skip to main content

On collaborative predictive blacklisting

Published:28 January 2019Publication History
Skip Abstract Section

Abstract

Collaborative predictive blacklisting (CPB) allows to forecast future attack sources based on logs and alerts contributed by multiple organizations. Unfortunately, however, research on CPB has only focused on increasing the number of predicted attacks but has not considered the impact on false positives and false negatives. Moreover, sharing alerts is often hindered by confidentiality, trust, and liability issues, which motivates the need for privacy-preserving approaches to the problem. In this paper, we present a measurement study of state-of-the-art CPB techniques, aiming to shed light on the actual impact of collaboration. To this end, we reproduce and measure two systems: a non privacy-friendly one that uses a trusted coordinating party with access to all alerts [12] and a peer-to-peer one using privacy-preserving data sharing [8]. We show that, while collaboration boosts the number of predicted attacks, it also yields high false positives, ultimately leading to poor accuracy. This motivates us to present a hybrid approach, using a semi-trusted central entity, aiming to increase utility from collaboration while, at the same time, limiting information disclosure and false positives. This leads to a better trade-off of true and false positive rates, while at the same time addressing privacy concerns.

References

  1. Symantec DeepSight. https://symc.ly/2rXxB1w.Google ScholarGoogle Scholar
  2. U.S. Anti-Bot Code of Conduct for Internet service providers: Barriers and Metrics Considerations {PDF}. https://is.gd/OgTCOG, 2013.Google ScholarGoogle Scholar
  3. Facebook ThreatExchange. https://threatexchange.fb.com, 2015.Google ScholarGoogle Scholar
  4. D. Chakrabarti, S. Papadimitriou, D. S. Modha, and C. Faloutsos. Fully automatic cross-associations. In ACM KDD, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. De Cristofaro, P. Gasti, and G. Tsudik. Fast and Private Computation of Cardinality of Set Intersection and Union. In CANS, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  6. E. De Cristofaro and G. Tsudik. Practical private set intersection protocols with linear complexity. In Financial Cryptography and Data Security, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. De Cristofaro and G. Tsudik. Experimenting with fast private set intersection. In TRUST, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Freudiger, E. De Cristofaro, and A. Brito. Controlled Data Sharing for Collaborative Predictive Blacklisting. In DIMVA, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Kamara, P. Mohassel, M. Raykova, and S. Sadeghian. Scaling private set intersection to billion-element sets. In FC. 2014.Google ScholarGoogle Scholar
  10. S. Katti, B. Krishnamurthy, and D. Katabi. Collaborating against common enemies. In ACM IMC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Melis, G. Danezis, and E. De Cristofaro. Efficient Private Statistics with Succinct Sketches. In NDSS, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  12. F. Soldo, A. Le, and A. Markopoulou. Predictive blacklisting as an implicit recommendation system. In INFOCOM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. The White House. Executive order promoting private sector cybersecurity information sharing. http://1.usa.gov/1vISfBO, 2015.Google ScholarGoogle Scholar
  14. J. Zhang, P. A. Porras, and J. Ullrich. Highly predictive blacklisting. In USENIX, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On collaborative predictive blacklisting

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader