SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Text 
DNS Risk Framework 
Update 
#ICANN51 
14 October 2014 
John Crain & Jacks Khawaja 
Chief SSR Officer; Enterprise Risk Director
Agenda 
Text 
• History 
• Moving Forward 
#ICANN51
Text 
History 
#ICANN51
Defined Resiliency Model 
Text 
ASSETS
Text
23 Risks Defined 
Text
Text 
Moving Forward 
#ICANN51
Numbers 
Text 
• Examining Risk 
o Typically, step 1 = identify assets 
o Impractical to identify all individual elements of DNS 
• Our Approach 
Categorize assets by sphere of influence 
#ICANN51
WTexth ere can ICANN: 
Implement 
Directly Influence 
Indirectly Influence 
?
Text 
Assets directly controlled by ICANN 
• Assets that ICANN directly manages or contracts 
to third parties (Example: XXX, XXX) 
• ICANN’s own corporate infrastructure 
• External-facing services such as websites and 
request management systems 
• DNS infrastructure of L.root-servers.net 
• Others? 
#ICANN51
Text 
Assets directly influenced by ICANN 
• Assets that ICANN can influence through 
contractual agreements (Example: Service Level 
Agreements, etc.) 
• Registries or registrars are guided by contracts that 
include Service Level Agreements 
• It is their remit as the asset owners to decide how 
they meet those SLAs and how to implement 
mitigation of their risks 
#ICANN51
Text 
• The Internet is a “network of networks” and each 
operator of a network or service is ultimately 
responsible for their own risk management 
• ICANN and the community can indirectly influence 
these through outreach and awareness efforts 
• ISOC’s Deploy360 is an excellent example of this 
#ICANN51 
Assets outside ICANN’s realm
Text 
SSR-001 DDOS (Example) 
#ICANN51
SSR001 Description (abridged) 
Text 
• User or organization deprived of service(s) or 
resource(s) they would normally have 
• Distributed denial-of-service (DDoS) attack: 
o Multitude of systems (compromised or otherwise) are 
used to attack a single target 
o Flood of incoming messages to the target system 
essentially forces it to shut down. This can take two forms: 
§ Resource Depletion 
§ Resource Disruption 
#ICANN51
What is the Risk? 
Text 
• This risk discusses the probability that parts of the 
DNS could be disabled for a sustained period 
• To ascertain the likelihood or the effect of such an 
attack, it’s important to first define the assets that 
are affected. This is also critical to understanding 
who owns the risk and who is able to best mitigate 
such risks 
#ICANN51
Look at DNS Assets from Both Sides 
Text 
• Publish the data on the authoritative servers (root 
servers, TLD servers, and registrants servers) 
• Query the data on the recursive servers (ISP’s, 
corporations, and DNS service providers) 
#ICANN51
Text 
Assets directly controlled by ICANN 
Authoritative 
• ICANN: 
o Operates L.root-servers.netICANN runs some infrastructure for TLDs (ARPA, int.) 
o Runs its own network DNS infrastructure 
Recursive 
• ICANN runs its own recursive servers for staff 
• Risks to these are covered in ICANN’s ERM 
#ICANN51
Text 
Assets directly influenced by ICANN 
Authoritative 
• ICANN has an advisory committee (RSSAC) that 
provides Service Level Recommendations for root 
servers 
• (Upcoming RSSAC002) 
• ICANN has contracts in place with many, but not all 
TLDs. Those contracts contain SLAs 
Recursive 
• ?? 
#ICANN51
Text 
Authoritative 
• Registrants’ DNS services 
Recursive 
• ISPs, corporations, homes and DNS service providers 
• Should the community work together to influence these? 
• We have SSAC and RSSAC that provide advice 
#ICANN51 
Assets outside ICANN’s realm
Can We Tackle the Root Causes? 
Text 
There are many efforts underway to reduce the 
severity of DDoS attacks 
o Source Address Validation (BCP38) 
o Open Resolver project 
o Botnet dismantling 
o Others 
Should ICANN staff and community 
members play a more active role? 
#ICANN51
Going Forward 
Text 
• For each of the 23 risks, we will: 
o Document assets 
o Identify existing mitigation strategies that are in place 
o Suggest areas where new or improved mitigation plans 
may be considered 
• How do we involve community expertise? 
o Dedicated workshops? 
o Working Groups? 
o Other suggestions? 
#ICANN51
GDD + Related Sessions 
Text 
Wednesday, 15 October 
o GDD Service Delivery, Customer Service & 
#ICANN51 
Service Level Agreements 
o Universal Acceptance 
Thursday, 16 October 
o DNSSEC Key Rollover Workshop 
o Thick WHOIS Implementation (Working 
Session) 
o Deploying the IETF’s WHOIS Replacement
Text Engage with ICANN on Web & Social Media 
twitter.com/icann 
facebook.com/icannorg 
linkedin.com/company/icann 
gplus.to/icann 
weibo.com/icannorg 
flickr.com/photos/icann 
youtube.com/user/ICANNnews icann.org

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (9)

Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 

Ähnlich wie ICANN 51: DNS Risk Framework

Ähnlich wie ICANN 51: DNS Risk Framework (20)

ICANN 51: Name Collision
ICANN 51: Name CollisionICANN 51: Name Collision
ICANN 51: Name Collision
 
DNS Openness
DNS OpennessDNS Openness
DNS Openness
 
Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49Name Collision Mitigation Update from ICANN 49
Name Collision Mitigation Update from ICANN 49
 
NANOG 84: DNS Openness
NANOG 84: DNS OpennessNANOG 84: DNS Openness
NANOG 84: DNS Openness
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
ICANN Presentation - iWeek2017
ICANN Presentation - iWeek2017ICANN Presentation - iWeek2017
ICANN Presentation - iWeek2017
 
Fundamentals
FundamentalsFundamentals
Fundamentals
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
 
Revisiting the Root
Revisiting the RootRevisiting the Root
Revisiting the Root
 
ICANN 51: Universal Acceptance
ICANN 51: Universal AcceptanceICANN 51: Universal Acceptance
ICANN 51: Universal Acceptance
 
Fundamentals
FundamentalsFundamentals
Fundamentals
 
What Is DNS ?
What Is DNS ?What Is DNS ?
What Is DNS ?
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
Active Directory Fundamentals
Active Directory FundamentalsActive Directory Fundamentals
Active Directory Fundamentals
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 

Mehr von ICANN

Mehr von ICANN (20)

Call for Volunteers: Accountability & Transparency Review Team_PT
Call for Volunteers: Accountability & Transparency Review Team_PTCall for Volunteers: Accountability & Transparency Review Team_PT
Call for Volunteers: Accountability & Transparency Review Team_PT
 
Call for Volunteers: Accountability & Transparency Review Team_ZH
Call for Volunteers: Accountability & Transparency Review Team_ZHCall for Volunteers: Accountability & Transparency Review Team_ZH
Call for Volunteers: Accountability & Transparency Review Team_ZH
 
Call for Volunteers: Accountability & Transparency Review Team_ES
Call for Volunteers: Accountability & Transparency Review Team_ESCall for Volunteers: Accountability & Transparency Review Team_ES
Call for Volunteers: Accountability & Transparency Review Team_ES
 
Call for Volunteers: Accountability & Transparency Review Team_AR
Call for Volunteers: Accountability & Transparency Review Team_ARCall for Volunteers: Accountability & Transparency Review Team_AR
Call for Volunteers: Accountability & Transparency Review Team_AR
 
Call for Volunteers: Accountability & Transparency Review Team_FR
Call for Volunteers: Accountability & Transparency Review Team_FRCall for Volunteers: Accountability & Transparency Review Team_FR
Call for Volunteers: Accountability & Transparency Review Team_FR
 
Call for Volunteers: Accountability & Transparency Review Team_RU
Call for Volunteers: Accountability & Transparency Review Team_RUCall for Volunteers: Accountability & Transparency Review Team_RU
Call for Volunteers: Accountability & Transparency Review Team_RU
 
Call for Volunteers: Accountability & Transparency Review Team
Call for Volunteers: Accountability & Transparency Review TeamCall for Volunteers: Accountability & Transparency Review Team
Call for Volunteers: Accountability & Transparency Review Team
 
ICANN Expected Standards of Behavior | French
ICANN Expected Standards of Behavior | FrenchICANN Expected Standards of Behavior | French
ICANN Expected Standards of Behavior | French
 
ICANN Expected Standards of Behavior
ICANN Expected Standards of BehaviorICANN Expected Standards of Behavior
ICANN Expected Standards of Behavior
 
ICANN Expected Standards of Behavior | Russian
ICANN Expected Standards of Behavior | RussianICANN Expected Standards of Behavior | Russian
ICANN Expected Standards of Behavior | Russian
 
ICANN Expected Standards of Behavior | Arabic
ICANN Expected Standards of Behavior | ArabicICANN Expected Standards of Behavior | Arabic
ICANN Expected Standards of Behavior | Arabic
 
ICANN Expected Standards of Behavior | Chinese
ICANN Expected Standards of Behavior | ChineseICANN Expected Standards of Behavior | Chinese
ICANN Expected Standards of Behavior | Chinese
 
ICANN Expected Standards of Behavior | Spanish
ICANN Expected Standards of Behavior | SpanishICANN Expected Standards of Behavior | Spanish
ICANN Expected Standards of Behavior | Spanish
 
Policy Development Process Infographic Turkish
Policy Development Process Infographic TurkishPolicy Development Process Infographic Turkish
Policy Development Process Infographic Turkish
 
Policy Development Process Infographic Russian
Policy Development Process Infographic RussianPolicy Development Process Infographic Russian
Policy Development Process Infographic Russian
 
Policy Development Process Infographic Portuguese
Policy Development Process Infographic PortuguesePolicy Development Process Infographic Portuguese
Policy Development Process Infographic Portuguese
 
Policy Development Process Infographic Spanish
Policy Development Process Infographic SpanishPolicy Development Process Infographic Spanish
Policy Development Process Infographic Spanish
 
Policy Development Process Infographic French
Policy Development Process Infographic FrenchPolicy Development Process Infographic French
Policy Development Process Infographic French
 
Policy Development Process Infographic English
Policy Development Process Infographic EnglishPolicy Development Process Infographic English
Policy Development Process Infographic English
 
Policy Development Process Infographic Chinese
Policy Development Process Infographic ChinesePolicy Development Process Infographic Chinese
Policy Development Process Infographic Chinese
 

Kürzlich hochgeladen

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 

Kürzlich hochgeladen (20)

20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 

ICANN 51: DNS Risk Framework

  • 1. Text DNS Risk Framework Update #ICANN51 14 October 2014 John Crain & Jacks Khawaja Chief SSR Officer; Enterprise Risk Director
  • 2. Agenda Text • History • Moving Forward #ICANN51
  • 8. Numbers Text • Examining Risk o Typically, step 1 = identify assets o Impractical to identify all individual elements of DNS • Our Approach Categorize assets by sphere of influence #ICANN51
  • 9. WTexth ere can ICANN: Implement Directly Influence Indirectly Influence ?
  • 10. Text Assets directly controlled by ICANN • Assets that ICANN directly manages or contracts to third parties (Example: XXX, XXX) • ICANN’s own corporate infrastructure • External-facing services such as websites and request management systems • DNS infrastructure of L.root-servers.net • Others? #ICANN51
  • 11. Text Assets directly influenced by ICANN • Assets that ICANN can influence through contractual agreements (Example: Service Level Agreements, etc.) • Registries or registrars are guided by contracts that include Service Level Agreements • It is their remit as the asset owners to decide how they meet those SLAs and how to implement mitigation of their risks #ICANN51
  • 12. Text • The Internet is a “network of networks” and each operator of a network or service is ultimately responsible for their own risk management • ICANN and the community can indirectly influence these through outreach and awareness efforts • ISOC’s Deploy360 is an excellent example of this #ICANN51 Assets outside ICANN’s realm
  • 13. Text SSR-001 DDOS (Example) #ICANN51
  • 14. SSR001 Description (abridged) Text • User or organization deprived of service(s) or resource(s) they would normally have • Distributed denial-of-service (DDoS) attack: o Multitude of systems (compromised or otherwise) are used to attack a single target o Flood of incoming messages to the target system essentially forces it to shut down. This can take two forms: § Resource Depletion § Resource Disruption #ICANN51
  • 15. What is the Risk? Text • This risk discusses the probability that parts of the DNS could be disabled for a sustained period • To ascertain the likelihood or the effect of such an attack, it’s important to first define the assets that are affected. This is also critical to understanding who owns the risk and who is able to best mitigate such risks #ICANN51
  • 16. Look at DNS Assets from Both Sides Text • Publish the data on the authoritative servers (root servers, TLD servers, and registrants servers) • Query the data on the recursive servers (ISP’s, corporations, and DNS service providers) #ICANN51
  • 17. Text Assets directly controlled by ICANN Authoritative • ICANN: o Operates L.root-servers.netICANN runs some infrastructure for TLDs (ARPA, int.) o Runs its own network DNS infrastructure Recursive • ICANN runs its own recursive servers for staff • Risks to these are covered in ICANN’s ERM #ICANN51
  • 18. Text Assets directly influenced by ICANN Authoritative • ICANN has an advisory committee (RSSAC) that provides Service Level Recommendations for root servers • (Upcoming RSSAC002) • ICANN has contracts in place with many, but not all TLDs. Those contracts contain SLAs Recursive • ?? #ICANN51
  • 19. Text Authoritative • Registrants’ DNS services Recursive • ISPs, corporations, homes and DNS service providers • Should the community work together to influence these? • We have SSAC and RSSAC that provide advice #ICANN51 Assets outside ICANN’s realm
  • 20. Can We Tackle the Root Causes? Text There are many efforts underway to reduce the severity of DDoS attacks o Source Address Validation (BCP38) o Open Resolver project o Botnet dismantling o Others Should ICANN staff and community members play a more active role? #ICANN51
  • 21. Going Forward Text • For each of the 23 risks, we will: o Document assets o Identify existing mitigation strategies that are in place o Suggest areas where new or improved mitigation plans may be considered • How do we involve community expertise? o Dedicated workshops? o Working Groups? o Other suggestions? #ICANN51
  • 22. GDD + Related Sessions Text Wednesday, 15 October o GDD Service Delivery, Customer Service & #ICANN51 Service Level Agreements o Universal Acceptance Thursday, 16 October o DNSSEC Key Rollover Workshop o Thick WHOIS Implementation (Working Session) o Deploying the IETF’s WHOIS Replacement
  • 23. Text Engage with ICANN on Web & Social Media twitter.com/icann facebook.com/icannorg linkedin.com/company/icann gplus.to/icann weibo.com/icannorg flickr.com/photos/icann youtube.com/user/ICANNnews icann.org