Title
Detecting hidden enemy lines in IP address space
Abstract
If an outbound flow is observed at the boundary of a protected network, destined to an IP address within a few addresses of a known malicious IP address, should it be considered a suspicious flow? Conventional blacklisting is not going to cut it in this situation, and the established fact that malicious IP addresses tend to be highly clustered in certain portions of IP address space, should indeed raise suspicions. We present a new approach for perimeter defense that addresses this concern. At the heart of our approach, we attempt to infer internal, hidden boundaries in IP address space, that lie within publicly known boundaries of registered IP netblocks. Our hypothesis is that given a known bad IP address, other IP address in the same internal contiguous block are likely to share similar security properties, and may therefore be vulnerable to being similarly hacked and used by attackers in the future. In this paper, we describe how we infer hidden internal boundaries in IPv4 netblocks, and what effect this has on being able to predict malicious IP addresses.
Year
DOI
Venue
2013
10.1145/2535813.2535816
NSPW
Keywords
Field
DocType
internal boundary,internal contiguous block,ipv4 netblocks,ip address space,registered ip netblocks,ip address,bad ip address,new approach,hidden boundary,hidden enemy line,malicious ip address,clustering,predictive modeling
Internet privacy,IPv4,Ip address,IP address spoofing,Computer security,Computer science,Computer network,Blacklisting,Security properties,Bogon filtering,Adversary
Conference
Citations 
PageRank 
References 
2
0.37
15
Authors
3
Name
Order
Citations
PageRank
Suhas Mathur176933.94
Baris Coskun217313.37
Suhrid Balakrishnan323814.60