Visible to the public Predicting Zero-Day Malicious IP Addresses

TitlePredicting Zero-Day Malicious IP Addresses
Publication TypeConference Paper
Year of Publication2017
AuthorsNiakanlahiji, Amirreza, Pritom, Mir Mehedi, Chu, Bei-Tseng, Al-Shaer, Ehab
Conference NameProceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5203-1
Keywordscomposability, defense, malicious ip prediction, Metrics, pubcrawl, Resiliency, Sandboxing, Zero day attacks, zero day malware prediction
Abstract

Blacklisting IP addresses is an important part of enterprise security today. Malware infections and Advanced Persistent Threats can be detected when blacklisted IP addresses are contacted. It can also thwart phishing attacks by blocking suspicious websites. An unknown binary file may be executed in a sandbox by a modern firewall. It is blocked if it attempts to contact a blacklisted IP address. However, today's providers of IP blacklists are based on observed malicious activities, collected from multiple sources around the world. Attackers can evade those reactive IP blacklist defense by using IP addresses that have not been recently engaged in malicious activities. In this paper, we report an approach that can predict IP addresses that are likely to be used in malicious activities in the near future. Our evaluation shows that this approach can detect 88% of zero-day malware instances missed by top five antivirus products. It can also block 68% of phishing websites before reported by Phishtank.

URLhttps://dl.acm.org/citation.cfm?doid=3140368.3140369
DOI10.1145/3140368.3140369
Citation Keyniakanlahiji_predicting_2017