Preview

Abnormally Malicious Autonomous Systems and Their Internet Connectivity

Better Essays
Open Document
Open Document
8864 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
220

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 1, FEBRUARY 2012

Abnormally Malicious Autonomous Systems and Their Internet Connectivity
Craig A. Shue, Andrew J. Kalafut, and Minaxi Gupta

Abstract—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) depeerings and network shutdowns. In this paper, we explore whether some ASs indeed are safe havens for malicious activity.
We look for ISPs and ASs that exhibit disproportionately high malicious behavior using 10 popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASs have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASs regularly peer with ASs associated with significant malicious activity. We also find that malicious ASs as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers.
Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.
Index Terms—Autonomous systems (ASs), security.

I. INTRODUCTION

T

HE INTERNET is plagued by malicious activity, from spam and phishing to malware and denial-of-service (DoS) attacks. Much of it thrives on armies of compromised hosts, or botnets, which are scattered throughout the
Internet. However, malicious activity is not necessarily evenly distributed across the Internet: Some networks may employ lax security, resulting in large populations of compromised machines, while others may tightly secure their network and not have any malicious activity. Furthermore, some networks may exist solely to engage in malicious activity. Several recent
ISP enforcement



References: IEEE/ACM Trans. Netw., vol. 9, no. 6, pp. 733–745, Dec. 2001. IEEE INFOCOM, 2002, vol. 2, pp. 618–627. [20] A. Feldmann, O. Maennel, Z. M. Mao, A. Berger, and B. Maggs, “Locating internet routing instabilities,” in Proc. ACM SIGCOMM, 2004, pp Apr. 2000. [24] R. White, “Securing BGP through secure origin BGP (soBGP),” Internet Protocol J., vol. 6, no. 3, pp. 15–22, 2003. study of spyware on the Web,” in Proc. NDSS, 2006, pp. 17–33.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Reiter, A. (2008, 2 5). Internet Evolution. Retrieved 12 5, 2010, from Internet Evolution: http://www.internetevolution.com/author.asp?section_id=526&doc_id=144810…

    • 879 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    fbi cases

    • 3323 Words
    • 14 Pages

    Beginning in 2007, the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the…

    • 3323 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    IT245 PH3 DB1

    • 310 Words
    • 1 Page

    INTERNET TUTORIAL (The TCP/IP and ISO Reference Models). (n.d.). Retrieved December 3, 2014, from http://papa.det.uvigo.es/~theiere/cursos/Curso_Internet/ISO.html…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    root causes of DDoS attacks by reducing Bots infections. Tools such as AD, SCCM, and…

    • 885 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Spyware has quickly become the most prevalent threat to a computer system. Not too long ago the biggest threat to a computer system was a virus which is small computer program that copies itself from one computer to the next, with the intent of harming the computer system’s data and performance. The other major threat was spam which is seemingly not as catastrophic as a virus. Spam also known as unsolicited bulk email is when a company or person sends out the same email message to a large group of recipients indiscriminately.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    In the beginning of time men fought with sticks and stones. World War I brought a step change in technology with the occurrence of poison gas, machine guns, and armored tanks. Previous to World War I foot soldiers and horses were used to advance on the enemy. Chemical warfare had never been used before World War I. With this deadly and often inhuman use of chemical warfare, those exposed died painful and excruciating deaths. The machine gun was invented in 1884 but wasn't used in warfare until World War I. This invention allowed for rapid firing and therefore was able to kill or injure many more enemies during a single battle. The armored tank led to the advancement of heavy gun fire while protecting the gunman. Poison gas, machine guns, and…

    • 156 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Bot-infected computers - Bots allow for a wide range of functionality and most can be updated to assume increased functionality by downloading new code and features. Attackers can use bots to perform a variety of tasks, such as setting up denial-of-service (DoS) attacks against an organization’s website, distributing spam and phishing attacks, distributing spyware and adware, propagating malicious code, and harvesting confidential information that may be used in identity theft from compromised computers—all of which can lead to serious financial and legal consequences. Attackers favor bot-infected computers with a decentralized C&C model because they are difficult to disable and allow the attackers to hide in plain sight among the massive amounts of unrelated traffic occurring over the same…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Every year, millions of viruses are released through the Internet. The FBI reports that there are a variety of cyber-threats, such as identify theft, Internet fraud and cyber-crimes related crimes like terrorism.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Better Essays

    K.F.C Strategy

    • 2013 Words
    • 9 Pages

    Wentz, Laurel, Macarthur, Kate: 5/5/2003, Mc Internet test expanded in Brazil , 00018899, Vol. 74, Issue 18…

    • 2013 Words
    • 9 Pages
    Better Essays

Related Topics