[menog] FW: Methodology Review of the Domain Abuse Activity Reporting (DAAR) System
Fahd Batayneh
fahd.batayneh at icann.org
Sat Jul 21 06:42:59 UTC 2018
A paper describing the methodology used in the Domain Abuse Activity Reporting (DAAR) system and two reviews of that methodology. This might be of interest to those running TLDs, or have interest in the DNS, or work for CERTs/LEAs.
Fahd Batayneh
ICANN
Date: Saturday, July 21, 2018 at 2:09 AM
Subject: ICANN News Alert -- Methodology Review of the Domain Abuse Activity Reporting (DAAR) System
[ICANN]<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.icann.org_&d=DwMFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=pu7jN3q1ZBfuo7H0_TGgnLZ6DmTKXODkmnlRRHjLLAY&m=KXcD7ei-SQlPto1pHbtgLTrngSy9Gi7Duj397oMWXEI&s=fwdxzIZhDMuQNmjRFUXYtvah55uJ_i4e8NYoczpyzK8&e=>
News Alert
https://www.icann.org/news/announcement-2018-07-20-en<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_news_announcement-2D2018-2D07-2D20-2Den&d=DwMFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=pu7jN3q1ZBfuo7H0_TGgnLZ6DmTKXODkmnlRRHjLLAY&m=KXcD7ei-SQlPto1pHbtgLTrngSy9Gi7Duj397oMWXEI&s=4IzJwbeZHT046y2VqbreX6CP3xFj2E7sHpZb83F7BtY&e=>
________________________________
Methodology Review of the Domain Abuse Activity Reporting (DAAR) System
20 July 2018
LOS ANGELES – 20 July 2018 – Today, the Internet Corporation for Assigned Names and Numbers (ICANN) announced the publication of a paper describing the methodology used in the Domain Abuse Activity Reporting (DAAR) system and two reviews of that methodology.
DAAR was designed to provide the ICANN community with a reliable, persistent, and reproducible data from which security threat (abuse) analyses could be performed.
The experts selected for the review of the DAAR methodology are respected members of operational security, cybersecurity, and academic communities:
* Marcus Ranum is a renowned security expert. He is arguably the inventor of the modern Internet firewall and network intrusion detection system. Through his capacities as chief executive, chief technology, and chief security officer, security auditor or consultant, Ranum has accumulated extensive experience with collecting and processing threat data.
* John Bambenek is a consultant, Vice President of Security Research and Intelligence at ThreatSTOP, and a Lecturer at the University of Illinois. John has produced and developed open-source threat intelligence feeds for algorithmically generated domain names (DGA) and malware. In his role at University of Illinois, Bambenek is directing a graduate team project to analyze TLD registries, registrars, and hosting providers using a methodology similar to DAAR.
Links to the report and reviews:
* ICANN org's DAAR methodology paper<https://urldefense.proofpoint.com/v2/url?u=https-3A__icann.org_en_system_files_files_daar-2Dvalidation-2Dsow-2D20jul18-2Den.pdf&d=DwMFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=pu7jN3q1ZBfuo7H0_TGgnLZ6DmTKXODkmnlRRHjLLAY&m=KXcD7ei-SQlPto1pHbtgLTrngSy9Gi7Duj397oMWXEI&s=MlIbrp-4qn4rIF-vx4zqTI2kR-rREPh_hVopmAPwULo&e=> (PDF, 112 KB)
* Marcus Ranum's review<https://urldefense.proofpoint.com/v2/url?u=https-3A__icann.org_en_system_files_files_ranum-2Ddaar-2Dreview-2Dreport-2D20jul18-2Den.pdf&d=DwMFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=pu7jN3q1ZBfuo7H0_TGgnLZ6DmTKXODkmnlRRHjLLAY&m=KXcD7ei-SQlPto1pHbtgLTrngSy9Gi7Duj397oMWXEI&s=jG5WW0w_f9HuULKdZdE_-IC17JzgAFSGFlcrQn7D6M8&e=> (PDF, 459 KB)
* John Bambenek's review<https://urldefense.proofpoint.com/v2/url?u=https-3A__icann.org_en_system_files_files_bambenek-2Ddaar-2Dvalidation-2Dreview-2Dreport-2D20jul18-2Den.pdf&d=DwMFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=pu7jN3q1ZBfuo7H0_TGgnLZ6DmTKXODkmnlRRHjLLAY&m=KXcD7ei-SQlPto1pHbtgLTrngSy9Gi7Duj397oMWXEI&s=WkV4MfnT-HjqPmGCtfLvZcu1fuilZo3pQ0D3z5rWNUw&e=> (PDF, 377 KB)
The DAAR project has produced a system for studying and reporting domain name registration and security threat (domain abuse) behavior across top-level domain (TLD) registries and registrars. The overarching purpose of DAAR is to report security threat activity as it is experienced in network operations to the ICANN community, which can then use the data to facilitate informed policy decisions.
To inform the community of the DAAR project design objectives and the ways by which those objectives have been met, the ICANN organization has prepared a methodology white paper. The paper explains the purposes of the DAAR project and gives an overview of the system, describes the security threats that DAAR observes, and how DAAR compiles threat data from high-confidence threat reputation data feeds.
To foster confidence in the DAAR system, the ICANN org has engaged two independent experts to review the methodology paper, to comment on the threat data that DAAR consumes, and to experiment with the reporting system. The purpose of these reviews is to have experts in the field validate the methodology, attest to the reproducibility of DAAR's findings and reporting, and to attest to the quality and reliability of the reputation data that the ICANN org has chosen to use for this project.
We welcome your comments on the reports and reviews. Please send them to daar at icann.org<mailto:daar at icann.org>, by 24 August 2018. The findings and recommendations from the reviewers and parties who comment will be considered in the final drafting of the methodology paper.
About ICANN
ICANN's mission is to help ensure a stable, secure, and unified global Internet. To reach another person on the Internet, you need to type an address – a name or a number – into your computer or other device. That address must be unique so computers know where to find each other. ICANN helps coordinate and support these unique identifiers across the world. ICANN was formed in 1998 as a not-for-profit public-benefit corporation with a community of participants from all over the world.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.menog.org/pipermail/menog/attachments/20180721/ee12293d/attachment-0001.html
More information about the Menog
mailing list