Speaker
Description
Malicious actors exploit the DNS namespace to carry out spam campaigns, phishing attacks, malware distribution, and other harmful activities. Combating these threats demands visibility into domain existence, ownership, and nameservice activity—insights that the DNS protocol itself does not inherently provide.
In this talk, I aim to brainstorm with the operational community about the challenges and possibilities of sharing data beyond daily zone snapshots. We will explore the need for finer-grained visibility into DNS changes, the complexities of sharing business and privacy-sensitive information, and ultimately, how to enable a "follow-the-money" process to trace DNS abusers.
The goal is to spark a discussion on the feasibility of sharing additional data: What are the benefits of such sharing? What types of harm can it help prevent? What are the risks involved, and what mitigation strategies might be possible?
Talk duration | 10 Minutes (+5 for Q&A) |
---|