• DocumentCode
    3701943
  • Title

    Blacklist-based malicious IP traffic detection

  • Author

    Ibrahim Ghafir;Vaclav Prenosil

  • Author_Institution
    Faculty of Informatics, Masaryk University, Brno, Czech Republic
  • fYear
    2015
  • fDate
    4/1/2015 12:00:00 AM
  • Firstpage
    229
  • Lastpage
    233
  • Abstract
    At present malicious software or malware has increased considerably to form a serious threat to Internet infrastructure. It becomes the major source of most malicious activities on the Internet such as direct attacks, (distributed) denial-of-service (DOS) activities and scanning. Infected machines may join a botnet and can be used as remote attack tools to perform malicious activities controlled by the botmaster. In this paper we present our methodology for detecting any connection to or from malicious IP address which is expected to be command and control (C&C) server. Our detection method is based on a blacklist of malicious IPs. This blacklist is formed based on different intelligence feeds at once. We process the network traffic and match the source and destination IP addresses of each connection with IP blacklist. The intelligence feeds are automatically updated each day and the detection is in the real time.
  • Keywords
    "IP networks","Malware","Feeds","Servers","Monitoring","Internet","Electronic mail"
  • Publisher
    ieee
  • Conference_Titel
    Communication Technologies (GCCT), 2015 Global Conference on
  • Type

    conf

  • DOI
    10.1109/GCCT.2015.7342657
  • Filename
    7342657