Beneath the Facade of IP Leasing: Graph-Based Approach for Identifying Malicious IP Blocks

被引:0
|
作者
Liu, Zhenni [1 ,2 ]
Sun, Yong [1 ,2 ]
Li, Zhao [1 ,2 ]
Yin, Jiangyi [1 ,2 ]
Liu, Qingyun [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
基金
国家重点研发计划;
关键词
IP blocks detection; Graph representation learning;
D O I
10.1007/978-3-031-63759-9_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the depletion of IPv4 address resources, the prevalence of IPv4 address leasing services by hosting providers has surged. These services allow users to rent IP blocks, offering an affordable and flexible solution compared to traditional IP address allocation. Unfortunately, this convenience has led to an increase in abuse, with illegal users renting IP blocks to host malicious content such as phishing sites and spam services. To mitigate the issue of IP abuse, some research focuses on individual IP identification for point-wise blacklisting. However, this approach leads to a game of whack-a-mole, where blacklisted IPs become transient due to content migration within the IP block. Other studies take a block perspective, recognizing and classifying IP blocks. This enables the discovery of potentially malicious IPs within the block, effectively countering service migration issues. However, existing IP block identification methods face challenges as they rely on specific WHOIS fields, which are sometimes not updated in real-time, leading to inaccuracies. In terms of classification, methods rely on limited statistical features, overlooking vital relationships between IP blocks, making them susceptible to evasion. To address these challenges, we propose BlockFinder, a two-stage framework. The first stage leverages the temporal and spatial stability of services to identify blocks of varying sizes. In the second stage, we introduce an innovative IP block classification model that integrates global node and local subgraph representations to comprehensively learn the graph structure, thereby enhancing evasion difficulty. Experimental results show that our approach achieves state-of-the-art performance.
引用
收藏
页码:46 / 53
页数:8
相关论文
共 50 条
  • [1] A Graph-Based Approach for IP Network Analysis
    Velampalli, Sirisha
    Saxena, Ashutosh
    [J]. COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [2] A graph-based methodology for analyzing IP spoofing attack
    Santiraveewan, V
    Permpoontanalarp, Y
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 227 - 230
  • [3] Optiplan: Unifying IP-based and graph-based planning
    van den Briel, MHL
    Kambhampati, S
    [J]. JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2005, 24 : 919 - 931
  • [4] Identifying IP Blocks with Spamming Bots by Spatial Distribution
    Yun, Sangki
    Kim, Byungseung
    Bahk, Saewoong
    Kim, Hyogon
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2010, E93B (08) : 2188 - 2190
  • [5] Graph-based malicious login events investigation
    Amrouche, Faouzi
    Lagraa, Sofiane
    Kaiafas, Georgios
    State, Radu
    [J]. 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 63 - 66
  • [6] Identifying Concepts on Specific Domain by a Unsupervised Graph-Based Approach
    Rojas-Lopez, Franco
    Lopez-Arevalo, Ivan
    Sosa-Sosa, Victor
    [J]. DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2012, 151 : 477 - 484
  • [7] Blacklist-based Malicious IP Traffic Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    [J]. 2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 229 - 233
  • [8] Identifying attack signatures for the Internet of Things An IP flow based approach
    Vieira, Leandro
    Santos, Leonel
    Goncalves, Ramiro
    Rabadao, Carlos
    [J]. 2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2019,
  • [9] Identifying Loners from Their Project Collaboration Records - A Graph-Based Approach
    Zhou, Qing
    Li, Jiang
    Tang, Yinchun
    Ge, Liang
    [J]. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2020), PT I, 2020, 12274 : 194 - 201
  • [10] Graph neural networks and cross-protocol analysis for detecting malicious IP addresses
    Huang, Yonghong
    Negrete, Joanna
    Wagener, John
    Fralick, Celeste
    Rodriguez, Armando
    Peterson, Eric
    Wosotowsky, Adam
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (04) : 3857 - 3869