skip to main content
research-article

Characterizing Intelligence Gathering and Control on an Edge Network

Published:01 July 2011Publication History
Skip Abstract Section

Abstract

There is a continuous struggle for control of resources at every organization that is connected to the Internet. The local organization wishes to use its resources to achieve strategic goals. Some external entities seek direct control of these resources, for purposes such as spamming or launching denial-of-service attacks. Other external entities seek indirect control of assets (e.g., users, finances), but provide services in exchange for them.

Using a year-long trace from an edge network, we examine what various external organizations know about one organization. We compare the types of information exposed by or to external organizations using either active (reconnaissance) or passive (surveillance) techniques. We also explore the direct and indirect control external entities have on local IT resources.

References

  1. Allman, M., Paxson, V., and Terrell, J. 2007. A brief history of scanning. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC’07). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Arlitt, M. and Williamson, C. 2005. An analysis of tcp reset behaviour on the Internet. ACM SIGCOMM Comput. Commun. Rev. 35, 1, 37--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Barford, P. and Blodgett, M. 2007. Toward botnet mesocosms. In Proceedings of the 1st Conference of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots’07). USENIX Association Berkeley, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Barford, P. and Yegneswaran, V. 2006. An inside look at botnets. In Advanced in Information Security, vol. 27, ch. 8.Google ScholarGoogle Scholar
  5. Collins, M., Shimeall, T., Faber, S., Janies, J., Weaver, R., Shon, M., and Kadane, J. 2007. Using uncleanliness to predict future botnet addresses. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC’07). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Duffield, N., Haffner, P., Krishnamurthy, B., and Ringberg, H. 2009. Rule-based anomaly detection on IP flows. In Proceedings of the IEEE INFOCOM. IEEE, Los Alamitos, CA.Google ScholarGoogle Scholar
  7. Gates, C., McNutt, J., Kadane, J., and Kellner, M. 2006. Scan detection on very large networks using logistic regression modeling. In Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC’06). IEEE, Los Alamitos, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jin, Y., Simon, G., Xu, K., Zhang, Z., and Kumar, V. 2007a. Gray’s anatomy: Dissecting scanning activities using IP gray space analysis. In Proceedings of SysML. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jin, Y., Zhang, Z., Xu, K., Cao, F., and Sahu, S. 2007b. Identifying and tracking suspicious activities through gray space analysis. In Proceedings of the 3rd Annual ACM Workshop on Mining Network Data (MineNet’07). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jin, Y., Sharafuddin, E., and Zhang, Z. 2009. Unveiling core network-wide communication patterns through application traffic activity graph decomposition. In Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems (SIGMETRICS’09). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jung, J., Paxson, V., Berger, A., and Balakrishnan, H. 2004. Fast portscan detection using sequential hypothesis testing. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Los Alamitos, CA.Google ScholarGoogle Scholar
  12. Jung, J., Milito, R., and Paxson, V. 2007. On the adaptive real-time detection of fast propagating network worms. In Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science, vol. 4579, Springer, Berlin, 175--192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Karasaridis, A., Rexroad, B., and Hoeflin, D. 2007. Wide-scale botnet detection and characterization. In Proceedings of the 1st Conference on the 1st Workshop on Hot Topics in Understanding Botnets (HotBots’07). USENIX Association, Berkeley, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Katti, S., Krishnamurthy, B., and Katabi, D. 2005. Collaborating against common enemies. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC’05). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Klensin, J. 2001. Simple mail transfer protocol. RFC 2821. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Krishnamurthy, B. and Wills, C. 2009. Privacy diffusion on the web: A longitudinal perspective. In Proceedings of the 18th International Conference on the World Wide Web (WWW’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Li, Z., Goyal, A., Chen, Y., and Paxson, V. 2009. Automating analysis of large-scale botnet probing events. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Muelder, C., Ma, K., and Bartoletti, T. 2005. A visualization methodology for characterization of network scans. In Proceedings of the Workshop on Visualization for Computer Security (VizSEC’05). IEEE, Los Alamitos, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Padhak, A., Qian, F., Hu, C., Mao, M., and Ranjan, S. 2009. Botnet spam campaigns can be Long-lasting: Evidence, implications and analysis. In Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems (SIGMETRICS’09). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Pang, R., Yegneswaran, V., Barford, P., Paxson, V., and Peterson, L. 2004. Characteristics of internet background radiation. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC’04). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Paxson, V. 2004. Strategies for sound Internet measurement. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC’04). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Postel, J. 1982. Simple mail transfer protocol. RFC 821. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Shankar, U. and Paxson, V. 2003. Active mapping: Resisting NIDS evasion without altering traffic. In Proceedings of the Symposium on Security and Privacy. IEEE, Los Alamitos, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Sommers, J., Yegneswaran, V., and Barford, P. 2004. A framework for malicious workload generation. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC’04). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Specht, S. and Lee, R. 2004. Distributed denial of service: Taxonomies of attacks, tools and countermeasures. In Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems.Google ScholarGoogle Scholar
  26. Staniford, S., Paxson, V., and Weaver, N. 2002. How to own the Internet in your spare time. In Proceedings of the 11th USENIX Security Symposium. USENIX Association, Berkeley, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Weaver, N., Staniford, S., and Paxson, V. 2004. Very fast containment of scanning worms. In Proceedings of the 13th Conference on USENIX Security Symposium (SSYM’04). USENIX Association, Berkeley, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Weaver, N., Sommer, R., and Paxson, V. 2009. Detecting forged tcp reset packets. In Proceedings of the 12th Conference on USENIX Security Symposium (SSYM’03). USENIX Association, Berkeley, CA.Google ScholarGoogle Scholar
  29. Xie, Y., Yu, F., and Abadi, M. 2009. De-anonymizing the Internet using unreliable ids. ACM SIGCOMM Comput. Comm. Rev. 39, 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Xu, K., Zhang, Z., and Bhattacharyya, S. 2008. Internet traffic behavior profiling for network security monitoring. IEEE/ACM Trans. Network. 16, 6, 1241--1252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Yegneswaran, V., Barford, P., and Ullrich, J. 2003. Internet intrusions: Global characteristics and prevalence. In Proceedings of the International Joint Conference on Measurement and Modeling of Computer Systems (SIGMETRICS’03). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Yin, X., Yurcik, W., Treaster, M., Li, Y., and Lakkaraju, K. 2004. Visflowconnect: Netflow visualizations of link relationships for security situational awareness. In Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC’04). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Zhuang, L., Dunagan, J., Simon, D., Daniel, R., Wang, H., and Tygar, J. 2008. Characterizing botnets from email spam records. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET’08). USENIX Association, Berkeley, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Zou, C., Gong, W., Towsley, D., and Gao, L. 2005. The monitoring and early detection of internet worms. IEEE/ACM Trans. Network. 13, 5, 961--974. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Characterizing Intelligence Gathering and Control on an Edge Network

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 11, Issue 1
        July 2011
        95 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/1993083
        Issue’s Table of Contents

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 July 2011
        • Accepted: 1 February 2011
        • Revised: 1 October 2010
        • Received: 1 September 2009
        Published in toit Volume 11, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader