DocumentCode :
3701943
Title :
Blacklist-based malicious IP traffic detection
Author :
Ibrahim Ghafir;Vaclav Prenosil
Author_Institution :
Faculty of Informatics, Masaryk University, Brno, Czech Republic
fYear :
2015
fDate :
4/1/2015 12:00:00 AM
Firstpage :
229
Lastpage :
233
Abstract :
At present malicious software or malware has increased considerably to form a serious threat to Internet infrastructure. It becomes the major source of most malicious activities on the Internet such as direct attacks, (distributed) denial-of-service (DOS) activities and scanning. Infected machines may join a botnet and can be used as remote attack tools to perform malicious activities controlled by the botmaster. In this paper we present our methodology for detecting any connection to or from malicious IP address which is expected to be command and control (C&C) server. Our detection method is based on a blacklist of malicious IPs. This blacklist is formed based on different intelligence feeds at once. We process the network traffic and match the source and destination IP addresses of each connection with IP blacklist. The intelligence feeds are automatically updated each day and the detection is in the real time.
Keywords :
"IP networks","Malware","Feeds","Servers","Monitoring","Internet","Electronic mail"
Publisher :
ieee
Conference_Titel :
Communication Technologies (GCCT), 2015 Global Conference on
Type :
conf
DOI :
10.1109/GCCT.2015.7342657
Filename :
7342657
Link To Document :
بازگشت