An assessment of overt malicious activity manifest in residential networks

  • Authors:
  • Gregor Maier;Anja Feldmann;Vern Paxson;Robin Sommer;Matthias Vallentin

  • Affiliations:
  • International Computer Science Institute, Berkeley, CA and TU Berlin, Deutsche Telekom Laboratories, Berlin, Germany;TU Berlin, Deutsche Telekom Laboratories, Berlin, Germany;International Computer Science Institute, Berkeley, CA and University of California at Berkeley, CA;International Computer Science Institute, Berkeley, CA and Lawrence Berkeley National Laboratory, Berkeley, CA;University of California at Berkeley, CA

  • Venue:
  • DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth study. In this paper we present a first step towards an assessment based on monitoring network activity (anonymized for user privacy) of 20,000 residential DSL customers in a European urban area, roughly 1,000 users of a community network in rural India, and several thousand dormitory users at a large US university. Our study focuses on security issues that overtly manifest in such data sets, such as scanning, spamming, payload signatures, and contact to botnet rendezvous points. We analyze the relationship between overt manifestations of such activity versus the "security hygiene" of the user populations (anti-virus and OS software updates) and potential risky behavior (accessing blacklisted URLs). We find that hygiene has little correlation with observed behavior, but risky behavior--which is quite prevalent--more than doubles the likelihood that a system will manifest security issues.