Blacklist-based Malicious IP Traffic Detection
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F15%3A00080509" target="_blank" >RIV/00216224:14330/15:00080509 - isvavai.cz</a>
Result on the web
<a href="http://dx.doi.org/10.1109/GCCT.2015.7342657" target="_blank" >http://dx.doi.org/10.1109/GCCT.2015.7342657</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/GCCT.2015.7342657" target="_blank" >10.1109/GCCT.2015.7342657</a>
Alternative languages
Result language
angličtina
Original language name
Blacklist-based Malicious IP Traffic Detection
Original language description
At present malicious software or malware has increased considerably to form a serious threat to Internet infrastructure. It becomes the major source of most malicious activities on the Internet such as direct attacks, (distributed) denial-of-service (DOS) activities and scanning. Infected machines may join a botnet and can be used as remote attack tools to perform malicious activities controlled by the botmaster. In this paper we present our methodology for detecting any connection to or from maliciousIP address which is expected to be command and control (C&C) server. Our detection method is based on a blacklist of malicious IPs. This blacklist is formed based on different intelligence feeds at once. We process the network traffic and match the source and destination IP addresses of each connection with IP blacklist. The intelligence feeds are automatically updated each day and the detection is in the real time.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/OFMASUN201301" target="_blank" >OFMASUN201301: CIRC - Mobile dedicated devices to fulfilling ability to respond to cyber incidents</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Others
Publication year
2015
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of Global Conference on Communication Technologies (GCCT)
ISBN
9781479985531
ISSN
—
e-ISSN
—
Number of pages
5
Pages from-to
229-233
Publisher name
IEEE Xplore Digital Library
Place of publication
Thuckalay, India
Event location
Thuckalay, India
Event date
Apr 23, 2015
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—