenomena. Replication
brings validity and trust.* If they're being collected, is the person/organization willing to share them?4. In the "everyone a gardner/hunter, everyone a chef" model, that's up
to each gardner/hunter chef. :-)* If they're not being collected now, what's the best place to get them and is it worth it to go after them?
Requests:
- Does data exist which supports the general characterization of addresses to which domains momentarily resolve to, perhaps many times, and perhaps for more than one domain, are dynamically assigned, from provider assigned blocks?
Current Data
- Research report by Minaxi Gupta, features recent data and good suggestions for automated data collection in the future -- Click here for the full report
- From the reportTop eight ASNs observed while monitoring 33 fast-flux domains over a period of seven weeks.1) 7132 (AT&T Internet Services, US) 2,677
2) 9304 (Hutchison Global, HK) 1,797
3) 4766 (Korea Telecom, KR) 590
4) 3320 (Deutsche Telekom, DE) 500
5) 8551 (Bezeqint Internet, IL) 445
6) 12322 (Proxad/Free ISP, FR) 418
7) 8402 (Corbina telecom, RU) 397
8) 1680 (NetVision Ltd., US) 361
- From the reportTop eight ASNs observed while monitoring 33 fast-flux domains over a period of seven weeks.1) 7132 (AT&T Internet Services, US) 2,677
- Data provided by Jose Nazario, arbor.net -- and here's a related presentation- the scale and scope of fast-flux activities (ie, what percent of IP
addresses, and what percent of domain-names are used for fast-flux?)ATLAS measures fast flux botnet membership via active polling of the domain names. that said, ATLAS sees ~3000 unique IPs for those addresses every 24 hours or so.
ATLAS is currently tracking ~6400 fast flux domain names.
both values are sub 1% for their entity class. even if we're off by a reasonsable factor of 10 it's just not a "big" problem in terms of populations.
active polling gives us between 1 and 5 % botnet visibility for botnets using fast flux (a small minority of all botnets) when we compare actve botnet measurements vs DNS-based methods.- the impact of fast flux (how many networks, businesses, etc. suffer
harm -- and what kind of harm)there are at least two sides to the "harm" question: infected machines participating in the fast flux network and victims who click the links to go there (ie folks lured in by the storm worm campaigns). the latter is well measured by various groups. the former is something we can eastimate in ATLAS.
here's top 20 ASNs by infected bot count in the past 24 hours:
150 | AS7132 SBIS-AS - AT&T Internet Services
121 | AS8708 RDSNET RCS & RDS S.A.
117 | AS8402 CORBINA-AS Corbina Telecom
88 | AS9121 TTNET TTnet Autonomous System
72 | AS5617 TPNET Polish Telecom's commercial IP network
57 | AS8997 ASN-SPBNIT OJSC North-West Telecom Autonomous System
53 | AS13184 HANSENET HanseNet Telekommunikation GmbH
50 | AS8615 CNT-AS CNT Autonomous System
50 | AS8551 BEZEQ-INTERNATIONAL-AS Bezeqint Internet Backbone
50 | AS4766 KIXS-AS-KR Korea Telecom
47 | AS9304 HUTCHISON-AS-AP Hutchison Global Communications
47 | AS12714 TI-AS NetByNet Holding
43 | AS4837 CHINA169-BACKBONE CNCGROUP China169 Backbone
43 | AS3209 Arcor IP-Network
36 | AS9829 BSNL-NIB National Internet Backbone
36 | AS6830 UPC UPC Broadband
36 | AS1680 NetVision Ltd.
32 | AS6746 ASTRAL ASTRAL Telecom SA, Romania
32 | AS3320 DTAG Deutsche Telekom AG
What are dates of these comments?
contributed by Guest User on Oct 21 10:35am