The ZK Research Report Dns
The ZK Research Report Dns
DNS DETECTION
AND RESPONSE
W H I T E PA P E R
Prepared by
Zeus Kerravala
ZK Research
A Division of
Kerravala Consulting
© 2023 ZK Research
ZK RESEARCH | Transform Security Effectiveness with DNS|Detection
ZK RESEARCH Report Title
andGoes
Response
Here
I nternet of Things (IoT) deployments are increasing and will double by 2030.
ZK Research forecasts that deployments will hit roughly 30 billion in seven years.
rtificial intelligence (AI) is going mainstream. The global AI market will hit just shy of
A
$300 billion by 2028. But because it’s so nascent and dynamic, the market size may end up
being multiples of that forecast. Only time will tell. However, AI is not just about a slick front
end and getting answers almost instantly; it’s about the data that underlies it all. And there will
be more data than ever in more places than ever.
All of the above trends are network centric in nature. The network is critical in ensuring these
advanced technologies deliver the anticipated business value. However, in a world where every-
$370
$345
$310
75% $260
$225
2023 $200
85%
2024
90%
2025 2023 2024 2025 2026 2027 2028
ZK Research 2023 Cloud Market Forecast; ZK Research 2023 Work-from-Home Forecast; ZK Research 2023 IoT Deployment Forecast; ZK Research 2023 AI Market Forecast
thing is connected, security must evolve as attack surfaces expand, breaches spread more quickly
and security teams get overburdened.
In this report, we’ll delve into precisely what companies can do to reduce threats, stop attacks
earlier and protect their business everywhere by focusing on a burgeoning area: Domain Name
System (DNS) detection and response (DNSDR). DNSDR can be thought of as an evolution of the
extended detection and response (XDR) framework.
Over the years, the industry has started adopting the “detection and response” framework,
beginning with endpoint detection and response (EDR), network detection and response (NDR),
identity threat detection and response (ITDR), and XDR to combat cyber threats. DNS is a unique
element that requires a similar detection and response approach because it detects threats that
stay hidden from traditional detection and response systems.
Security teams can’t possibly analyze the data fast enough to catch all the threats, which creates
considerable risk for companies. With too much data, too many siloed systems and too much manual
correlation, enterprises have significant blind spots. Imagine the damage one piece of malware can
inflict if it penetrates a company’s defenses and sits undetected for four months, wreaking havoc out
of sight. Sadly, you don’t have to imagine it.
Moreover, threat actors have gotten creative. They set up new domains several months in advance
of using them in attacks. On average, there are 200,000 new domains created every day. Obviously,
not all new domains are bad, but many are created by threat actors to wreak havoc.
EDR, which monitors end-user devices to record activities and events taking place on endpoints
DR, which monitors communications within the network to detect threats that might otherwise
N
remain hidden in unmanaged devices
I TDR, which detects threats to all service and privileged accounts on a company’s network
and cloud
DR, a culmination of these approaches, which uses the EDR, NDR and ITDR capabilities to
X
extend protection across endpoints, the network, cloud workloads, servers, email and more
These are competent tools in their specific domains. But that’s the problem—none of the ap-
proaches has total visibility across the enterprise environment, which includes not just end-user
devices but also network infrastructure, cloud resources, IoT/operational technology (OT) and remote
users. Also, they don’t track adversary infrastructure but use a malware-centric approach, which
means they cannot preempt attacks and must find a compromise that has already happened. There-
fore, there’s a real need to do things differently.
One critical service—which is available in every network—does have enterprise-wide visibility as
well as visibility into adversary infrastructure: DNS. DNSDR leverages DNS’s unique view and posi-
tion in enterprise networks, and it just makes sense.
As we noted earlier, DNSDR can find threats and eliminate them before they hit the enterprise net-
work. In addition, DNSDR can close gaps in protection and help speed up mean time to repair (MTTR)
for security operations (SecOps) teams by providing network and threat context and automation.
Everything that traverses the internet interacts with DNS. Whether it’s emails, website traffic or malicious actors, it all has
to go through DNS.
DNS translates domain names into IP addresses that computers use to identify and communicate with each other
on the internet.
Typing a domain name into a web browser or sending an email triggers a request to a DNS server, which then finds the
corresponding IP address for that domain name.
DNS is a critical component of the internet infrastructure, enabling the smooth functioning of various online services. It
helps users access websites and other resources by displaying domain names that are easy to understand and remember,
which simplifies the web navigation process.
relate an IP address to a network-connected device and the actual associated user. And the only
way to do that is to pore over various logs or put in a request to IT—and it could take hours or even
days to get the necessary data. Of course, this increases the time to respond to security events and
burdens the already-strapped SecOps group. So, why keep doing the same thing the way you’ve
always done it when it’s just not working?
There’s a completely new approach to detection and response that does what’s needed:
DNSDR. DNS spans the whole company and provides a rich set of telemetry. A DNS server is the
first element of the infrastructure to encounter a request to connect with any internet destination.
This is how malware typically inserts itself into an environment. After establishing a foothold, the
attacker can now remote control the device via command and control, move laterally and finally
carry out their intended goals such as data exfiltration.
Users
device that has connected to the network when that device requests an IP address (via DHCP). IPAM
tracks and updates each device whenever there are any changes, such as a user roaming from one
network to another (which requires a new IP lease), keeping a history of each assigned IP address
along with the times they were used on the device.
All of this information is then stored in the centralized IPAM database for everything connected to
the network, and it becomes a real-time reflection of all devices.
DDI can easily
In addition, you can integrate the DNS, DHCP and IPAM (DDI) system into authentication sys-
tems, collect network data and correlate with the integrated DNS server. These additional integra-
correlate DNS
tions provide a complete overview of any device on the network, such as the following:
• The device’s media access control (MAC) address
queries to a
• The device type and operating system
• The user’s credentials logged into the system
device with high
• Network information, such as which access point or switch port is connected to the device
• A history of all of the IP addresses assigned over time
accuracy.
In addition, DDI can easily correlate DNS queries to a device with high accuracy.
So, why is this important for security? When there is a security event, IPAM data can be automati-
cally included in the event information. Instead of a security alert containing only an IP address, the
reporting can consist of additional information, such as the details highlighted above. This approach
reduces the burden on SecOps because there’s no need to find anything manually or to try to corre-
late multiple different types of data. Plus, the team can act faster, thereby reducing the impact of an
attack and improving MTTR. So, it’s clear that DNSDR works well with IPAM, which provides network
context and device attribution for faster response times.
In addition, all this context and event data can be shared automatically with the rest of the security
ecosystem stack in an enterprise network to accomplish the following:
• Help with faster analysis in a security information and event management (SIEM)/security
orchestration, automation and response (SOAR) tool
• Trigger additional response actions such as vulnerability scans or IT ticketing
Infoblox was founded in 1999 and continually supports more than 13,000 customers, includ-
ing 92 of the Fortune 100—companies such as Hershey’s, the Texas Rangers and the Port of
Antwerp—as well as emerging innovators across 154 countries, enabling them to build safer, more
resilient environments. The company delivers a simplified cloud-enabled networking and security
platform that provides improved performance and protection.
Infoblox’s broad ecosystem of partnerships creates seamless security workflows. Its close part-
nerships with companies such as Splunk, Microsoft, ThreatQuotient and AWS mean that Infoblox
integrates deeply across cloud orchestration and security partners. Consequently, customers can
continue to use existing solutions and improve their ongoing return on investment. Exhibit 3 high-
Experts in
Threat Intel
Visibility
in Global
DNS
lights how Infoblox’s DNS intelligence is composed of DNS information as well as threat information,
data science and global visibility.
ZK Research believes that DNS security is the simplest and most effective starting point for any
security strategy. As the leader in that area, Infoblox should be at the top of your list to unify network-
ing and security and stop most malware before it becomes a problem.
CONTACT
[email protected]
Cell: 301-775-7447
Office: 978-252-5314
© 2023 ZK Research:
A Division of Kerravala Consulting
All rights reserved. Reproduction
or redistribution in any form without
the express prior permission of
ZK Research is expressly prohibited.
For questions, comments or further
information, email [email protected].