Identifying and tracking suspicious activities through IP gray space analysis

  • Authors:
  • Yu Jin;Zhi-Li Zhang;Kuai Xu;Feng Cao;Sambit Sahu

  • Affiliations:
  • University of Minnesota;University of Minnesota;Yahoo! Inc.;Cisco Systems, Inc.;IBM Research

  • Venue:
  • Proceedings of the 3rd annual ACM workshop on Mining network data
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Campus or enterprise networks often have many unassigned IP addresses that collectively form IP gray space within the address blocks of such networks. Using one-month traffic data collected in a large campus network, we have monitored a significant amount of unwanted traffic towards IP gray space in various forms, such as worms, port scanning, and denial of service attacks. In this paper, we apply a heuristic algorithm to extract the IP gray space in our campus network. Subsequently, we analyze the behavioral patterns such as dominant activities and target randomness, of the gray space traffic for individual outside hosts. By correlating and contrasting the traffic towards IP gray addresses and live end hosts, we find the gray space traffic provides unique insight for uncovering the behavior, and intention,of anomalous traffic towards live end hosts. Finally, we demonstrate the applications of gray space traffic for identifying SPAM behavior, detecting malicious scanning and worm activities that successfully compromise end hosts.