skip to main content
10.1145/2808128.2808129acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Blacklist Ecosystem Analysis: Spanning Jan 2012 to Jun 2014

Published:12 October 2015Publication History

ABSTRACT

Motivation: We compare the contents of 86 Internet blacklists to provide a view of the whole ecosystem of blocking network touch points and blacklists. We aim to formalize and evaluate practitioner tacit knowledge of the fatigue of playing "whack-a-mole" against resilient adversary resources. Method: Lists are compared to lists of the same data type (domain name or IP address). Different phases of the study use different comparisons. Comparisons include how many lists an indicator is unique to; list sizes; expanded list characterization and intersection; pairwise intersections of all lists; and following, a statistical test we define to determine if one list adds elements shortly after another. Results: Based on a synthesis of multiple methods, domain-name-based indicators are unique to one list 96.16% to 97.37% of the time. IP-address-based indicators are unique to one list 82.46% to 95.24% of the time. Discussion: There is little overlap between blacklists. Though there are exceptions, the intersection between lists remains low even after expanding each list to a larger neighborhood of related indicators. Few lists consistently provide content before other lists if there is intersection. These results suggest that each blacklist describes a distinct sort of malicious activity and that even merging all lists there is no global ground truth to acquire. Practical insights include (1) network defenders are advised to obtain and evaluate as many lists as practical, (2) "whack-a-mole" is inevitable due to list dynamics, barring a strategic change, an (3) academics comparing their results to one or a few blacklists to test accuracy are advised to reconsider this validation technique.

References

  1. 2015 data breach investigations report (DBIR). Tech. rep., Verizon, 2015.Google ScholarGoogle Scholar
  2. Burger, E. W., Goodman, M. D., Kampanakis, P., and Zhu, K. A. Taxonomy model for cyber threat intelligence information exchange technologies. In Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (2014), ACM, pp. 51--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. CERT/NetSA at Carnegie Mellon University. CERT/CC Route Views Project Page. {Accessed: Feb 13, 2014}.Google ScholarGoogle Scholar
  4. Collins, M. Using vantage to manage complex sensor networks. In FloCon 2015, 11th Annual (Portland, OR, January 2015), Software Engineering Institute, Carnegie Mellon University.Google ScholarGoogle Scholar
  5. Google. Google Safe Browsing FAQ. http://code.google.com/apis/safebrowsing/safebrowsing_faq.html, November 2, 2011.Google ScholarGoogle Scholar
  6. Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C. J., Levchenko, K., Mavrommatis, P., McCoy, D., Nappa, A., Pitsillidis, A., Provos, N., Rafique, M. Z., Rajab, M. A., Rossow, C., Thomas, K., Paxson, V., Savage, S., and Voelker, G. M. Manufacturing compromise: The emergence of exploit-as-a-service. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (Raleigh, North Carolina, USA, 2012), CCS '12, ACM, pp. 821--832. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hallenbeck, C., King, C., Spring, J. M., and Vixie, P. Abuse of customer premise equipment and recommended actions. In Black Hat USA 2014 (Las Vegas, Nevada, Aug 7, 2014), UBM.Google ScholarGoogle Scholar
  8. Hatleback, E., and Spring, J. M. Exploring a mechanistic approach to experimentation in computing. Philosophy & Technology 27, 3 (2014), 441--459.Google ScholarGoogle ScholarCross RefCross Ref
  9. Kührer, M., Rossow, C., and Holz, T. Paint it black: Evaluating the effectiveness of malware blacklists. Tech. Rep. TR-HGI-2014-002, Ruhr-Universitat Bochum, Horst Görtz Institute for IT Security, June 2014.Google ScholarGoogle ScholarCross RefCross Ref
  10. Metcalf, L. B., and Spring, J. M. Everything you wanted to know about blacklists but were afraid to ask. Tech. Rep. CERTCC-2013--39, Software Engineering Institute, CERT Coordination Center, Pittsburgh, PA, 2013.Google ScholarGoogle Scholar
  11. Metcalf, L. B., and Spring, J. M. Blacklist ecosystem analysis update: 2014. Tech. Rep. CERTCC-2014--82, Software Engineering Institute, CERT Coordination Center, Pittsburgh, PA, December 2014.Google ScholarGoogle Scholar
  12. RIPE Network Coordination Center. Routing information service (RIS). http://www.ripe.net/data-tools/stats/ris/routing-information-service, January 3, 2012.Google ScholarGoogle Scholar
  13. Route-Views. University of oregon route views project. http://www.routeviews.org, January 3, 2012.Google ScholarGoogle Scholar
  14. Scheper, C., Cantor, S., and Maughan, D. Predict: a trusted framework for sharing data for cyber security research. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (2011), ACM, pp. 105--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Serrano, O., Dandurand, L., and Brown, S. On the design of a cyber security data sharing system. In Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (2014), ACM, pp. 61--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sharma, V., Bartlett, G., and Mirkovic, J. Critter: Content-rich traffic trace repository. In Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (2014), ACM, pp. 13--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Sinervo, P. K. Signal significance in particle physics. In Advanced statistical techniques in particle physics (Durham, UK, 2002), M. R. Whalley and L. Lyons, Eds.Google ScholarGoogle Scholar
  18. Sinha, S., Bailey, M., and Jahanian, F. Shades of grey: On the effectiveness of reputation-based "blacklists". In Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on (2008), IEEE, pp. 57--64.Google ScholarGoogle ScholarCross RefCross Ref
  19. Sood, A. K., and Enbody, R. J. Crimeware-as-a-service: A survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection 6, 1 (2013), 28--38.Google ScholarGoogle ScholarCross RefCross Ref
  20. Spring, J. M. Modeling malicious domain name take-down dynamics: Why eCrime pays. In IEEE eCrime Researchers Summit (September 17, 2013), Anti-Phishing Working Group.Google ScholarGoogle Scholar
  21. Spring, J. M. A notation for describing the steps in indicator expansion. In IEEE eCrime Researchers Summit (September 17, 2013), Anti-Phishing Working Group.Google ScholarGoogle Scholar
  22. Spring, J. M. Toward realistic modeling criteria of games in internet security. Journal of Cyber Security & Information Systems 2, 2 (2014), 2--11.Google ScholarGoogle Scholar
  23. Spring, J. M., Kern, S., and Summers, A. Global adversarial capability modeling. In IEEE eCrime Researchers Summit (Barcelona, May 28, 2015), Anti-Phishing Working Group, pp. 22--42.Google ScholarGoogle Scholar
  24. Sundaramurthy, S. C., McHugh, J., Ou, X. S., Rajagopalan, S. R., and Wesch, M. An anthropological approach to studying csirts. IEEE Security & Privacy, 5 (2014), 52--60.Google ScholarGoogle ScholarCross RefCross Ref
  25. Thomas, M., Metcalf, L., Spring, J. M., Krystosek, P., and Prevost, K. Silk: A tool suite for unsampled network flow analysis at scale. In IEEE BigData Congress (Anchorage, AK, July 2014), IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Trost, R. Threat intelligence library - a new revolutionary technology to enhance the soc battle rhythm! In Black Hat USA 2014 (Las Vegas, Nevada, Aug 7, 2014), UBM.Google ScholarGoogle Scholar
  27. Zhang, J., Chivukula, A., Bailey, M., Karir, M., and Liu, M. Characterization of blacklists and tainted network traffic. In Passive and Active Measurement, M. Roughan and R. Chang, Eds., vol. 7799 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013, pp. 218--228. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Blacklist Ecosystem Analysis: Spanning Jan 2012 to Jun 2014

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WISCS '15: Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security
        October 2015
        84 pages
        ISBN:9781450338226
        DOI:10.1145/2808128

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 October 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        WISCS '15 Paper Acceptance Rate6of16submissions,38%Overall Acceptance Rate23of58submissions,40%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader