To mitigate DNS data exfiltration, Infoblox Threat Insight (also referred to as Threat Analytics in the Infoblox GUI or Grid Manager) employs analytics algorithms to detect DNS tunneling traffic by analyzing incoming DNS queries and responses. These algorithms are developed through an extensive study and analysis of sample DNS statistics within which DNS tunneling data is identified by algorithms that cannot be detected by normal rules and signatures. For more information about DNS data exfiltration, see About Data Exfiltration.
Infoblox Threat Insight identifies data exfiltration tunnels that bypass typical firewall systems. Some popular tunneling tools are OyzmanDNS, SplitBrain, Iodine, DNS2TCP, TCP-Over-DNS, and others. These types of DNS threats are identified as having high activities by using the TXT records in DNS queries. Infoblox Threat Insight also identifies tunnels that are used for C&C. These threats typically do not exhibit high activities or payloads. In general, NXDOMAIN responses fall into this category of threats.
You must have at least one RPZ license installed in your Grid (it can be installed on any Grid member) and the Threat Analytics license installed on the Grid member on which you want to start the threat analytics service. You can enable the threat analytics service on the supported appliances member to start the service. For more information on supported appliances, see, Supported Appliances for Infoblox Threat Insight. To download updates for threat analytics module and whitelist sets, you must have at least one Threat Analytics license installed in the Grid. When you enable the threat analytics service, NIOS starts analyzing incoming DNS data and applying these algorithms to detect security threats that have the same or similar behavior as the known data. Once security threats are detected, NIOS blacklists the domains and transfers them to the designated mitigation RPZ (Response Policy Zone), and traffic from the offending domains is blocked and no DNS lookups are allowed for these domains from NIOS members on which RPZ are assigned to them. The appliance also sends an SNMP trap each time it detects a new blacklisted domain.
Infoblox Threat Insight also includes a whitelist that contains trusted domains on which NIOS allows DNS traffic. These are known good domains that carry legitimate DNS tunneling traffic such as Avast, Sophos, McAfee, Boingo, Barracuda, and others. The whitelist is extensible so new whitelisted domains can be added and rolled out accordingly. For Threat Insight running on an On-Prem Infoblox DDI appliance, internal governance and vetting applied by Infoblox ensures all whitelist entries are accurate and curated, and contain only valid entries.
You can also add custom whitelisted domains or move blacklisted domains to the whitelist. For more information about how to configure Infoblox Threat Insight, see Configuring Infoblox Threat Insight. Before you utilize Infoblox Threat Insight, there are a few guidelines you might need to consider. For more information, see Guidelines for Using Infoblox Threat Insight.
Infoblox Threat Insight came installed with a module set and a whitelist set. To receive subsequent module set and whitelist set updates, you can configure the appliance to automatically download and apply the updates for you, or you can manually upload the updates when the appliance displays a banner message notifying about available updates. For information about how to configure the update policy, see Defining the Threat Analytics Update Policy.
You must obtain and install valid licenses on your appliance before using Infoblox Threat Insight. Contact your Infoblox representative to obtain these licenses. For more information, see Managing Licenses.
To start the threat analytics service, you must have at least one RPZ license installed in your Grid (it can be installed on any Grid member).
If you are a BloxOne Threat Defense Essentials customer, you must manually install the Threat Analytics license (not Grid-wide) on each of the Grid members that support Threat Insight. Note that this license must be different for each Grid member. If you are a BloxOne Threat Defense Business On-Premises, or a BloxOneThreat Defense Advanced customer, then you must install the Grid-wide Threat Analytics license on the Grid Master. After you install the license, all the Grid members that support Threat Insight can run the Threat Insight service. You need not manually install the license on each Grid member.
Note that running the threat analytics service might affect your system performance if the appliance has a small capacity and is taking on heavy traffic. Evaluate your Grid and Grid members to ensure that you select an appliance that is appropriate for running the threat analytics service. For more information about supported appliances for Infoblox Threat Insight and Threat Analytics Grid-wide license, see Supported Appliances for Infoblox Threat Insight and Managing Licenses.
Superusers can configure all threat protection and analytics related tasks. You can assign Security Permissions to specific admin groups and roles so these users can configure security related tasks. You can also add a global permission for managing Grid security properties or add an object permission for managing member security properties.
To manage the analytics related tasks, you must assign appropriate read-only or read/write Analytics Permissions to the specified admin groups and roles. You can also add the Global Analytics Permission as a global permission or add Member Analytics Permission to specific Grid members as an object permission. For more information about how to assign admin permissions, see Managing Permissions.
Following are some guidelines to take into consideration when using Infoblox Threat Insight:
Due to memory and capacity required to perform analytics, ensure that you install the Threat Analytics and RPZ licenses, and enable the threat analytics service on an appliance that has a big enough capacity. The following are the supported Infoblox appliance models on which you can run the threat analytics service:
Note
If you are a BloxOneThreat Defense Business On-Premises and/or BloxOneThreat Defense Advanced customer, you can install the Threat Analytics Grid-wide license on unsupported appliances. Installing the Threat Analytics Grid-wide license does not enable the threat analytics service on the unsupported appliances due to the capacity memory limitation.
You must have at least one RPZ and Threat Analytics license installed in your Grid (it can be installed on any Grid member) and enable the threat analytics service on any of the Grid members on which you want to start the threat analytics service. You must also create a new RPZ and use it as the designated mitigation blacklist feed so the appliance can transfer all blacklisted domains to this feed.
NIOS continuously collects and analyzes statistics of incoming queries and responses, detects possible DNS tunneling activities, blocks offending domains that match the known data, and updates the mitigation blacklist feed (a designated local RPZ) of any known malicious domains. For supported appliance models for Infoblox Threat Insight, see Supported Appliances for Infoblox Threat Insight.
To configure Infoblox Threat Insight, complete the following:
Note
The analytics functionality only works on recursive servers and forwarding servers that use BIND as the DNS resolver; it does not function on authoritative servers or servers that use Unbound as the DNS resolver.
After you set up Infoblox Threat Insight to mitigate DNS data exfiltration, you can do the following to manage it:
To start the threat analytics service, you must have at least one RPZ license installed in your Grid (it can be installed on any Grid member) and the Threat Analytics license installed on the Grid member on which you want to start the threat analytics service. You can also stop the service when necessary.
To start or stop the threat analytics service, complete the following:
When you stop the threat analytics service, the appliance does not detect or protect against non-signature-based DNS tunneling. In addition, reports that you generate might not include statistics related to DNS tunneling.
Note
After you enable the threat analytics service, you must restart DNS service for the analytics to start working.
The Data Management tab -> Threat Analytics tab -> Whitelist tab of the Grid Manager lists the trusted domains on which NIOS allows DNS traffic by default. These are known good domains that carry legitimate DNS tunneling traffic such as Avast, Sophos, McAfee, Boingo, Barracuda, and others. They are marked as System domains, and you cannot delete them, but you can disable them so NIOS does not treat them as trusted domains. You can also add custom domains or move blacklisted domains to the analytics whitelist. For more information, see Adding Custom Whitelisted Domains and Moving Blacklisted Domains to the Whitelist.
To view a complete list of trusted domains in the analytics whitelist, perform the following:
Note
When you upgrade to a future NIOS release or update the analytics whitelist, all changes made to the whitelist will be preserved.
You can also do the following in this panel:
The analytics whitelist is populated with trusted domains that carry legitimate DNS tunneling traffic such as Avast, Sophos, McAfee, Boingo, Barracuda, and others. For more information, see Viewing the Analytics Whitelist. You can add domains that you deem trustworthy to this list. When you add a custom domain, it is marked as Custom in the whitelist.
To add a custom whitelisted domain, complete the following:
For the threat analytics service to function properly and for NIOS to properly report detected backlisted domains, you must create and designate local RPZs as the mitigation for the Grid. You can add any Response Policy Zones to the list of RPZs from different Network and DNS Views. When a domain is detected as malicious, NIOS will update all RPZs in the list. You can configure the Highest Domain Level to block Tunnelling and specify the minimum and maximum values. The value specifies the maximum level of to block the subdomains.
Notes
If you assign an existing RPZ that is used for other purposes as the mitigation blacklist feed, you may experience the following:
Infoblox recommends that you run the threat analytics service for a limited time to monitor and preview what has been detected before actually blocking domains. To do so, set Policy Override to Log Only (Disabled) when you create the RPZ so you can monitor blacklisted domains without actually blocking them.
Note
You can designate only one local RPZ as the Grid-wide mitigation blacklist feed.
To create and designate a local RPZ as the blacklist feed, complete the following:
Create a local RPZ by completing the procedure described in Configuring Local RPZs.
Note
To monitor the threat analytics service without blocking domains, set Policy Override to Log Only (Disabled). When you are ready to block blacklisted domains, set Policy Override to None (Given).
Select Configure Domain Level to block Tunneling and enter the Highest Domain Level to block Tunneling value. This value identifies only the level of subdomains that you want to block and not all the subdomain levels. Valid values must be between 2 to 5 (both inclusive).
The detected domain is truncated based on the Highest Domain Level to Block Tunneling value. The domain detection depends on DNS tunneling algorithm.
Example: Consider the Highest Domain Level to block Tunneling is set to 3.
Note
If you do not select the Configure Domain Level to block Tunneling option, the current behavior of blacklisting the domains will remain unchanged.
Note
You cannot delete an RPZ that is used as the mitigation blacklist feed until you remove or clear it from the GridThreat Analytics Properties editor.
If your network configuration includes BloxOne Threat Defense Business On-premises, BloxOne Threat Defense Business Cloud, or BloxOne Threat Defense Advanced, you can configure the cloud integration client to collect malicious domains detected by Threat Insight in the BloxOne Threat Defense Cloud. NIOS then applies the detected domains to RPZs that are configured for the on-premises Grid. This feature ensures that all malicious domains detected in BloxOne Threat Defense Cloud are also applied to on-prem Grid members.
You can use this feature when you have BloxOne Threat Defense Business On-premises, BloxOne Threat Defense Business Cloud, or BloxOne Threat Defense Advanced license. Note that you can configure only one cloud client per on-premises Grid. Ensure that you configure the email address and password in the Grid Properties Editor before you enable the integration with BloxOne Threat Defense Cloud Client. For more information, see Configuring Integration with BloxOne Threat Defense Cloud.
To enable the integration with BloxOne Threat Defense Cloud, complete the following:
Interval: You can specify how often to request Threat Insight results detected in BloxOne Threat Defense Cloud in seconds or minutes. The default value is 10 minutes.
The list of Response Policy Zones to use for blacklisted domains: Click the Add icon to add an RPZ to the list. When there are multiple zones, Grid Manager displays the Zone Selector dialog box from which you can select one. You can add RPZs from different networks and DNS views.
Note
Whenever a new RPZ is added and NIOS requests Threat Insight results, Grid Manager displays a warning dialog box to confirm that you wish to request all domains detected by Threat Insight in the BloxOne Threat Defense Cloud. If you click No in the Warning dialog box, you can use the set cloud_services_portal_force_refresh
CLI command in maintenance mode and set the flag to request all domains detected in BloxOne Threat Defense Cloud.
To review the list of blacklisted domains, complete the following:
You can also do the following in the blacklisted domain panel:
When the appliance detects an offending domain for possible DNS tunneling, it responds according to the policy defined in the mitigation blacklist RPZ and adds the domain to the blacklist RPZ feed. You can view all blacklisted domains and turn those you deem trustworthy into trusted domains by moving them to the analytics whitelist. Note that once you move a blacklisted domain to the whitelist, you cannot reverse the action.
To move a blacklisted domain to the analytics whitelist, complete the following:
The appliance removes the selected domain from the blacklist and adds it to the analytics whitelist. You can click Go to Analytics Whitelist View to verify that the domain has been successfully moved.
Infoblox periodically releases threat analytics module and whitelist sets. To ensure that you can import threat analytics updates, you must have at least one Threat Analytics license installed in the Grid. The threat analytics module set consists of the analytics application .jar file, which delivers changes and updates for DNS tunneling detection, and the whitelist set consists of updated trusted domains that carry legitimate DNS tunneling traffic. You can download updates for the module set and whitelist set independently depending on how often Infoblox rolls them out. The appliance displays the version numbers of the module set and whitelist set that your Grid is currently using. To view this information before downloading updates, see Viewing Module and Whitelist Versions.
You can configure the appliance to automatically receive and apply the latest module set and/or whitelist set. When you define an automatic update policy, the appliance checks both the analytics module and whitelist files and automatically downloads the files that have changed. You can also configure a manual update policy in which the appliance notifies you through the message banner when there are updates available. You can then decide whether you want to apply the updates to your Grid or not. For information about how to define the update policy, see Defining the Threat Analytics Update Policy. For information about how to perform manual updates, see Manually Uploading Threat Analytics Updates.
Note
Only the Grid Master receives module and whitelist set updates. Grid member receives these updates through standard Grid replication from the Grid Master. Module and whitelist data is only replicated to Grid members that have the threat analytics service enabled (an RPZ license is required to start this service on the members). The appliance uses the port 443 (HTTPS) for downloading the module set and whitelist data updates.
Infoblox recommends that you configure the appliance to automatically receive module and whitelist updates so your appliance receives the latest information periodically. If you prefer to manually upload updates to your Grid, ensure that you apply them frequently to receive the most updated information.
To view the version number of the Threat Analytics module and whitelist that are currently running on the Grid, perform the following:
To configure how you want to obtain the latest threat analytics updates, complete the following:
In the Schedule section, select one of the following to set up a recurring schedule for automatic downloads:
Note
The scheduled time does not indicate the exact time for the download. Downloads occur during the mid-point during a 30-minute time frame. Therefore, the actual download can happen 15 minutes before or after the scheduled time.
When you select Hourly, complete the following:
When you select Daily, you can select either Every day or Every Weekday and then complete the following:
4. Save the configuration.
To configure how you want to obtain the latest threat analytics updates, complete the following:
In the Schedule section, select one of the following to set up a recurring schedule for automatic downloads:
Note
The scheduled time does not indicate the exact time for the download. Downloads occur during the mid-point during a 30-minute time frame. Therefore, the actual download can happen 15 minutes before or after the scheduled time.
For information about configuring an Hourly schedule, see Custom Hourly Schedule.
4. Save the configuration.
You can manually upload the latest whitelist or moduleset files and update them.
To manually upload threat analytics updates, complete the following:
To upload the module set or whitelist set, complete the following:
Note
You can only update to a newer whitelist set even though you can switch back to an older version of module set, if any. However, if you have configured an Automatic update policy, the appliance overwrites the older file version with the new one. To avoid this, you can change the update policy to Manual or disable automatic downloads.
Click Test to check the changes that will occur during the update, without actually applying the update. You can view update details in the Syslog Viewer. The appliance preserves the uploaded file if you do not click Update to update the module set or whitelist set. When you manually upload next time, this file name is displayed in the dialog. You can then choose to apply the update from this file or upload a new file before performing the update. Uploading a new file will remove the file that has not been applied.
3. Click Update to update the module set or whitelist set. You can also click View Update Results to view the update results.
You can monitor DNS tunneling activities through the following:
This page has no comments.