Malicious hubs: detecting abnormally malicious autonomous systems

  • Authors:
  • Andrew J. Kalafut;Craig A. Shue;Minaxi Gupta

  • Affiliations:
  • School of Informatics and Computing, Indiana University at Bloomington;Computational Sciences and Engineering, Oak Ridge National Laboratory;School of Informatics and Computing, Indiana University at Bloomington

  • Venue:
  • INFOCOM'10 Proceedings of the 29th conference on Information communications
  • Year:
  • 2010

Quantified Score

Hi-index 0.02

Visualization

Abstract

While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using 12 popular blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted and others account for large fractions of blacklisted IPs. Overall, we conclude that examining malicious activity at the AS granularity can unearth networks with lax security or those that harbor cybercrime.