Evaluating IP Blacklists Effectiveness

08/16/2023
by   Luca Deri, et al.
0

IP blacklists are widely used to increase network security by preventing communications with peers that have been marked as malicious. There are several commercial offerings as well as several free-of-charge blacklists maintained by volunteers on the web. Despite their wide adoption, the effectiveness of the different IP blacklists in real-world scenarios is still not clear. In this paper, we conduct a large-scale network monitoring study which provides insightful findings regarding the effectiveness of blacklists. The results collected over several hundred thousand IP hosts belonging to three distinct large production networks highlight that blacklists are often tuned for precision, with the result that many malicious activities, such as scanning, are completely undetected. The proposed instrumentation approach to detect IP scanning and suspicious activities is implemented with home-grown and open-source software. Our tools enable the creation of blacklists without the security risks posed by the deployment of honeypots.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/13/2018

RIPEx: Extracting malicious IP addresses from security forums using cross-forum learning

Is it possible to extract malicious IP addresses reported in security fo...
research
07/18/2018

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks

Network address shuffling is one of moving target defense (MTD) techniqu...
research
10/30/2021

Uncovering IP Address Hosting Types Behind Malicious Websites

Hundreds of thousands of malicious domains are created everyday. These m...
research
12/30/2019

ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System

Considering the attacks against industrial control system are mostly org...
research
11/09/2022

Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals

Network operators and system administrators are increasingly overwhelmed...
research
10/26/2022

EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale

Public clouds provide impressive capability through resource sharing. Ho...
research
03/27/2023

Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE

Automotive softwarization is progressing and future cars are expected to...

Please sign up or login with your details

Forgot password? Click here to reset