System for detecting the presence of rogue domain name service providers through passive monitoring

ABSTRACT

A method, system, and computer program product embodied in a computer readable storage medium are disclosed for identifying a rogue domain name service (DNS) server. Embodiments include passively monitoring traffic on a target network; and identifying a DNS resolution response in the traffic on the network. The DNS resolution response includes a mapping of a domain to an internet protocol (IP) address. The DNS resolution response is compared with a preconfigured list of known mappings of domains to IP addresses. Based on the results of the comparison, it can be determined whether the DNS resolution response is correct. In cases where the DNS resolution response is incorrect, the provider of the DNS resolution response is a rogue DNS server.

CROSS REFERENCE TO RELATED APPLICATION

This patent application is related to commonly-assigned U.S. patentapplication Ser. No. ______, (Attorney Docket No. CHA920120011US1),filed concurrently with this application.

TECHNICAL FIELD

The invention relates generally to identifying untrusted or compromisedsources for network information. More particularly, the inventionrelates to identifying rogue DNS servers via passive monitoring.

BACKGROUND

The Domain Name Service (DNS) resolves alphanumeric domain names intonumeric IP addresses. This service is provided by a loose collection ofservers scattered around the Internet as well as within local Intranets.If, however, the information supplied through this service comes notfrom an authorized source, but rather, an attacker's system supplyingincorrect information or from an authorized source that has beencompromised, network traffic could be impeded in a denial of service(DOS) attack or misrouted in a spoofing or man-in-the-middle attack.This could result in sensitive traffic being delivered to untrustedsystems or not being delivered at all.

One way that these services could be subverted would be if an attackerset up an “evil twin” WiFi hotspot which impersonates a trusted wirelessaccess point and establishes itself as a man-in-the-middle (MITM), whichreroutes network traffic. The MITM can examine and modify all trafficcoming into and going out of the rogue network. Another way would be forthe attacker to set up a rogue server which hijacks network services bybroadcasting to all nodes in the network that it is online and availableto process DNS requests. Yet another way would be for an attacker tocompromise a trusted DNS server and cause it to produce erroneousresults. In many cases, the last server to broadcast will be consideredauthoritative by other nodes in the network.

One solution for detecting such untrusted or compromised sources ofnetwork information is the use of a DNS watcher which performs a “healthcheck” by polling a preconfigured list of trusted DNS servers to verifythat they are operational and are returning proper results. There areseveral drawbacks to this method, however. Polling operations generateadditional, superfluous network traffic, and may be discovered by anattacker's reconnaissance of the target network. A polling approach alsoonly verifies whether known DNS servers are performing properly. Byvirtue of the active nature of polling specific known DNS servers, it isunable to verify the correctness of DNS resolutions returned by hostsother than the known hosts being polled. Since rogue DNS providers wouldnot be known in advance, they would go unchecked by a polling solution.

BRIEF DESCRIPTION

In general, aspects of the present invention provide a passivemonitoring solution for identifying a rogue DNS server in a networkwhich does not generate additional network traffic, and is able tomonitor DNS resolutions provided by both known and unknown DNS servers.

A first aspect of the disclosure provides a method for identifying arogue domain name service (DNS) server. The method comprises: passivelymonitoring traffic on a network; identifying a DNS resolution responsein the traffic on the network, wherein the DNS resolution responseincludes a mapping of a domain to an internet protocol (IP) address;comparing the DNS resolution response with a preconfigured list of knownmappings of domains to IP addresses; and determining whether the DNSresolution response is correct based on the comparing.

A second aspect of the disclosure provides a system for identifying arogue domain name service (DNS) server. The system comprises: amonitoring component for passively monitoring traffic on a network; anidentification component for identifying a DNS resolution response inthe traffic on the network, wherein the DNS resolution response includesa mapping of a domain to an internet protocol (IP) address; a comparisoncomponent for comparing the DNS resolution response with a preconfiguredlist of known mappings of domains to IP addresses; and a determinationcomponent for determining whether the DNS resolution response is correctbased on the comparing.

A third aspect of the disclosure provides a computer program productembodied in a computer readable storage medium which, when executed by acomputing device, causes the computer system to implement a method foridentifying a rogue domain name service (DNS) server. The methodcomprises: passively monitoring traffic on a network; identifying a DNSresolution response in the traffic on the network, wherein the DNSresolution response includes a mapping of a domain to an internetprotocol (IP) address; comparing the DNS resolution response with apreconfigured list of known mappings of domains to IP addresses; anddetermining whether the DNS resolution response is correct based on thecomparing.

These and other aspects, advantages and salient features of theinvention will become apparent from the following detailed description,which, when taken in conjunction with the annexed drawings, where likeparts are designated by like reference characters throughout thedrawings, disclose embodiments of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a data processing system suitable for implementing anembodiment of the invention.

FIG. 2 shows a schematic data flow diagram illustrating monitoring of anetwork according to an embodiment of the invention.

FIG. 3 shows a schematic data flow diagram illustrating identificationof a rogue DNS server according to an embodiment of the invention.

FIG. 4 shows a preconfigured DNS resolution table in accordance with anembodiment of the invention.

FIG. 5 shows a flow chart for a method of identifying a rogue DNS serverin accordance with an embodiment of the invention.

The drawings are not necessarily to scale. The drawings are merelyschematic representations, not intended to portray specific parametersof the invention. The drawings are intended to depict only typicalembodiments of the invention, and therefore should not be considered aslimiting the scope of the invention. In the drawings, like numberingrepresents like elements.

DETAILED DESCRIPTION OF THE INVENTION

As indicated above, aspects of the present invention provide a solutionfor detecting the presence of rogue DNS servers through the use of amonitor which passively observes the flow of traffic across a networkbetween nodes, and looks for spoofed DNS traffic in that network. Insome embodiments, the network may be a local Intranet, and in others,the network may be the Internet.

Turning to the drawings, FIG. 1 shows an illustrative monitor 100 fordetecting the presence of rogue DNS servers 215 that may be present innetwork 200. To this extent, monitor 100 includes a computer system 102that can perform a process described herein in order to identify aninvalid DNS resolution response from a rogue DNS server 215. Inparticular, computer system 102 is shown including a computing device104 that includes a rogue DNS server identification program 140, whichmakes computing device 104 operable to identify a rogue DNS server 215by performing a process described herein.

Computing device 104 is shown including a processing unit 106 (e.g., oneor more processors), a memory 110, a storage system 118 (e.g., a storagehierarchy), an input/output (I/O) interface component 114 (e.g., one ormore I/O interfaces and/or devices), and a communications pathway 112.In general, processing unit 106 executes program code, such as rogue DNSserver identification program 140, which is at least partially fixed inmemory 110. To this extent, processing unit 106 may comprise a singleprocessing unit, or be distributed across one or more processing unitsin one or more locations.

Memory 110 can also include local memory, employed during actualexecution of the program code, bulk storage (storage 118), and/or cachememories (not shown) which provide temporary storage of at least someprogram code in order to reduce the number of times code must beretrieved from bulk storage 118 during execution. As such, memory 110may comprise any known type of data storage and/or transmission media,including magnetic media, optical media, random access memory (RAM),read-only memory (ROM), a data cache, a data object, etc. Moreover,similar to processing unit 116, memory 110 may reside at a singlephysical location, comprising one or more types of data storage, or bedistributed across a plurality of physical systems in various forms.

While executing program code, processing component 106 can process data,which can result in reading and/or writing transformed data from/tomemory 110 and/or I/O component 114 for further processing. Pathway 112provides a direct or indirect communications link between each of thecomponents in computer system 102. I/O interface component 114 cancomprise one or more human I/O devices, which enable a human user 120 tointeract with computer system 102 and/or one or more communicationsdevices to enable a system user 120 to communicate with computer system102 using any type of communications link.

To this extent, rogue DNS server identification program 140 can manage aset of interfaces (e.g., graphical user interface(s), applicationprogram interface, and/or the like) that enable human and/or systemusers 120 to interact with rogue DNS server identification program 140.Further, rogue DNS server identification program 140 can manage (e.g.,store, retrieve, create, manipulate, organize, present, etc.) the data,such as data stored in table 220 (FIGS. 2-4), using any solution.

In any event, computer system 102 can comprise one or more generalpurpose computing articles of manufacture 104 (e.g., computing devices)capable of executing program code, such as rogue DNS serveridentification program 140, installed thereon. As used herein, it isunderstood that “program code” means any collection of instructions, inany language, code or notation, that cause a computing device having aninformation processing capability to perform a particular action eitherdirectly or after any combination of the following: (a) conversion toanother language, code or notation; (b) reproduction in a differentmaterial form; and/or (c) decompression. To this extent, rogue DNSserver identification program 140 can be embodied as any combination ofsystem software and/or application software. In any event, the technicaleffect of computer system 102 is to provide processing instructions tocomputing device 104 in order to identify a rogue DNS server.

Further, rogue DNS server identification program 140 can be implementedusing a set of modules 142-150. In this case, a module 142-150 canenable computer system 102 to perform a set of tasks used by rogue DNSserver identification program 140, and can be separately developedand/or implemented apart from other portions of rogue DNS serveridentification program 140. As used herein, the term “component” meansany configuration of hardware, with or without software, whichimplements the functionality described in conjunction therewith usingany solution, while the term “module” means program code that enables acomputer system 102 to implement the actions described in conjunctiontherewith using any solution. When fixed in a memory 110 of a computersystem 102 that includes a processing component 106, a module is asubstantial portion of a component that implements the actions.Regardless, it is understood that two or more components, modules,and/or systems may share some/all of their respective hardware and/orsoftware. Further, it is understood that some of the functionalitydiscussed herein may not be implemented or additional functionality maybe included as part of computer system 102.

When computer system 102 comprises multiple computing devices 104, eachcomputing device 104 can have only a portion of rogue DNS serveridentification program 140 fixed thereon (e.g., one or more modules142-150). However, it is understood that computer system 102 and rogueDNS server identification program 140 are only representative of variouspossible equivalent computer systems that may perform a processdescribed herein. To this extent, in other embodiments, thefunctionality provided by computer system 102 and rogue DNS serveridentification program 140 can be at least partially implemented by oneor more computing devices that include any combination of general and/orspecific purpose hardware with or without program code. In eachembodiment, the hardware and program code, if included, can be createdusing standard engineering and programming techniques, respectively.

When computer system 102 includes multiple computing devices 104, thecomputing devices can communicate over any type of communications link.Further, while performing a process described herein, computer system102 can communicate with one or more other computer systems using anytype of communications link. In either case, the communications link cancomprise any combination of various types of wired and/or wirelesslinks; comprise any combination of one or more types of networks; and/orutilize any combination of various types of transmission techniques andprotocols.

As discussed herein, rogue DNS server identification program 140 enablescomputer system 102 to implement identification of a rogue DNS server.To this extent, rogue DNS server identification program 140 is shownincluding a monitoring module 142, an identifying module 144, acomparison module 146, a determination module 148, and an alarm module150.

Referring now to FIGS. 2-3, the network environment 200 in which monitor100 may be used is depicted. As illustrated, network 200 may include arequester 205, which may be a client workstation operated by a user or aserver. Additional requesters 205 may be included in network 200, butare omitted from the depiction of network 200 in FIGS. 2-3 forsimplicity. Requester 205 may send a DNS resolution request 201 forresolution of a particular host's alphanumeric domain name into anumeric IP address.

As shown in FIG. 2, under normal operating conditions, in which anattacker is not present in network 200, DNS resolution request 201 isreceived and processed by authorized DNS server 210, which sends DNSresolution response 202. In that case, DNS resolution response 202 maycontain a valid and accurate mapping of domain name to IP address.

In other cases, as shown in FIG. 3, an attacker's rogue DNS sever 215may be present in network 200 with the purpose of impersonating anothercomputing system. In this case, DNS resolution request 201 is receivedand processed by rogue DNS server 215, and DNS resolution response 202is provided by rogue DNS server 215. Such a DNS resolution response 202may contain an incorrect domain name to IP address mapping, resulting ineither misrouting of network traffic in a spoofing attack in whichsensitive traffic is delivered to an untrusted system, or impeding ofnetwork traffic in a denial of service (DOS) attack.

In either case, monitor 100 is positioned at a strategic point innetwork 200 such that monitor 100 can observe the flow of networktraffic between nodes on network 200. As discussed above with referenceto FIG. 1, monitor 100 includes modules 142-150, which when executed bycomputer system 102, perform passive monitoring of traffic on network200, including, among other network traffic, DNS resolution requests 201and DNS resolution responses 202.

Referring concurrently to FIGS. 1-3, monitoring module 142, part ofmonitor 100, performs monitoring 143 of traffic across network 200,including DNS resolution requests 201 and DNS resolution responses 202.Identification component 144 can identify, in the traffic monitored onthe network 200, a DNS resolution response 202. As mentioned previously,a DNS resolution response 202 includes a mapping of a domain name 225 toan IP address 230 in response to a DNS resolution request 201 sent byrequester 205.

Once a DNS resolution response 202 is identified, comparison module 146can perform a comparison of the DNS resolution response 202 with theknown mappings stored in a preconfigured list of known mappings ofdomain names and IP addresses contained in a known DNS resolution table220. The mappings of domain names to IP addresses contained in table 220are known to be valid. As shown in FIG. 4, the IP address 230 stored intable 220 may be expressed as a specific IP address, such asyyy.yyy.yyy.yyy, the IP address of the domain mybank.com. In otherembodiments, IP addresses 230 stored in table 200 may be expressed as arange of IP addresses using at least one wild card. A range of IPaddresses may be broad, including several wild cards such as, forexample, xxx.*.*.*, the IP address range for the domain company.com. Inother embodiments the range of IP addresses may be narrower, for examplehaving only one wild card, such as zzz.zzz.zzz.1??, the IP address rangefor the domain email.org.

According to embodiments of the invention, the list of mapped domainnames 225 and IP addresses 230 stored in table 220 need not be anexhaustive list of domains that a user of network 200 may access, or forwhich requester 205 may request DNS resolutions. Rather, a selectednumber of hosts may be included in table 220 as a representative sample.In some embodiments, table 220 may include a preconfigured list ofdomains and their respective IP addresses whose selection for inclusionin table 220 is based on the domain hosting particularly sensitiveinformation accessed by network users. In other embodiments, table 220may include a preconfigured list of domains and their respective IPaddresses whose selection for inclusion in table 220 is based on a highfrequency of visits by users of network 200, and therefore a highlikelihood of a large sample pool of DNS resolution requests andresponses to monitor.

Referring back to FIGS. 1-3, determination module 148 performs adetermination of whether the DNS resolution response 202 contains acorrect and valid mapping of IP address to domain name. Thisdetermination is based on the comparison performed by comparison module146. Where the mapping in DNS resolution response 202 matches themapping for the respective domain name stored in table 220, DNSresolution response 202 is determined to be correct. This would indicatethat DNS resolution response 202 may have been sent by authorized DNSserver 210 (FIG. 2). Where the mapping in DNS resolution response 202does not match the mapping for the respective domain name in table 220,DNS resolution response 202 is determined to be invalid. This wouldindicate that DNS resolution response 202 may have been sent by rogueDNS server 215 (FIG. 3), and may indicate the occurrence of either aspoof or DOS attack. In this case, alarm module 150 sends an alarm 240to advise requester 205 of the spoofed DNS traffic. In variousembodiments, alarm 240 may take the form of a message (email, SMS,etc.), a log entry, or other form of security event notification whichdocuments and draws attention to the suspicious behavior.

The foregoing method is depicted in a flow chart in FIG. 5. Aspreviously described, a monitor passively monitors traffic over anetwork. Over this network, a requesting workstation requests a DNSresolution of a particular domain. A DNS resolution response is returnedto the Requester over the network by a DNS server. The DNS resolutionresponse is identified by the monitor among the monitored networktraffic. Once identified, the mapping of an IP address to a domaincontained in the DNS resolution response is compared to a preconfiguredlist of known mappings of IP addresses to domains. If neither the domainnor the IP address in the DNS resolution response appears in thepreconfigured list of known mappings of IP addresses to domains, themonitor simply returns to monitoring the network.

If either the domain or the IP address in the DNS resolution responseappears in the preconfigured list of known mappings of IP addresses todomains, the mapping contained in the DNS resolution request is comparedto the corresponding mapping in the preconfigured list of known mappingsof IP addresses to domains. If the mapping matches, i.e. both the IPaddress and the respective domain are the same in the DNS resolutionresponse and the preconfigured list of known mappings of IP addresses todomains, then it can be determined that the DNS resolution response iscorrect and the DNS server that sent it is authorized. If, however, themapping does not match, i.e., the domain corresponds to different IPaddresses in the DNS resolution response and the preconfigured list ofknown mappings of IP addresses to domains (or the IP address correspondsto different domains in the DNS resolution response and thepreconfigured list of known mappings of IP addresses to domains), thenit can be determined that the DNS resolution response is invalid. Insuch a case, it can be concluded that the DNS server that sent it is notauthorized, and may be a rogue DNS server. In this instance, an alarm isinitiated, alerting the requester to the security risk.

While shown and described herein as a method and system for identifyinga rogue DNS server, it is understood that aspects of the inventionfurther provide various alternative embodiments. For example, in oneembodiment, the invention provides a computer program fixed in at leastone computer-readable medium, which when executed, enables a computersystem to implement identification of a rogue DNS server, To thisextent, the computer-readable medium includes program code, such asrogue DNS server identification program 140 (FIG. 1), which implementssome or all of a process described herein. It is understood that theterm “computer-readable medium” comprises one or more of any type oftangible medium of expression, now known or later developed, from whicha copy of the program code can be perceived, reproduced, or otherwisecommunicated by a computing device. For example, the computer-readablemedium can comprise: one or more portable storage articles ofmanufacture; one or more memory/storage components of a computingdevice; paper; and/or the like.

In another embodiment, the invention provides a method of providing acopy of program code, such as rogue DNS server identification program140 (FIG. 1), which implements some or all of a process describedherein. In this case, a computer system can process a copy of programcode that implements some or all of a process described herein togenerate and transmit, for reception at a second, distinct location, aset of data signals that has one or more of its characteristics setand/or changed in such a manner as to encode a copy of the program codein the set of data signals. Similarly, an embodiment of the inventionprovides a method of acquiring a copy of program code that implementssome or all of a process described herein, which includes a computersystem receiving the set of data signals described herein, andtranslating the set of data signals into a copy of the computer programfixed in at least one computer-readable medium. In either case, the setof data signals can be transmitted/received using any type ofcommunications link.

In still another embodiment, the invention provides a method ofgenerating a system for identifying a rogue DNS server. In this case, acomputer system, such as computer system 102 (FIG. 1), can be obtained(e.g., created, maintained, made available, etc.) and one or morecomponents for performing a process described herein can be obtained(e.g., created, purchased, used, modified, etc.) and deployed to thecomputer system. To this extent, the deployment can comprise one or moreof: (1) installing program code on a computing device; (2) adding one ormore computing and/or I/O devices to the computer system; (3)incorporating and/or modifying the computer system to enable it toperform a process described herein; and/or the like.

As used herein, the terms “first,” “second,” and the like, do not denoteany order, quantity, or importance, but rather are used to distinguishone element from another, and the terms “a” and “an” herein do notdenote a limitation of quantity, but rather denote the presence of atleast one of the referenced item. The modifier “about” used inconnection with a quantity is inclusive of the stated value and has themeaning dictated by the context (e.g., includes the degree of errorassociated with measurement of the particular quantity). The suffix“(s)” as used herein is intended to include both the singular and theplural of the term that it modifies, thereby including one or more ofthat term (e.g., the server(s) includes one or more server). Rangesdisclosed herein are inclusive and independently combinable (e.g.,ranges of “up to about 3 wild cards, or, more specifically, about 1 wildcards to about 3 wild cards,” is inclusive of the endpoints and allintermediate values of the ranges of “about 1 wild card to about 2 wildcards,” etc.).

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

What is claimed is:
 1. A method for identifying a rogue domain nameservice (DNS) server, the method comprising: passively monitoringtraffic on a network; identifying a DNS resolution response in thetraffic on the network, wherein the DNS resolution response includes amapping of a domain to an internet protocol (IP) address; comparing theDNS resolution response with a preconfigured list of known mappings ofdomains to IP addresses; and determining whether the DNS resolutionresponse is correct based on the comparing.
 2. The method of claim 1,further comprising sending an alarm in a case in which the DNSresolution response is determined to be incorrect.
 3. The method ofclaim 2, wherein the alarm comprises at least one of an email message,an SMS message, a log entry, or a security event notification.
 4. Themethod of claim 1, wherein each IP address in the preconfigured list ofknown mappings of domains to IP addresses is a specific IP address. 5.The method of claim 1, wherein each IP address in the preconfigured listof known mappings of domains to IP addresses is a range of IP addressesexpressed using at least one wild card.
 6. The method of claim 1,wherein the preconfigured list of known mappings of domains and IPaddresses includes a preconfigured list of domains most frequentlyvisited by users of a network.
 7. The method of claim 1, wherein thepreconfigured list of known mappings of domains and IP addressesincludes a preconfigured list of domains hosting sensitive informationaccessed by network users.
 8. The method of claim 1, wherein the networkincludes an intranet.
 9. A system for identifying a rogue domain nameservice (DNS) server comprising: a monitoring component for passivelymonitoring traffic on a network; an identification component foridentifying a DNS resolution response in the traffic on the network,wherein the DNS resolution response includes a mapping of a domain to aninternet protocol (IP) address; a comparison component for comparing theDNS resolution response with a preconfigured list of known mappings ofdomains to IP addresses; and a determination component for determiningwhether the DNS resolution response is correct based on the comparing.10. The system of claim 9, further comprising an alarm component forsending an alarm in a case in which the DNS resolution response isdetermined to be incorrect.
 11. The system of claim 10, wherein thealarm comprises at least one of an email message, an SMS message, a logentry, or a security event notification.
 12. The system of claim 9,wherein each IP address in the preconfigured list of known mappings ofdomains to IP addresses is a specific IP address.
 13. The system ofclaim 9, wherein each IP address in the preconfigured list of knownmappings of domains to IP addresses is a range of IP addresses expressedusing at least one wild card.
 14. The system of claim 9, wherein thepreconfigured list of known mappings of domains and IP addressesincludes a preconfigured list of domains most frequently visited byusers of a network.
 15. The system of claim 9, wherein the preconfiguredlist of known mappings of domains and IP addresses includes apreconfigured list of domains hosting sensitive information accessed bynetwork users.
 16. The system of claim 9, wherein the network includesan intranet.
 17. A computer program product embodied in a computerreadable storage medium which, when executed by a computing device,causes the computer system to implement a method for identifying a roguedomain name service (DNS) server, the method comprising: passivelymonitoring traffic on a network; identifying a DNS resolution responsein the traffic on the network, wherein the DNS resolution responseincludes a mapping of a domain to an internet protocol (IP) address;comparing the DNS resolution response with a preconfigured list of knownmappings of domains to IP addresses; and determining whether the DNSresolution response is correct based on the comparing.
 18. The computerprogram product of claim 17, wherein the method further comprisessending an alarm in a case in which the DNS resolution response isdetermined to be incorrect.
 19. The computer program product of claim17, wherein each IP address in the preconfigured list of known mappingsof domains to IP addresses is one of: a specific IP address, or a rangeof IP addresses expressed using at least one wild card.
 20. The computerprogram product of claim 17, wherein the network includes an intranet.