BLAG: Improving the Accuracy of Blacklists
Sivaram Ramanathan1, Jelena Mirkovic1 and Minlan Yu2
1 University of Southern California/Information Sciences Institute 2 Harvard University
BLAG: Improving the Accuracy of Blacklists Sivaram Ramanathan 1 , - - PowerPoint PPT Presentation
BLAG: Improving the Accuracy of Blacklists Sivaram Ramanathan 1 , Jelena Mirkovic 1 and Minlan Yu 2 1 University of Southern California/Information Sciences Institute 2 Harvard University IP Blacklists IP Blacklists contain a list of known
Sivaram Ramanathan1, Jelena Mirkovic1 and Minlan Yu2
1 University of Southern California/Information Sciences Institute 2 Harvard University
malicious IP addresses.
aid more sophisticated defenses such as spam filters, IDS, etc.
emergency response under a novel
addresses are checked and can be done at line rate.
2
3
Problems Fragmented information
4
Problems Fragmented information Snapshots in time
5
Problems Fragmented information Snapshots in time Reactive
6
Problems Fragemented information Snapshots in time Reactive
Blacklists miss many attacks1,2 and may monitor only specific a type of attack.
7 [1] Kührer, Marc, Christian Rossow, and Thorsten Holz. "Paint it black: Evaluating the effectiveness of malware blacklists." International Workshop on Recent Advances in Intrusion Detection. Springer, Cham, 2014. [2] Pitsillidis, Andreas, et al. "Taster's choice: a comparative analysis of spam feeds." Proceedings of the 2012 Internet Measurement Conference. ACM, 2012.
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
8
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
Blacklists miss many attacks1,2 and may monitor only specific a type of attack.
[1] Kührer, Marc, Christian Rossow, and Thorsten Holz. "Paint it black: Evaluating the effectiveness of malware blacklists." International Workshop on Recent Advances in Intrusion Detection. Springer, Cham, 2014. [2] Pitsillidis, Andreas, et al. "Taster's choice: a comparative analysis of spam feeds." Proceedings of the 2012 Internet Measurement Conference. ACM, 2012.
9
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
Compromised machines are constantly re-used for initiating different types of attacks over time.
10
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
Compromised machines are constantly re-used for initiating different types of attacks over time. A Possible solution: Combining different types of blacklists can improve attack coverage.
11
1 Day 1 Month 3 Months 6 Months
Historical blacklist data (union of all offenders over time) can further be useful to improve offender detection.
12
1 Day 1 Month 3 Months 6 Months
Historical blacklist data (union of all offenders over time) can further be useful to improve offender detection.
13
1 Day 1 Month 3 Months 6 Months
Historical blacklist data (union of all offenders over time) can further be useful to improve offender detection.
14
Blacklists accuracy varies spatially
proprietary algorithms to include or exclude an address.
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
during the same attack
15
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
during the same attack
Combining blacklists can potentially amplify the number of misclassifications.
16
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
H i s t
i c a l H i s t
i c a l H i s t
i c a l
during the same attack
Combining blacklists can further potentially amplify the number of misclassifications.
Many misclassifications across different testing scenarios!
Combining historical blacklists can further potentially amplify the number of false positives
17
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
H i s t
i c a l H i s t
i c a l H i s t
i c a l
during the same attack
18
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
Addresses are usually listed after an attack takes place, cannot be used for prevention.
19
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
Addresses are usually listed after an attack takes place, cannot be used for prevention. Possible solution: we could list groups of addresses in the same subnet (IP prefixes), hoping to capture future attackers - expansion1.
[1] Zhang, Jing, et al. "On the Mismanagement and Maliciousness of Networks." NDSS. 2014.
20
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
H i s t
i c a l H i s t
i c a l H i s t
i c a l
during the same attack
Expansion can further amplify misclassifications!
H i s t
i c a l
Spam Blacklist DDoS Blacklist Malware Blacklist Combined Blacklist
Expansion can further amplify misclassifications We need a better technique to combine blacklists efficiently and select some addresses to be expanded into prefixes.
21
H i s t
i c a l H i s t
i c a l
during the same attack
22
23
Aggregation
....
24
Aggregation
157 Blacklists
....
25
Aggregation Estimate misclassification
157 Blacklists
....
26
Aggregation Estimate misclassification
Sample inbound traffic for a network 157 Blacklists
....
27
Aggregation Estimate misclassification
Sample inbound traffic for a network Recommendation System 157 Blacklists
....
28
Aggregation Estimate misclassification Selective Expansion
Sample inbound traffic for a network Recommendation System 157 Blacklists
....
increase the misclassifications.
tendency to be malicious than older ones.
score, based on when the address was listed in a blacklist
29 [1] West, Andrew G., et al. "Spam mitigation using spatio-temporal reputations from blacklist history." Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 2010.
!
",$ = 2 '()*+' ,
30
!
",$ = 2 '()*+' ,
Where,
31
!
",$ = 2 '()*+' ,
Where,
32
!
",$ = 2 '()*+' ,
Where,
33
!
",$ = 2 ' ()(*+,
Where,
time
34
A high relevance score means that an IP has been recently listed and has a higher tendency of being malicious.
35
YouTube to improve user retention and increase revenue.
previous ratings of similar items.
1 0.8 0.8 1 0.6 0.6 0.8 0.4 0.8 0.8 1 0.8 0.6 1 0.8 1 1
36
1 0.8 0.8 1 0.6 0.6 0.8 0.4 0.8 0.8 1 0.8 0.6 1 0.8 1 1
37
1 0.8 0.8 1 0.6 0.6 0.8 0.4 0.8 0.8 1 0.8 0.6 1 0.8 1 1
Likes green books.
38
1 0.8 0.8 1 0.6 0.6 0.8 0.4 0.8 0.8 1 0.8 0.6 1 0.8 1 1
Likes green books. Dislikes yellow books.
39
1 0.8 0.8 1 0.6 0.6 0.8 0.4 0.8 0.8 1 0.8 0.6 1 0.8 1 1
?
40
1 0.8 0.8 1 0.6 0.6 0.8 0.4 0.8 0.8 1 0.8 0.6 1 0.8 1 1 0.99 0.97 0.8 0.92 0.8 0.85 0.99 0.59 0.7 0.6 0.6 0.66 0.66 0.79 0.5 0.6 0.77 0.85 0.4 0.79 0.8 0.99 0.29 0.55 0.72 0.8 0.59 0.6 0.7 0.99 1 1 0.8 0.99 0.99 1
41
1 0.8 0.8 1 0.6 0.6 0.8 0.4 0.8 0.8 1 0.8 0.6 1 0.8 1 1 0.99 0.97 0.8 0.92 0.8 0.85 0.99 0.59 0.7 0.6 0.6 0.66 0.66 0.79 0.5 0.6 0.77 0.85 0.4 0.79 0.8 0.99 0.29 0.55 0.72 0.8 0.59 0.6 0.7 0.99 1 1 0.8 0.99 0.99 1
42
1 0.8 0.8 1 0.6 0.6 0.8 0.4 0.8 0.8 1 0.8 0.6 1 0.8 1 1 0.99 0.97 0.8 0.92 0.8 0.85 0.99 0.59 0.7 0.6 0.6 0.66 0.66 0.79 0.5 0.6 0.77 0.85 0.4 0.79 0.8 0.99 0.29 0.55 0.72 0.8 0.59 0.6 0.7 0.99 1 1 0.8 0.99 0.99 1
43
1 0.8 0.8 1 0.6 0.6 0.8 0.4 0.8 0.8 1 0.8 0.6 1 0.8 1 1 0.99 0.97 0.8 0.92 0.8 0.85 0.99 0.59 0.7 0.6 0.6 0.66 0.66 0.79 0.5 0.6 0.77 0.85 0.4 0.79 0.8 0.99 0.29 0.55 0.72 0.8 0.59 0.6 0.7 0.99 1 1 0.8 0.99 0.99 1
44
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 243.13.0.23 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8
0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9
.. ..
0.8
.. ..
addresses and columns are blacklists.
ra,b to the cell.
45
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8
0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9
.. ..
0.8
.. ..
BLAG uses legitimate traffic traces of a network to introduce a new blacklist called the Misclassification Blacklist (MB), which consists only
46
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8
0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 1 1 1
.. ..
0.8
.. ..
For every known misclassification from the training data, BLAG allocates a score of 1.
47
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8
0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Goal: Find the relevance scores for remaining addresses in MB.
48
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
IP1 IP2
Goal: Find the relevance scores for remaining addresses in MB.
49
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
IP1 IP2
Goal: Find the relevance scores for remaining addresses in MB.
50
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
IP1 IP2
Goal: Find the relevance scores for remaining addresses in MB.
IP1 IP2
51
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Likely to be a misclassification! IP1 IP2
Goal: Find the relevance scores for remaining addresses in MB.
IP1 IP2
52
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 169.231.140.68 193.1.64.5 193.1.64.8 216.59.0.8 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system Prune
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Master blacklist candidates
Using a defined threshold customized for every network (0.7 in this case), BLAG prune out addresses that are potentially misclassified.
addresses that cannot be determined to be a misclassification (or not).
blacklist
misclassifications, with similar scores.
53
54
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 169.231.140.68 193.1.64.5 193.1.64.8 216.59.0.8 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system Prune
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Master blacklist candidates Check 1 OK OK OK OK
Check 1: If a prefix has any known misclassification, it is excluded from expansion.
55
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 169.231.140.68 193.1.64.5 193.1.64.8 216.59.0.8 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system Prune
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Master blacklist candidates Check 1 OK OK OK OK
Check 1: If a prefix has any known misclassification, it is excluded from expansion.
56
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 169.231.140.68 193.1.64.5 193.1.64.8 216.59.0.8 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system Prune
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Master blacklist candidates Check 1 OK OK OK OK
Check 1: If a prefix has any known misclassification, it is excluded from expansion.
57
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 169.231.140.68 193.1.64.5 193.1.64.8 216.59.0.8 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system Prune
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Master blacklist candidates Check 1 OK OK OK Check 2 ! OK OK OK OK
Check 2: If a prefix has any likely misclassification, it is excluded from expansion.
58
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 169.231.140.68 193.1.64.5 193.1.64.8 216.59.0.8 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system Prune
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Master blacklist candidates Check 1 OK OK OK Check 2 ! OK OK OK OK
Check 2: If a prefix has any likely misclassification, it is excluded from expansion.
59
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 169.231.140.68 193.1.64.5 193.1.64.8 216.59.0.8 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system Prune
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Master blacklist candidates Check 1 OK OK OK Check 2 ! OK OK OK OK
Check 2: If a prefix has any likely misclassification, it is excluded from expansion.
IP1 IP3
60
169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m Blacklist 3 .. 169.231.140.68 193.1.64.5 193.1.64.8 216.59.0.8 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 169.231.140.68 193.1.64.8 216.59.16.171 Blacklist 1 Blacklist 2 Blacklist m-1 Blacklist 3 .. 243.13.0.23 MB 169.231.140.10 243.13.222.203 193.1.64.5 216.59.0.8 Recommendation system Prune 193.1.64.0/24 216.59.0.0/24 169.231.140.68 Selective expansion
0.28 0.11
.. .. ..
0.46
.. ..
0.72 0.23
.. .. .. ..
0.32
.. ..
0.58
.. ..
0.15
..
0.25 0.95 0.87
.. .. .. .. .. ..
0.79 0.87
..
0.81 0.22 0.4 0.12 0.91 0.6 0.92 0.99
.. ..
0.78
.. ..
0.75 0.3 0.1
.. .. ..
0.5
.. ..
0.7 0.5
.. .. .. ..
0.04
.. ..
0.7
.. ..
0.1
..
0.1 0.9 0.9
.. .. .. .. .. ..
0.7 1
..
0.9 ? ? ? 1 ? 1 1
.. ..
0.8
.. ..
?
Master blacklist candidates BLAG master blacklist Check 1 OK OK OK Check 2 ! OK OK OK OK
BLAG expands addresses to their /24 prefix only when both conditions are satisfied.
61
Blacklist dataset
Malware Reputation Spam Attack 57 blacklists Emerging threats Malware bytes Malware domain list Cisco talos Binary defense systems 32 blacklists Alienvault Spamhaus Nixspam Cleantalk 39 blacklists Snort labs DShield Maxmind 29 blacklists
into four attack variants.
62
each with its corresponding legitimate and attack dataset.
validate the false detections of blacklists.
the accurate detections of blacklists.
Legit emails from IRB study (6K) Spam mails from Mailinator (39K) Legit requests to university server (45K) Mirai malware infected hosts (390K) Legit requests sent to B-root (14K) Attackers to B-root (5.5M)
Ground truth
Email DDoSUniv DDoSDNS
63
64
Training J u n e 1 , 2 1 6 J u n e 7 , 2 1 6
65
Training Known misclassifications J u n e 1 , 2 1 6 J u n e 7 , 2 1 6
66
Training Validation Known misclassifications J u n e 1 , 2 1 6 J u n e 7 , 2 1 6 J u n e 1 4 , 2 1 6
67
Training Validation Known misclassifications Estimate threshold J u n e 1 , 2 1 6 J u n e 7 , 2 1 6 J u n e 1 4 , 2 1 6
68
Training Validation Testing Known misclassifications Estimate threshold J u n e 1 , 2 1 6 J u n e 7 , 2 1 6 J u n e 1 4 , 2 1 6 J u n e 3 , 2 1 6
69
Training Validation Testing Known misclassifications Estimate threshold J u n e 1 , 2 1 6 J u n e 7 , 2 1 6 J u n e 1 4 , 2 1 6 J u n e 3 , 2 1 6 Ham emails (IRB study) 3K Ham emails (IRB study) 2K Ham emails (IRB study) 4K
70
Training Validation Testing Known misclassifications Estimate threshold J u n e 1 , 2 1 6 J u n e 7 , 2 1 6 J u n e 1 4 , 2 1 6 J u n e 3 , 2 1 6 Ham emails (IRB study) 3K Ham emails (IRB study) 2K Ham emails (IRB study) 4K Spam emails (Mailinator) 13K Spam emails (Mailinator) 26K
71
approaches
at the given time (of the ground truth dataset).
properties of blacklisted addresses to generate a new blacklist.
positives.
72
Best blacklists have high specificity (>99%) but poor recall(< 4%) indicating that even the best blacklist is not enough to capture all attackers.
73
20 40 60 80 100
Best Historical PRESTA+L BLAG
(%)Specifcity 20 40 60 80 100
Best Historical PRESTA+L BLAG
(%)Recall
74
20 40 60 80 100
Best Historical PRESTA+L BLAG
(%)Specifcity 20 40 60 80 100
Best Historical PRESTA+L BLAG
(%)Recall
Historical blacklists improve recall to 18% but with a drop in specificity by 12%, indicating that naïve combination of all blacklists has potential to capture attackers, but lowers specificity.
75
20 40 60 80 100
Best Historical PRESTA+L BLAG
(%)Specifcity 20 40 60 80 100
Best Historical PRESTA+L BLAG
(%)Recall
BLAG with expansion further improves recall, with only a slight drop in specificity and has better specificity than historical blacklists.
PRESTA+L has been tuned to have same recall as BLAG, but the specificity is lower than BLAG (82% vs 95%).
76
20 40 60 80 100
Best Historical PRESTA+L BLAG
(%)Specifcity 20 40 60 80 100
Best Historical PRESTA+L BLAG
(%)Recall
autonomous systems.
expansion phase.
77
https://steel.isi.edu/Projects/BLAG/
78
79
but also increases misclassifications.
recommendation system.
PRESTA.
80
All monitored blacklists are available at: https://steel.isi.edu/members/sivaram/BLAG/
81
Contact: Sivaram Ramanathan satyaman@usc.edu