Internet bad neighborhoods temporal behavior

Giovane C M Moura, Ramin Sadre, Aiko Pras

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

5 Citations (Scopus)

Abstract

Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-called Bad Neighborhoods. Knowledge about this concentration is valuable in predicting attacks from unseen IP addresses. This observation has been employed in previous works to filter out spam. In this paper, we focus on the temporal behavior of bad neighborhoods. The goal is to determine if bad neighborhoods strike multiple times over a certain period of time, and if so, when do the attacks occur. Among other findings, we show that even though bad neighborhoods do not exhibit a favorite combination of days to carry out attacks, 85% of the recurrent bad neighborhoods do carry out a second attack within the first 5 days from the first attack. These and the other findings here presented lead to several considerations on how attack prediction models can be more effective i.e., generating both predictive and short neighborhood blacklists.

Original languageEnglish
Title of host publicationIEEE/IFIP NOMS 2014 - IEEE/IFIP Network Operations and Management Symposium: Management in a Software Defined World
PublisherIEEE Computer Society Press
Publication date1 Jan 2014
Pages1-9
Article number6838306
ISBN (Print)978-1-4799-0913-1
DOIs
Publication statusPublished - 1 Jan 2014
Event2014 IEEE Network Operations and Management Symposium - Krakow, Poland
Duration: 5 May 20149 May 2014

Conference

Conference2014 IEEE Network Operations and Management Symposium
Country/TerritoryPoland
CityKrakow
Period05/05/201409/05/2014
SeriesI E E E - I F I P Network Operations and Management Symposium
ISSN1542-1201

Fingerprint

Dive into the research topics of 'Internet bad neighborhoods temporal behavior'. Together they form a unique fingerprint.

Cite this