Title
Tracking malicious hosts on a 10gbps backbone link
Abstract
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious flow patterns. Even though such data may be rather difficult to interpret, we show how to bootstrap our analysis with a set of malicious hosts to discover more obscure patterns. Our analysis spans from simple attribute aggregates (such as top IP and port numbers) to advanced temporal analysis of communication patterns between normal and malicious hosts. For example, we found some complex communication patterns that possibly lasted for over a week. Furthermore, several malicious hosts were active over the whole data collection period, despite being blacklisted. We also discuss the problems of working with anonymized data. Given that this type of privacy-sensitive backbone data would not be available for analysis without proper anonymization, we show that it can still offer many novel insights, valuable for both network researchers and practitioners.
Year
DOI
Venue
2010
10.1007/978-3-642-27937-9_8
NordSec
Keywords
Field
DocType
analysis span,backbone link,privacy-sensitive backbone data,anonymized data,whole data collection period,communication pattern,anonymized flow data,malicious flow pattern,malicious host,advanced temporal analysis,internet backbone,network security
Data collection,Port (computer networking),Computer science,Computer security,Network security,Internet backbone
Conference
Citations 
PageRank 
References 
3
0.40
9
Authors
2
Name
Order
Citations
PageRank
Magnus Almgren127039.17
Wolfgang John218214.92