EMBER: a global perspective on extreme malicious behavior

  • Authors:
  • Tamara Yu;Richard Lippmann;James Riordan;Stephen Boyer

  • Affiliations:
  • MIT Lincoln Laboratory, Lexington, MA;MIT Lincoln Laboratory, Lexington, MA;MIT Lincoln Laboratory, Lexington, MA;MIT Lincoln Laboratory, Lexington, MA

  • Venue:
  • Proceedings of the Seventh International Symposium on Visualization for Cyber Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Geographical displays are commonly used for visualizing wide-spread malicious behavior of Internet hosts. Placing dots on a world map or coloring regions by the magnitude of activity often results in cluttered maps that invariably emphasize population-dense metropolitan areas in developed countries where Internet connectivity is highest. To uncover atypical regions, it is necessary to normalize activity by the local computer population. This paper presents EMBER (Extreme Malicious Behavior viewER), an analysis and display of malicious activity at the city level. EMBER uses a metric called Standardized Incidence Rate (SIR) that is the number of hosts exhibiting malicious behavior per 100,000 available hosts. This metric relies on available data that (1) Maps IP addresses to geographic locations, (2) Provides current city populations, and (3) Provides computer usage penetration rates. Analysis of several months of suspicious source IP addresses from DShield identifies cities with extremely high and low malicious activity rates on a day-by-day basis. In general, cities in a few Eastern European countries have the highest SIRs whereas cities in Japan and South Korea have the lowest. Many of these results are consistent with news reports describing local cyber security policies. A simulation that models how malware spreads preferentially within cities to local IP addresses replicates the long-tailed distribution of city SIRs that was found in the data. This simulation result agrees with past analyses in suggesting that malware often preferentially spreads to local regions with already high levels of malicious activity.