Malicious Topologies of IPv4
and Other Adventures in Internet-Scale Data Science
Suchin Gururangan
Bob Rudis

Rapid7 Data Science
Quick Bios
Suchin Gururangan
@ssgrn
suchin.co
Data Scientist
Bob Rudis
@hrbrmstr
rud.is
[Master]Chief Data Scientist


Delivering Security Data & Analytics 

that revolutionize the practice of cyber security
37%

Fortune 1000
5,100+

Customers
800+

Employees
99

Countries
Threat Exposure Management
Incident Detection and Response
Security Advisory Services
Rapid7
R7 Data Science + Labs
We have an incredible team of
Red teamers
Data Scientists
Developers
WIRED
IBM Watson Brings AI Wonders to Cybersecurity
Why Machine Learning Is Our Last Hope for
Cybersecurity
Fortune
Datanami
MIT builds AI system that can detect 85% of
cyberattacks
Business Insider
Machine learning is fueling a cyber arms race
Machine learning algorithms are only as good
as the data they are trained on.
Location Identification
Facial Recognition
Object Recognition
ModelPixels
URLs
SSL Certs
Webshells
malicious/benign?
anomalous?
URLs
SSL Certs
Webshells
Feature
Engineering
? Model
Most security data is inconsistent
short-lived
adversarial
biased
lacking ground truth
Let's get better security data.
Data science is not just machine learning.
The place for security data science?
Separate signal from noise
Finding and visualizing trends
Cluster hosts into groups
filtering
visualization
organization
Internet-Scale
Internet-Scale is big
Internet-Scale is generalizable
Internet-Scale is structured
Malicious Topologies of IPv4
Malicious Topologies of IPv4
Malicious Topologies of IPv4
Malicious Topologies of IPv4
See trends and develop context for micro-scale attacks
More data!
Why Internet-Scale Data Science?
Internet-Scale Tools
Sonar
Internet-wide surveys across entire public IPV4 and
a wide variety of services and protocols.
Started in Nov 2013 by HD Moore
Sonar Data
443/TCP SSL Certificates
80/TCP HTTP Get/IP vhosts
Reverse DNS
Forward DNS
UDP Probes (uPnP, IPMI, NetBIOS, etc.)
POP, IMAP, SMTP
443/TCP SSL Certs (weekly scans)
~25M SSL Certs, ~ 55GB in < 4 hours
80/TCP HTTP Get Requests (bi-weekly scans)
Reverse DNS (bi-weekly scans)
~60-65M Web servers, ~1.7 TB in < 10 hours
~1.1B Records, ~50 GB < 24 hours
What's out there?
Heisenberg
Low-interaction, cloud-based RDP honeypots deployed
across the world
Over 334 days, recorded:
221203 different password attempts
from 5076 distinct IP addresses
across 119 different countries
Malicious Topologies of IPv4
Other data
• BGP Archives
• Blacklists: CleanMX, phishtank, malwaredomains
Malicious Topology of IPV4
• How to apply Internet-scale structure to phishing
attacks?
• How can this structure help us identify malicious
areas of the Internet?
IPV4 Hierarchy
IP Subnet AS
127.0.0.1 127.0.0/24 AS10
source: xkcd
Malicious Topologies of IPv4
Malicious Topologies of IPv4
Malicious Autonomous Systems
AS Fragmentation
20.1.0/23
20.1.0/2320.1.2/23
20.1.2/24 20.1.2/24 20.1.0/2420.1.0/24
Tree Depth
Fragmentation = 1 - Tree Depth / # Nodes
Subnet Tree
Malicious AS Topology
Size
80-95th percentile in
IPv4
Fragmentation
10-20% higher
Malicious
Topology
Benign
Topology
- subnet
Composition
50-60% XX-small
subnets
Subnet Category ARIN Fee Subnet Prefix
XX-Small $500.00 < /22
X-Small $1,000.00 /22 - /20
Small $2,000.00 /20 - /18
Medium $4,000.00 /18 - /16
Large $8,000.00 /16 - /14
X-Large $16,000.00 /14 - /12
XX-Large $32,000.00 > /12
• Very few ASes host a disproportionate amount of
malicious activity
• Smaller subnets and ASes are becoming more
ubiquitous in IPv4
• Malicious ASes are likely large and deeply
fragmented
Recap
With Internet-Scale security data...
• We develop more informed context and bounds on
local malicious activity
• We make effective security ML more of a future
possibility
How can I get started?
• sonar.labs.rapid7.com and scans.io
• blacklists: CleanMX, Phishtank, Malwaredomains
• BGP archives - routeviews project
• Heisenberg data coming soon

More Related Content

PDF
Burning Down the Haystack to Find the Needle: Security Analytics in Action
PDF
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
PDF
CSF18 - Incident Response in the Cloud - Yuri Diogenes
PDF
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
PDF
CSF18 - Guarding Against the Unknown - Rafael Narezzi
PPTX
Base Metal Forensics
PPTX
Futuristic data mining technologies for cyber security
PDF
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
CSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - Guarding Against the Unknown - Rafael Narezzi
Base Metal Forensics
Futuristic data mining technologies for cyber security
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...

What's hot (20)

PDF
JAKU Botnet Analysis
PDF
Confusion and deception new tools for data protection
PPTX
Past, Present & Future of Credentials Theft
PPTX
Presentation1
PPTX
tatget attack
PDF
CSF18 - For Your Ears Only - Sasha Kranjac
PDF
Disrupt Hackers With Robust User Authentication
PPTX
GDPR: Protecting Your Data
PPTX
Cybersecurity is the Future of Computing
PPTX
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
PPTX
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
PDF
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
PDF
End-To-End Asymmetric Encryption of Biomedical Data In-Transit and At-Rest
PDF
Enterprise security: ransomware in enterprise and corporate entities
PPTX
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
PPTX
GreyNoise - Lowering Signal To Noise
PPTX
Insider theft detection
PDF
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
DOCX
Zero-Day Vulnerability and Heuristic Analysis
PPTX
News Bytes - December 2015
JAKU Botnet Analysis
Confusion and deception new tools for data protection
Past, Present & Future of Credentials Theft
Presentation1
tatget attack
CSF18 - For Your Ears Only - Sasha Kranjac
Disrupt Hackers With Robust User Authentication
GDPR: Protecting Your Data
Cybersecurity is the Future of Computing
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
End-To-End Asymmetric Encryption of Biomedical Data In-Transit and At-Rest
Enterprise security: ransomware in enterprise and corporate entities
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
GreyNoise - Lowering Signal To Noise
Insider theft detection
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
Zero-Day Vulnerability and Heuristic Analysis
News Bytes - December 2015
Ad

Similar to Malicious Topologies of IPv4 (20)

PDF
I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACH...
PDF
BSides Lisbon - Data science, machine learning and cybersecurity
PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
PPTX
Hunting Botnets with Zmap
PPTX
Hadoop / Spark on Malware Expression
PPTX
The Background Noise of the Internet
PPTX
Recon like a pro
PDF
Securerank ping-opendns
PPTX
DNS Security, is it enough?
PDF
Big Data Approaches to Cloud Security
PDF
Uncovering and Visualizing Malicious Infrastructure
PDF
CNIT 40: 4: Monitoring and detecting security breaches
PDF
Hitbkl 2012
 
PDF
deftcon 2015 - Dave Piscitello - DNS Traffic Monitoring
PDF
Reliability & Scale in AWS while letting you sleep through the night
PPTX
What's new in​ CEHv11?
PDF
OSINT for Attack and Defense
PDF
The Internet - By the numbers, presented at npNOG 11
PPTX
Blue Teaming on a Budget of Zero
PDF
CERT Data Science in Cybersecurity Symposium
I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACH...
BSides Lisbon - Data science, machine learning and cybersecurity
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Hunting Botnets with Zmap
Hadoop / Spark on Malware Expression
The Background Noise of the Internet
Recon like a pro
Securerank ping-opendns
DNS Security, is it enough?
Big Data Approaches to Cloud Security
Uncovering and Visualizing Malicious Infrastructure
CNIT 40: 4: Monitoring and detecting security breaches
Hitbkl 2012
 
deftcon 2015 - Dave Piscitello - DNS Traffic Monitoring
Reliability & Scale in AWS while letting you sleep through the night
What's new in​ CEHv11?
OSINT for Attack and Defense
The Internet - By the numbers, presented at npNOG 11
Blue Teaming on a Budget of Zero
CERT Data Science in Cybersecurity Symposium
Ad

Recently uploaded (20)

PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
Cyber Hygine IN organizations in MSME or
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
TITLE DEFENSE entitle the impact of social media on education
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPT
12 Things That Make People Trust a Website Instantly
PDF
Exploring The Internet Of Things(IOT).ppt
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Alethe Consulting Corporate Profile and Solution Aproach
Uptota Investor Deck - Where Africa Meets Blockchain
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
Containerization lab dddddddddddddddmanual.pdf
Cyber Hygine IN organizations in MSME or
The-Importance-of-School-Sanitation.pptx
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
TITLE DEFENSE entitle the impact of social media on education
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
artificialintelligenceai1-copy-210604123353.pptx
12 Things That Make People Trust a Website Instantly
Exploring The Internet Of Things(IOT).ppt
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
si manuel quezon at mga nagawa sa bansang pilipinas
AI_Cyberattack_Solutions AI AI AI AI .pptx
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt

Malicious Topologies of IPv4