Using uncleanliness to predict future botnet addresses
- 24 October 2007
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
The increased use of botnets as an attack tool and the awareness attackers have of blocking lists leads to the question of whether we can effectively predict future bot locations. To that end, we introduce a network quality that we term uncleanliness: an indicator of the propensity for hosts in a network to be compromised by outside parties. We hypothesize that unclean networks will demonstrate two properties: spatial and temporal uncleanliness. Spatial uncleanliness is the tendency for compromised hosts to cluster within unclean networks. Temporal uncleanliness is the tendency for unclean networks to contain compromised hosts for extended periods. We test for these properties by collating data from multiple indicators (spamming, phishing, scanning and botnet IRC log monitoring). We demonstrate evidence for both spatial and temporal uncleanliness. We further show evidence for cross-relationship between the various datasets, showing that botnet activity predicts spamming and scanning, while phishing activity appears to be unrelated to the other indicators.Keywords
This publication has 12 references indexed in Scilit:
- Observed Structure of Addresses in IP TrafficIEEE/ACM Transactions on Networking, 2006
- A multifaceted approach to understanding the botnet phenomenonPublished by Association for Computing Machinery (ACM) ,2006
- New threats and attacks on the World Wide WebIEEE Security & Privacy, 2006
- Scan Detection on Very Large Networks Using Logistic Regression ModelingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Protection Mechanisms Against Phishing AttacksPublished by Springer Nature ,2005
- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service AttacksPublished by Springer Nature ,2005
- An empirical study of spam traffic and the use of DNS black listsPublished by Association for Computing Machinery (ACM) ,2004
- An empirical analysis of target-resident dos filtersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- The making of a spam zombie army. Dissecting the Sobig wormsIEEE Security & Privacy, 2003
- Flash crowds and denial of service attacksPublished by Association for Computing Machinery (ACM) ,2002