ICANN ICANN Email List Archives

[gnso-ff-pdp-may08]


<<< Chronological Index >>>    <<< Thread Index >>>

[gnso-ff-pdp-may08] Chapter 8 - Interim conclusions

  • To: Fast Flux Workgroup <gnso-ff-pdp-May08@xxxxxxxxx>
  • Subject: [gnso-ff-pdp-may08] Chapter 8 - Interim conclusions
  • From: Marika Konings <marika.konings@xxxxxxxxx>
  • Date: Thu, 14 May 2009 00:57:31 -0700

Please provide your feedback if/how chapter 8 (see current text below) should 
be modified.

=============================

8            Interim Conclusions

During the study of fast flux hosting, the working group quickly came to 
appreciate that the subject area that originally formed the basis of the study 
had changed rapidly from the time of publication of the SSAC report that 
stimulated GNSO interest to the issuance of the PDP. Flux hosting, flux 
techniques and flux facilitated attacks continued to evolve even during the 
WG's study period.


8.1          Conclusions

Fast flux hosting has numerous applications. Some experts have focused on the 
applications of fast flux hosting that are self-beneficial but publicly 
detrimental and consider it to be an effective technique for keeping fraudulent 
sites active on the Internet for the longest period of time, and it requires 
domain registrations as a component for success. At the same time, a number of 
the characteristics that experts ascribe to fast flux hosting have been 
identified as self-beneficial without being harmful to others, or indeed, both 
self- and publicly beneficial. In these latter applications, the goals of fast 
flux hosting are to make networks survivable or highly reliable, but the 
motives are quite different.

Gaining a common appreciation and broad understanding of the motivations behind 
the employment of fast flux or adaptive networking techniques proved to be a 
particularly thorny problem for the WG. Attempts to associate an intent other 
than criminal and characterizing fast flux hosting as legitimate or illegal, 
good or bad, stimulated considerable debate.

Study by members of the WG also revealed that flux hosting is necessarily, 
accurately characterized as "fast flux" but more generally, that flux hosting 
encompasses several variations and adaptations of event-sensitive, responsive, 
or volatile networking techniques.

The WG studied many of the methods of detecting fast flux activities and 
thwarting fast flux hosting. The WG also studied whether certain data could be 
monitored, collected, and made available by various parties (e.g., registries, 
registrars, and ISPs) to facilitate detection and intervention in circumstances 
where fast flux hosting was publicly detrimental. These studies merit further 
attention, particularly in areas where an unacceptable level of false positives 
would prove detrimental to registrants affected by intervention. Measures are 
needed to ensure that parties reporting fast flux activity are to be trusted.

The WG also acknowledges that fast flux and similar techniques are merely 
components in the larger issue of Internet fraud and abuse. The techniques 
described in this report are only part of a vast and constantly evolving 
toolkit for attackers: mitigating any one technique would not eliminate 
Internet fraud and abuse. Every attack that is enhanced by the use of one or 
more fast flux techniques could be pursued without them, possibly at higher 
cost or effort for the attacker.

These various and highly interrelated issues must all be taken into account in 
any potential policy development process and/or next steps. Careful 
consideration will need to be given as to which role ICANN can and should play 
in this process.



<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy