DNS Abuse SIG
The Domain Name System (DNS) is a critical part of the Internet, including mapping domain names to IP addresses. Malicious threat actors use domain names, their corresponding technical resources, and other parts of the DNS infrastructure, including its protocols, for their malicious cyber operations. CERTs are confronted with reported DNS abuse on a continuous basis, and rely heavily on DNS analysis and infrastructure to protect their constituencies. Understanding the international customary norms applicable for detecting and mitigating DNS abuse from the perspective of the global incident response community is critical for the open Internet’s stability, security and resiliency.
Goals & Deliverables
- Initially, provide a common language and a FIRST-definition of what the global incident response community understands as DNS Abuse in an operational context to protect its constituencies, as well as for purposes of global policy recommendations.
- Develop a classification scheme for DNS Abuse.
- Identify common tools, techniques, and practices of malicious DNS Abuse threat actors.
- Identify the relevant stakeholders for DNS Abuse mitigation and facilitate reasonable cooperation to mitigate DNS Abuse, including possibly recommending certain provisions be adopted in applicable registration agreements to facilitate voluntary cooperation in curbing DNS Abuse.
- Outline possible best practices for further discussion of how to effectively mitigate DNS Abuse.
- Outline possible best practices for each of the relevant stakeholders,
- Organize and/or participate in meetings or conferences on DNS Abuse, and possibly deliver relevant presentations, or coordinate their delivery as reasonably necessary in furtherance of the goals outlined above.
- John Todd
- Jonathan Matkowsky, RiskIQ-CSIRT
Any FIRST member may join, others are welcome as well, requests must be approved by the SIG chairs.