SlideShare a Scribd company logo
Characteristic of Malware
Site and its Blocking
Countermeasure
Apricot 2017
Yasuyuki Tanaka, CISSP
Institute of Information Security (IISEC)
NTT Communications Corporation
1
Todayʼs contents
1.Internet malicious activity
and blocking trend
2.Our analytical results
3.Suggestion and discussion
2
Drive-by-download infection chain
3
Compromised Site
Affiliate
Advertising
Attackerʼs ResourcesLegitimate Service
HIY
model
Malware
Owner
Exploit
Pack
Developer
Exploit
as a
Service
model
Pay Per
Install
model
Malvertising
model
Victims
How to infect ?
n Drive-by-download consists of three factors.
• Landing site, Exploit site, Malware download site
4
Landing
site
Exploit
site
Malware
download
site
Exploit
site
Landing
site
Landing
site
Landing
site
①
② ③
④
Victim PC
Characteristics of each site
n existing in legitimate service
n redirect to exploit site
n short-lived
n made of web attack toolkit
n referrer from Landing site
n short-lived
n repeat run and stop
n change malware
n long-lived
5
Landing
site
Exploit
site
Malware
download
site
In this paper we focused on Malware download Site.
OCN malware block service
n In Feb. 2016, NTT communications started
offering users of the internet service provider
OCN a free malware blocker service, the first
ISP in Japan to offer such a service.
6
Personal information,
Credit card number, etc.
Legitimate
traffic
Evil traffic
DNS
server
Block !
User
Attacker
C&C Server
DNS
server
based on
FQDN
blacklist
Malware
FQDN Block vs URL Block
7
block method FQDN block URL block
intelligence to
use
FQDN blacklist URL blacklist
apply
device
example
DNS, /etc/hosts L7 firewall
pros
lightweight
simple
detailed operation
cons over blocking
complexity
high cost
Over blocking problem
8
http://www.aaa.com/111/222.php benign site
http://www.aaa.com/aaa/z.php
http://www.aaa.com/111/a.js
http://www.aaa.com/111/222.exe
http://www.aaa.com/yyy/zzz
malicious site
malicious site
benign site
benign site
OVER BLOCKED
OVER BLOCKED
OVER BLOCKED
Todayʼs contents
1.Internet malicious activity
and blocking trend
2.Our analytical results
3.Suggestion and discussion
9
Check Malware download URL status
Malware
Download
Site Status
Benign
High Interaction
Web crawler
10
Malicious
Multi Anti-Virus
software
Active
Stop
every day check many
Malware Download Site
download file
n In order to decide appropriate methods or period for
blacklisting malware download site.
n We check malware download site status everyday.
n Total number of URLs : 43,034.
n Observation Period : 1.5 years
Status record
n status table
• we recorded status of each URLs every day.
• short stop span(url1), long stop span(url2,4).
11
DAY 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
url1 ✔ ✔ ✔ X ✔ ✔ X ✔ X ✔ ✔ ✔ X X ✔ ✔ ✔ ✔ ✔ ✔
url2 X ✔ X X X ✔ X X X X X X X ✔ X X ✔ X X X
url3 ✔ ✔ ✔ X ✔ ✔ X X ✔ ✔ ✔ X X X ✔ X X ✔ X ✔
url4 X X ✔ ✔ ✔ X ✔ ✔ ✔ ✔ X X X X X X ✔ ✔ X ✔
✔ active
X stop
Malware hash record
12
n We found a certain characteristics.
n malware hash table
• we recorded which files downloaded.
• unchanged (url1,2)
• every-time changed (url3)
• change occasionally (url4)
DAY 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
url1 A A A A A A A A A A A A A A A
url2 B B B B
url3 C D F G H I J K L M N
url4 O O O P O O O O O R
big letter
alphabet :
malware’s
hash
Category1 “unchanged”
nhxxp://www.xunlei333.com/xl_28413.exe
13
only one
sha1hash value
number of
malware
time
Category2 “every-time changed”
n hxxp://download.veterants.info/index.html?e=tnfd9&clsb=1&publ
isher=11206&prv=TinyWallet&sfx=1&hid=169770297314061
96910&cht=2&dcu=1&cpatch=2&dcs=1&pf=1&am
p;ne=1&prs=4&
14
number of
malware
time
every-time
changed
sha1hash value
Category3 “changed occasionally”
n hxxp://proxy.piratenpartij.nl/web.icm.cn/vote/install_flash
_player_active_x.exe
15
number of
malware
time
most time same
hash value
different hash
value sometimes
n In order to decide appropriate methods
or period for blacklisting malware
download site.
n We defined three categories focusing on
variation of malware.
n We divided URLs on its definition.
• UNC : unchanged
• ETC : every-time changed
• COC : changed occasionally
n Total number of URLs : 43,034.
n Observation Period : 1.5 years
16
Analytical purpose and procedure
nWe analyzed features in the three
category UNC, ETC, and COC.
• lifetime, revived activity, IP address
resource, malware variation, etc.
nWe considered the operation and
resources of attackers and discussed
how to mitigate these categories.
17
Analytical purpose and procedure
Lifetime and Active days definition
n Lifetime
• Period of first and last observation day.
• here, we considered first and last only.
n Active days
• the number of active days.
18
our observation period : 1.5
year
URL A
Lifetime : 20
Active days : 4
URL B
40days
✔
20days
✔ ✔✔
✔ ✔✔✔ ✔✔ ✔
URL A
Lifetime : 40
Active days : 7
URL B
Lifetime CDF
19
10% of UNC lives
over 500 days
Lifetime
ETC < UNC, COC
Stop5, Stop10 definition
nThe number of continuous stopped
status
• Stop5 : over 5days
• Stop10 : over 10days
20
our observation priod : 1.5 year
URL A
6days
URL B
7days
✔
13days
12days11days
Stop5 : 2
Stop10 : 1
Stop5 : 3
Stop10 : 2
✔✔ ✔✔ ✔✔
✔✔✔✔✔
Stop5, Stop10 CDF
21
10% of COC revives
over 15 times
Revive activity
ETC < UNC < COC
UniqIP CDF
22
2% of UNC used
more than 180 IP
IP Entropy CDF
23
IP variation
UNC < ETC < COC
24
Characteristics UNC ETC COC
Lifetime Longevity Short-lived Longevity
Revive NA NA many times
IP resource Substantial Fewer Substantial
IP variation Fewer Substantial Substantial
Activity NA Sparse Intensive
Malware Known Known Unknown
URL NA Long query part NA
Characteristics and countermeasure
Counterme-
asure
Blacklisting TBD Blacklisting
Todayʼs contents
1.Internet malicious activity
and blocking trend
2.Our analytical results
3.Suggestion and discussion
25
Suggestion - What should operators do ?
n Fully extermination of malicious site is the
most important.
n When operators received abuse reports, they
should perform concrete action until
malicious site disappear fully.
n but according to [1], about 60%(12/19)
reports were not handled properly by ISPs.
• case1: no reply.
• case2: enable to locate an abuse@domain in
WHOIS.
• case3: good case ! immediately disconnected
site.
• case4: forwarded to customer by ISP, but the
server was still alive.
26
[1] Antonio Nappa, M. Zubair Rafique, Juan Caballero. The MALICIA dataset: identification and analysis of drive-by
download operations <https://lirias.kuleuven.be/bitstream/123456789/464045/1/malicia_dataset.pdf>
Suggestion - What should ISPs do ?
nTodayʼs increasing Internet use has
become plagued by malicious activity
such as exploit-as-a-service model.
nItʼs import to consider IP or FQDN
block service such as “malware block
service” of NTTcom OCN.
nIP or FQDN block have over blocking
problem. So in addition to IP and
FQDN block, it is desirable to use URL
blocking.
27
28
Personal information,
Credit card number, etc.
Legitimate
traffic
Evil traffic
DNS
server
Block !
User
Attacker
C&C Serverbased on
FQDN
blacklist
Suggestion - What should ISPs do ?
L7 FW
based on URL
blacklist
and
Malware DNS
server
This is simple image. Only my opinion.
Discussion - FQDN, IP, and URL blocking
nOur survey shows that URL
blacklisting is effective for some
malicious site.
• UNC and COC, especially COC provide
unknown malware.
nURL blacklisting on ISP ?
• high operation cost ? do you think
realistic way?
nHow about FQDN blacklisting on ISP ?
• how about domain, IP address, AS ?
• combination is important ?
29
30
Thank you very much.
Any question ?

More Related Content

PPT
Applied Detection and Analysis with Flow Data - SO Con 2014
PDF
Extending Zeek for ICS Defense
PDF
Mesos 1.0
PDF
Routage dans les réseaux de capteurs segonde partie
PPT
IGARSS_Presentation_Rodrigo_Jose_Pisani.ppt
PDF
Instruction-level countermeasure against buffer overflow attacks
PPTX
Network Intrusion Detection and Countermeasure Selection
PPTX
Toll like receptor (TLR)
Applied Detection and Analysis with Flow Data - SO Con 2014
Extending Zeek for ICS Defense
Mesos 1.0
Routage dans les réseaux de capteurs segonde partie
IGARSS_Presentation_Rodrigo_Jose_Pisani.ppt
Instruction-level countermeasure against buffer overflow attacks
Network Intrusion Detection and Countermeasure Selection
Toll like receptor (TLR)

Viewers also liked (14)

PPT
airforce catching slide
PPT
Insansız hava araçları
PDF
Scalable threat modelling with risk patterns
PDF
Threat modeling with architectural risk patterns
PPT
Sukhoi su 35
PPT
Copyright
DOCX
David Hanson Resume 2016
PPTX
Adaptative value of marginal populations ad apta project_2014
PDF
Triumvirate Environmental OIL SPCC Planning
PPT
An adaptative framework for tracking Web–based Learning Environments
PDF
Tp immunité adaptative suite
PPTX
Le « RUN » (ou la Tierce Maintenance Applicative)
PDF
Reversal analogies
PDF
Polymer 1.0: easier, faster, better!
airforce catching slide
Insansız hava araçları
Scalable threat modelling with risk patterns
Threat modeling with architectural risk patterns
Sukhoi su 35
Copyright
David Hanson Resume 2016
Adaptative value of marginal populations ad apta project_2014
Triumvirate Environmental OIL SPCC Planning
An adaptative framework for tracking Web–based Learning Environments
Tp immunité adaptative suite
Le « RUN » (ou la Tierce Maintenance Applicative)
Reversal analogies
Polymer 1.0: easier, faster, better!
Ad

Similar to Characteristic of Malware Site and its Blocking Countermeasure (20)

PDF
Actual Condition Survey of Malware Download Sites for A Long Period
PDF
Modern Malware and Threats
PDF
Watchtowers of the Internet - Source Boston 2012
PDF
Maximize Computer Security With Limited Ressources
PPTX
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
PDF
Modern malware and threats
PPTX
Malicious traffic
PDF
Uncovering and Visualizing Botnet Infrastructure and Behavior
PPTX
Malware analysis
PPTX
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
PDF
3. APTs Presentation
PPT
Volume And Vectors 090416
PDF
TRISC 2010 - Grapevine , Texas
PDF
Scaling Web 2.0 Malware Infection
PDF
State of the Art Analysis Approach for Identification of the Malignant URLs
PDF
Introduction to the advanced persistent threat and hactivism
PPTX
2011-10 The Path to Compliance
PDF
Problems With Battling Malware Have Been Discussed, Moving...
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PPT
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Actual Condition Survey of Malware Download Sites for A Long Period
Modern Malware and Threats
Watchtowers of the Internet - Source Boston 2012
Maximize Computer Security With Limited Ressources
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
Modern malware and threats
Malicious traffic
Uncovering and Visualizing Botnet Infrastructure and Behavior
Malware analysis
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
3. APTs Presentation
Volume And Vectors 090416
TRISC 2010 - Grapevine , Texas
Scaling Web 2.0 Malware Infection
State of the Art Analysis Approach for Identification of the Malignant URLs
Introduction to the advanced persistent threat and hactivism
2011-10 The Path to Compliance
Problems With Battling Malware Have Been Discussed, Moving...
PHDays 2018 Threat Hunting Hands-On Lab
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Ad

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
DNSSEC Made Easy, presented at PHNOG 2025
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
PDF
The Internet - By the numbers, presented at npNOG 11
PDF
Transmission Control Protocol (TCP) and Starlink
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
PDF
Make DDoS expensive for the threat actors
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
APNIC Report, presented at APAN 60 by Thy Boskovic
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
Triggering QUIC, presented by Geoff Huston at IETF 123
DNSSEC Made Easy, presented at PHNOG 2025
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
IPv6 Deployment and Best Practices, presented by Makito Lay
Cleaning up your RPKI invalids, presented at PacNOG 35
The Internet - By the numbers, presented at npNOG 11
Transmission Control Protocol (TCP) and Starlink
DDoS in India, presented at INNOG 8 by Dave Phelan
Global Networking Trends, presented at the India ISP Conclave 2025
Make DDoS expensive for the threat actors
Fast Reroute in SR-MPLS, presented at bdNOG 19
DDos Mitigation Strategie, presented at bdNOG 19
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Measuring Starlink Protocol Performance, presented at LACNIC 43

Recently uploaded (20)

PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Introduction to the IoT system, how the IoT system works
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
innovation process that make everything different.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
international classification of diseases ICD-10 review PPT.pptx
DOCX
Unit-3 cyber security network security of internet system
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
Decoding a Decade: 10 Years of Applied CTI Discipline
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PptxGenJS_Demo_Chart_20250317130215833.pptx
presentation_pfe-universite-molay-seltan.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Unit-1 introduction to cyber security discuss about how to secure a system
Mathew Digital SEO Checklist Guidlines 2025
SASE Traffic Flow - ZTNA Connector-1.pdf
Cloud-Scale Log Monitoring _ Datadog.pdf
Introduction to the IoT system, how the IoT system works
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
innovation process that make everything different.pptx
Paper PDF World Game (s) Great Redesign.pdf
Module 1 - Cyber Law and Ethics 101.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
The New Creative Director: How AI Tools for Social Media Content Creation Are...
international classification of diseases ICD-10 review PPT.pptx
Unit-3 cyber security network security of internet system
Tenda Login Guide: Access Your Router in 5 Easy Steps

Characteristic of Malware Site and its Blocking Countermeasure

  • 1. Characteristic of Malware Site and its Blocking Countermeasure Apricot 2017 Yasuyuki Tanaka, CISSP Institute of Information Security (IISEC) NTT Communications Corporation 1
  • 2. Todayʼs contents 1.Internet malicious activity and blocking trend 2.Our analytical results 3.Suggestion and discussion 2
  • 3. Drive-by-download infection chain 3 Compromised Site Affiliate Advertising Attackerʼs ResourcesLegitimate Service HIY model Malware Owner Exploit Pack Developer Exploit as a Service model Pay Per Install model Malvertising model Victims
  • 4. How to infect ? n Drive-by-download consists of three factors. • Landing site, Exploit site, Malware download site 4 Landing site Exploit site Malware download site Exploit site Landing site Landing site Landing site ① ② ③ ④ Victim PC
  • 5. Characteristics of each site n existing in legitimate service n redirect to exploit site n short-lived n made of web attack toolkit n referrer from Landing site n short-lived n repeat run and stop n change malware n long-lived 5 Landing site Exploit site Malware download site In this paper we focused on Malware download Site.
  • 6. OCN malware block service n In Feb. 2016, NTT communications started offering users of the internet service provider OCN a free malware blocker service, the first ISP in Japan to offer such a service. 6 Personal information, Credit card number, etc. Legitimate traffic Evil traffic DNS server Block ! User Attacker C&C Server DNS server based on FQDN blacklist Malware
  • 7. FQDN Block vs URL Block 7 block method FQDN block URL block intelligence to use FQDN blacklist URL blacklist apply device example DNS, /etc/hosts L7 firewall pros lightweight simple detailed operation cons over blocking complexity high cost
  • 8. Over blocking problem 8 http://www.aaa.com/111/222.php benign site http://www.aaa.com/aaa/z.php http://www.aaa.com/111/a.js http://www.aaa.com/111/222.exe http://www.aaa.com/yyy/zzz malicious site malicious site benign site benign site OVER BLOCKED OVER BLOCKED OVER BLOCKED
  • 9. Todayʼs contents 1.Internet malicious activity and blocking trend 2.Our analytical results 3.Suggestion and discussion 9
  • 10. Check Malware download URL status Malware Download Site Status Benign High Interaction Web crawler 10 Malicious Multi Anti-Virus software Active Stop every day check many Malware Download Site download file n In order to decide appropriate methods or period for blacklisting malware download site. n We check malware download site status everyday. n Total number of URLs : 43,034. n Observation Period : 1.5 years
  • 11. Status record n status table • we recorded status of each URLs every day. • short stop span(url1), long stop span(url2,4). 11 DAY 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 url1 ✔ ✔ ✔ X ✔ ✔ X ✔ X ✔ ✔ ✔ X X ✔ ✔ ✔ ✔ ✔ ✔ url2 X ✔ X X X ✔ X X X X X X X ✔ X X ✔ X X X url3 ✔ ✔ ✔ X ✔ ✔ X X ✔ ✔ ✔ X X X ✔ X X ✔ X ✔ url4 X X ✔ ✔ ✔ X ✔ ✔ ✔ ✔ X X X X X X ✔ ✔ X ✔ ✔ active X stop
  • 12. Malware hash record 12 n We found a certain characteristics. n malware hash table • we recorded which files downloaded. • unchanged (url1,2) • every-time changed (url3) • change occasionally (url4) DAY 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 url1 A A A A A A A A A A A A A A A url2 B B B B url3 C D F G H I J K L M N url4 O O O P O O O O O R big letter alphabet : malware’s hash
  • 14. Category2 “every-time changed” n hxxp://download.veterants.info/index.html?e=tnfd9&amp;clsb=1&amp;publ isher=11206&amp;prv=TinyWallet&amp;sfx=1&amp;hid=169770297314061 96910&amp;cht=2&amp;dcu=1&amp;cpatch=2&amp;dcs=1&amp;pf=1&am p;ne=1&amp;prs=4& 14 number of malware time every-time changed sha1hash value
  • 15. Category3 “changed occasionally” n hxxp://proxy.piratenpartij.nl/web.icm.cn/vote/install_flash _player_active_x.exe 15 number of malware time most time same hash value different hash value sometimes
  • 16. n In order to decide appropriate methods or period for blacklisting malware download site. n We defined three categories focusing on variation of malware. n We divided URLs on its definition. • UNC : unchanged • ETC : every-time changed • COC : changed occasionally n Total number of URLs : 43,034. n Observation Period : 1.5 years 16 Analytical purpose and procedure
  • 17. nWe analyzed features in the three category UNC, ETC, and COC. • lifetime, revived activity, IP address resource, malware variation, etc. nWe considered the operation and resources of attackers and discussed how to mitigate these categories. 17 Analytical purpose and procedure
  • 18. Lifetime and Active days definition n Lifetime • Period of first and last observation day. • here, we considered first and last only. n Active days • the number of active days. 18 our observation period : 1.5 year URL A Lifetime : 20 Active days : 4 URL B 40days ✔ 20days ✔ ✔✔ ✔ ✔✔✔ ✔✔ ✔ URL A Lifetime : 40 Active days : 7 URL B
  • 19. Lifetime CDF 19 10% of UNC lives over 500 days Lifetime ETC < UNC, COC
  • 20. Stop5, Stop10 definition nThe number of continuous stopped status • Stop5 : over 5days • Stop10 : over 10days 20 our observation priod : 1.5 year URL A 6days URL B 7days ✔ 13days 12days11days Stop5 : 2 Stop10 : 1 Stop5 : 3 Stop10 : 2 ✔✔ ✔✔ ✔✔ ✔✔✔✔✔
  • 21. Stop5, Stop10 CDF 21 10% of COC revives over 15 times Revive activity ETC < UNC < COC
  • 22. UniqIP CDF 22 2% of UNC used more than 180 IP
  • 23. IP Entropy CDF 23 IP variation UNC < ETC < COC
  • 24. 24 Characteristics UNC ETC COC Lifetime Longevity Short-lived Longevity Revive NA NA many times IP resource Substantial Fewer Substantial IP variation Fewer Substantial Substantial Activity NA Sparse Intensive Malware Known Known Unknown URL NA Long query part NA Characteristics and countermeasure Counterme- asure Blacklisting TBD Blacklisting
  • 25. Todayʼs contents 1.Internet malicious activity and blocking trend 2.Our analytical results 3.Suggestion and discussion 25
  • 26. Suggestion - What should operators do ? n Fully extermination of malicious site is the most important. n When operators received abuse reports, they should perform concrete action until malicious site disappear fully. n but according to [1], about 60%(12/19) reports were not handled properly by ISPs. • case1: no reply. • case2: enable to locate an abuse@domain in WHOIS. • case3: good case ! immediately disconnected site. • case4: forwarded to customer by ISP, but the server was still alive. 26 [1] Antonio Nappa, M. Zubair Rafique, Juan Caballero. The MALICIA dataset: identification and analysis of drive-by download operations <https://lirias.kuleuven.be/bitstream/123456789/464045/1/malicia_dataset.pdf>
  • 27. Suggestion - What should ISPs do ? nTodayʼs increasing Internet use has become plagued by malicious activity such as exploit-as-a-service model. nItʼs import to consider IP or FQDN block service such as “malware block service” of NTTcom OCN. nIP or FQDN block have over blocking problem. So in addition to IP and FQDN block, it is desirable to use URL blocking. 27
  • 28. 28 Personal information, Credit card number, etc. Legitimate traffic Evil traffic DNS server Block ! User Attacker C&C Serverbased on FQDN blacklist Suggestion - What should ISPs do ? L7 FW based on URL blacklist and Malware DNS server This is simple image. Only my opinion.
  • 29. Discussion - FQDN, IP, and URL blocking nOur survey shows that URL blacklisting is effective for some malicious site. • UNC and COC, especially COC provide unknown malware. nURL blacklisting on ISP ? • high operation cost ? do you think realistic way? nHow about FQDN blacklisting on ISP ? • how about domain, IP address, AS ? • combination is important ? 29
  • 30. 30 Thank you very much. Any question ?