140 likes | 241 Vues
This document explores the concept of Highly Predictive Blacklisting (HPB) as detailed in the work by Jian Zhang, Phillip Porras, and Johannes Ullrich. It discusses the GWOL (Global Worst Offender List) and LWOL (Local Worst Offender List) and how the proposed system can filter logs, remove invalid IP addresses, and leverage whitelists to improve security. It highlights the relevance ranking process for blacklisting and analyzes attack patterns and severities. The findings showcase superior prediction capabilities for identifying new attackers, ultimately contributing to more effective cybersecurity measures.
E N D
Highly Predictive Blacklisting 5/10 黃瀚嶙
Introduction • GWOL-global worst offender list • LWOL-local worst offender list • HPB -highly predictive blacklisting
References • Highly Predictive Blacklisting Jian Zhang, Phillip Porras, and Johannes Ullrich. Highly predictive blacklisting. In Usenix Security Symposium, 2008.
Blacklisting System -Prefiltering Logs • remove invalid or unassigned IP address space -like 10.x.x.x or 192.168.x.x • use the whitelist • exclude specific port -TCP 53 (DNS), 25 (SMTP), 80 (HTTP)…etc
Blacklisting System -Relevance Ranking • relevance vector • Thers is a fast solution like • the rank of a source with respect to different contributors is different
Blacklisting System -Attack Pattern Severity • cm:total num of attack port, cu :total num of unique port • wm, wu : the weight of Cm Cu • TC(s):unique target IP addresses connected to by attacker s. • malware severity score
Blacklisting System -Blacklist Production • final blacklist for each contributor -k :relevance rank of the attacker -L:final list length
Conclusion • new attacker prediction quality • new system to generate blacklists