NetBeacon MAP

Revision as of 01:28, 18 May 2024 by Christiane (talk | contribs) (Added ref)

NetBeacon Measurement and Analytics Platform (MAP) (formerly DNSAI:Compass until June, 2023 and DNSAI Intelligence until September, 2022) is NetBeacon Institute initiative to measure and track the use of the DNS for phishing and malware.The goal is to reduce DNS Abuse at the DNS level.[1] It was initially launched in September, 2022, but the first publication about the initiave was in May, 2022.[2] In June, 2023, the Institute announced the addition of a new level of reporting for their measurement project, which they called NetBeacon Measurement and Analytics Platform (MAP).[3]

Collaborations edit

NetBeacon MAP is a collaboration with KOR Labs, led by Dr. Maciej Korczynski. KOR Labs is responsible for collecting the data following an established methodology. This data is then provided to the Institute, that works with PIR’s Data Analytics team to create interactive charts, reports, and individualized dashboards.[1]

Methodology edit

The methodologies employed by KOR Labs to develop the then called DNS Abuse Institute Intelligence reports aim to provide reliable and actionable data on the state of DNS abuse, focusing primarily on phishing and malware. As per 2022, we have the following:

Data Collection and Processing edit

  • URL Blocklists: Utilizes data from reputable sources (APWG, PhishTank, OpenPhish, ABUSE.ch) to gather URLs associated with phishing and malware.
  • Domain Names: Collects domain names from various TLDs using zone files and other measurement methods to ensure a comprehensive list.
  • Technical Registration Information: Gathers registration details using RDAP/WHOIS protocols to identify registrars and gather creation/expiration dates of domains.
  • Uptime Measurements: Measures the time between a domain being blocklisted and the mitigation of the abuse (e.g., removal of malicious content).

Security Metrics edit

  • Occurrence Metrics: Calculates the distribution of abusive domain names and presents data normalized by the size of TLDs or registrars.
  • Persistence Metrics: Measures the persistence of abuse (uptime) to indicate how quickly abuse is mitigated once identified.

Classification of Domains edit

  • Malicious vs. Compromised Domains: Differentiates between domains registered for malicious purposes and benign domains that are compromised. Utilizes a hybrid method combining a machine learning classifier (MalCom) and manual analysis based on mitigation actions.

TLD and Registrar Size Estimation edit

  • Estimates the number of domains under management for each TLD and registrar to normalize the metrics.

Challenges and Limitations edit

  • Acknowledges various challenges in data collection, such as false positives, limitations in WHOIS data, and difficulties in identifying ccTLD registrars.[4]

Reports edit

NetBeacon MAP can can be consumed in three formats:

NetBeacon MAP: Monthly Analysis reports provide detailed tables identifying registrars and TLDs with high and low relative levels of malicious phishing and malware in their domains under management (DUM) and compared to their new monthly registrations.[5] On September 16, 2022, the first report was launched, and focused on higher level aggregate data from May, June, and July 2022. There reports continued monthly.[6] In April, 2024, the Institute launched its twentieth report.

NetBeacon MAP: Charts can be used by registries and registrars to understand how often the DNS is used for phishing and malware, whether abuse is mitigated, how quickly, and the type of registrations (compromised website or maliciously registered domain).[7]

NetBeacon MAP: Dashboards permits registries and registrars to understand, track and benchmark the impact of their efforts to combat DNS Abuse. Accessing one's organizational dashboard helps to understand how much phishing and malware NetBeacon MAP has identified in a particular zone, whether it has been mitigated, and how this compares to one's peers. It's possible to view analysis on whether the domain name was maliciously registered for the purposes of DNS Abuse or is associated with an issue of compromise (typically website compromise). Data can be used to track and measure the prevalence of abuse as well as how changes in one's processes and policies make an impact over time.[8]

Results edit

Chart 1: Aggregate Trends: This table provides a view on how much DNS Abuse has been identified by their methodology, and how it’s changing over time. It shows the absolute volume of unique domains their methodology has identified are engaged in phishing and malware, broken out by category.

Month-Year Phishing Malware
May-2022 30,633 3,410
Jun-2022 28,646 910
Jul-2022 26,209 355
Aug-2022 30,933 243
Sep-2022 36,862 4,056
Oct-2022 34,969 7,781
Nov-2022 28,185 7,058
Dec-2022 29,117 13,941
Jan-2023 25,934 321
Feb-2023 25,558 2,631
Mar-2023 25,532 1,743
Apr-2023 20,274 3,367
May-2023 18,827 5,227
Jun-2023 18,794 2,540
Jul-2023 22,272 220
Aug-2023 23,708 163
Sep-2023 20,486 577
Oct-2023 22,842 2,092
Nov-2023 22,703 1,488
Dec-2023 20,214 1,774
Jan-2024 21,917 226
Feb-2024 24,232 309

[7]

References edit