Detecting hidden enemy lines in IP address space

NSPW '13: Proceedings of the 2013 New Security Paradigms Workshop(2013)

引用 9|浏览5
暂无评分
摘要
If an outbound flow is observed at the boundary of a protected network, destined to an IP address within a few addresses of a known malicious IP address, should it be considered a suspicious flow? Conventional blacklisting is not going to cut it in this situation, and the established fact that malicious IP addresses tend to be highly clustered in certain portions of IP address space, should indeed raise suspicions. We present a new approach for perimeter defense that addresses this concern. At the heart of our approach, we attempt to infer internal, hidden boundaries in IP address space, that lie within publicly known boundaries of registered IP netblocks. Our hypothesis is that given a known bad IP address, other IP address in the same internal contiguous block are likely to share similar security properties, and may therefore be vulnerable to being similarly hacked and used by attackers in the future. In this paper, we describe how we infer hidden internal boundaries in IPv4 netblocks, and what effect this has on being able to predict malicious IP addresses.
更多
查看译文
关键词
internal boundary,internal contiguous block,ipv4 netblocks,ip address space,registered ip netblocks,ip address,bad ip address,new approach,hidden boundary,hidden enemy line,malicious ip address,clustering,predictive modeling
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要