Detecting Hidden Enemy Lines in IP Address Space

被引:5
|
作者
Mathur, Suhas [1 ]
Coskun, Baris [1 ]
Balakrishnan, Suhrid [2 ]
机构
[1] AT&T Secur Res Ctr, New York, NY USA
[2] AT&T Labs Res, Florham Pk, NJ USA
关键词
D O I
10.1145/2535813.2535816
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
If an outbound flow is observed at the boundary of a protected network, destined to an IP address within a few addresses of a known malicious IP address, should it be considered a suspicious flow? Conventional blacklisting is not going to cut it in this situation, and the established fact that malicious IP addresses tend to be highly clustered in certain portions of IP address space, should indeed raise suspicions. We present a new approach for perimeter defense that addresses this concern. At the heart of our approach, we attempt to infer internal, hidden boundaries in IP address space, that lie within publicly known boundaries of registered IP netblocks. Our hypothesis is that given a known bad IP address, other IP address in the same internal contiguous block are likely to share similar security properties, and may therefore be vulnerable to being similarly hacked and used by attackers in the future. In this paper, we describe how we infer hidden internal boundaries in IPv4 netblocks, and what effect this has on being able to predict malicious IP addresses.
引用
收藏
页码:19 / 29
页数:11
相关论文
共 50 条
  • [1] Detecting a hidden enemy
    Borenstein, SW
    Anderson, S
    [J]. CHEMICAL PROCESSING, 2003, 66 (01): : 30 - 34
  • [2] Detecting IP Spoofing by Modelling History of IP Address Entry Points
    Kovacik, Michal
    Kajan, Michal
    Zadnik, Martin
    [J]. EMERGING MANAGEMENT MECHANISMS FOR THE FUTURE INTERNET (AIMS 2013), 2013, 7943 : 73 - 83
  • [3] Detecting Malicious Websites by Learning IP Address Features
    Chiba, Daiki
    Tobe, Kazuhiro
    Mori, Tatsuya
    Goto, Shigeki
    [J]. 2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 29 - 39
  • [4] Extending address space of IP networks with hierarchical addressing
    Lu, TR
    Sui, C
    Ma, YS
    Zhao, JS
    Yang, YT
    [J]. ADVANCES IN COMPUTER SYSTEMS ARCHITECTURE, PROCEEDINGS, 2005, 3740 : 499 - 508
  • [5] Dynamic Monitoring of Dark IP Address Space (Poster)
    Polakis, Iasonas
    Kontaxis, Georgios
    Ioannidis, Sotiris
    Markatos, Evangelos P.
    [J]. TRAFFIC MONITORING AND ANALYSIS: THIRD INTERNATIONAL WORKSHOP, TMA 2011, 2011, 6613 : 193 - 196
  • [6] DETECTING THE ENEMY
    ADAM, JA
    [J]. IEEE SPECTRUM, 1987, 24 (08) : 37 - 41
  • [7] NEMATODES - THE HIDDEN ENEMY
    COLBERT, B
    [J]. AGRICULTURA DE LAS AMERICAS, 1979, 28 (02): : 16 - &
  • [8] DRAGO: Detecting, Quantifying and Locating Hidden Routers in Traceroute IP Paths
    Marchetta, Pietro
    Pescape, Antonio
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 3237 - 3242
  • [9] DRAGO: Detecting, Quantifying and Locating Hidden Routers in Traceroute IP Paths
    Marchetta, Pietro
    Pescape, Antonio
    [J]. 2013 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2013, : 109 - 114
  • [10] Confronting a Hidden Enemy
    Casal, Roberto F. F.
    [J]. JOURNAL OF BRONCHOLOGY & INTERVENTIONAL PULMONOLOGY, 2022, 29 (01) : 3 - 4