Network (firewall) and endpoint (antivirus) defenses react to malicious communications and code after attacks have launched. OpenDNS observes Internet infrastructure before attacks are launched and can prevent malicious Internet connections. Learning all the steps of an attack is key to understanding how OpenDNS can bolster your existing defenses.
Each step of the attacker's operation provides an opportunity for security providers to observe its presence and defend its intrusion. On the next page, four detailed example attacks are laid out using a seven-step framework.
Here is a high-level summary of the details:
It is not necessary to understand each tool and technique that attackers develop. The takeaway is to understand how multiple, and often repeated, steps are necessary for attackers to achieve their objectives.
[img src="/wp-content/uploads/sites/376/2015/05/anatomy-of-attack2.jpg" class="aligncenter"]
[row]
[column span="6"]
Firewalls and antivirus stop many attacks during several steps of the "kill chain", but the velocity and volume of new attack tools and techniques enable some to go undetected for minutes or even months.
Firewall/Antivirus View of Attacks
[img src="/wp-content/uploads/sites/376/2015/05/firewall-r1.png" class="aligncenter"]
Without visibility of where attacks are staged, each step is unique and isolated.
[/column]
[column span="6"]
OpenDNS does not wait until after attacks launch, malware install, or infected systems callback to learn how to defend against attack. By analyzing a cross-section of the world's Internet activity, we continuously observe new relationships forming between domain names, IP addresses, and autonomous system numbers (ASNs). This visibility enables us to discover, and often predict, where attacks are staged and will emerge before they even launch.
OpenDNS View of Attacks
[img src="/wp-content/uploads/sites/376/2015/05/openDNS-r1.png" class="aligncenter"]
Observe Internet infrastructure as attacks are staged to stay ahead of the subsequent
[/column]
[/row]
Once we prove our effectiveness, we are often asked: "can we get rid of our firewall or antivirus solutions?" While these existing defenses cannot stop every attack, they are still useful—if not critical—in defending against multi-step attacks. A big reason is threats never expire—every piece of malware ever created is still circulating online or offline. Signature-based solutions are still effective at preventing most known threats from infecting your systems no matter which vector it arrives: email, website, or thumbdrive. And firewalls are effective at defending both within and at the perimeter of your network. They can detect recon activities such as IP or port scans, deny lateral movements by segmenting the network, and enforce access control lists.
Here are a couple examples of how many customers free up budget for new defenses.