skip to main content
10.1145/2785956.2787494acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes

Published:17 August 2015Publication History
First page image
Skip Supplemental Material Section

Supplemental Material

p625-konte.webm

webm

152.8 MB

References

  1. abuse.ch. And Another Bulletproof Hosting AS Goes Offline, Mar. 2010. http://www.abuse.ch/?p=2496.Google ScholarGoogle Scholar
  2. abuse.ch. 2011: A Bad Start For Cybercriminals: 14 Rogue ISPs Disconnected. http://www.abuse.ch/?tag=vline-telecom, Jan. 2011.Google ScholarGoogle Scholar
  3. N. M. Al-Rousan and L. Trajkovic. Machine learning models for classification of BGP anomalies. In High Performance Switching and Routing (HPSR), pages 103--108, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  4. BGP Ranking. http://bgpranking.circl.lu/.Google ScholarGoogle Scholar
  5. Bgp ranking reports. http://bgpranking.circl.lu/.Google ScholarGoogle Scholar
  6. L. Breiman. Random Forests. Machine learning, 45(1):5--32, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bulletproof Hosting. http://en.wikipedia.org/wiki/Bulletproof_hosting. Wikipedia.Google ScholarGoogle Scholar
  8. K. Chiang and L. Lloyd. A case study of the Rustock rootkit and spam bot. In Workshop on Understanding Botnets, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. P. Collins, T. J. Shimeall, S. Faber, J. Janies, R. Weaver, M. De Shon, and J. Kadane. Using uncleanliness to predict future botnet addresses. In ACM SIGCOMM Internet Measurement Conference, pages 93--104, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Criminal service providers. http://cyberthreat.wordpress.com/category/criminal-service-providers/.Google ScholarGoogle Scholar
  11. DShield: Internet Storm Center - Internet Security. www.dshield.org/?Google ScholarGoogle Scholar
  12. F.Li and M. Hsieh. An empirical study of clustering behavior of spammers and group-based anti-spam strategies. In Conference on Email and Anti-Spam (CEAS), 2006.Google ScholarGoogle Scholar
  13. Hostexploit. AS50896-PROXIEZ Overview of a crime server, May 2010. http://goo.gl/AYGKAQ.Google ScholarGoogle Scholar
  14. Hostexploit, June 2011. http://hostexploit.com/.Google ScholarGoogle Scholar
  15. Hostexploit. World Hosts Report. Technical report, Mar. 2014. http://hostexploit.com/downloads/summary/7-public-reports/52-world-hosts-report-march-2014.html.Google ScholarGoogle Scholar
  16. Crimeware-firendly ISPs. http://hphosts.blogspot.com/2010/02/crimeware-friendly-isps-cogent-psi.html.Google ScholarGoogle Scholar
  17. B. Johnson, J. Chuang, J. Grossklags, and N. Christin. Metrics for Measuring ISP Badness: The Case of Spam. In Financial Cryptography and Data Security, pages 89--97. Springer, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  18. A. J. Kalafut, C. A. Shue, and M. Gupta. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems. In IEEE INFOCOM, pages 1--5. IEEE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Kirk. ISP Cut Off from Internet After Security Concerns. http://www.pcworld.com/article/153734/mccolo_isp_security.html, Nov. 2008. PC World.Google ScholarGoogle Scholar
  20. M. Konte and N. Feamster. Re-wiring Activity of Malicious Networks. In Passive and Active Measurement, pages 116--125. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Krebs. Russian Business Network: Down, But Not Out. http://goo.gl/6ITJwP, Nov. 2007. Washington Post.Google ScholarGoogle Scholar
  22. B. Krebs. Host of Internet Spam Groups Is Cut Off. http://goo.gl/8J5P89, Nov. 2008. Washington Post.Google ScholarGoogle Scholar
  23. B. Krebs. Dozens of ZeuS Botnets Knocked Offline, Mar. 2010. http://krebsonsecurity.com/2010/03/dozens-of-zeus-botnets-knocked-offline/.Google ScholarGoogle Scholar
  24. J. Li, M. Guidero, Z. Wu, E. Purpus, and T. Ehrenkranz. BGP Routing Dynamics Revisited. ACM SIGCOMM Computer Communication Review, 37(2):5--16, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Luckie, B. Huffaker, A. Dhamdhere, V. Giotsas, et al. AS Relationships, Customer Cones, and Validation. In Proceedings of ACM SIGCOMM Internet Measurement Conference, pages 243--256. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Mai, L. Yuan, and C.-N. Chuah. Detecting BGP anomalies with wavelet. In IEEE Network Operations and Management Symposium, pages 465--472. IEEE, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  27. R. McMillan. After Takedown, Botnet-linked ISP Troyak Resurfaces. http://goo.gl/5k0OV1, Mar. 2010. Computer World.Google ScholarGoogle Scholar
  28. B. A. Prakash, N. Valler, D. Andersen, M. Faloutsos, and C. Faloutsos. BGP-lens: Patterns and Anomalies in Internet Routing Updates. In ACM SIGKDD international conference on Knowledge Discovery and Data Mining, pages 1315--1324, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In ACM SIGCOMM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. A. Ramachandran, N. Feamster, and S. Vempala. Filtering Spam with Behavioral Blacklisting. In ACM Conference on Computer and Communications Security (CCS), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. The Russian Business Network. http://en.wikipedia.org/wiki/Russian_Business_Network.Google ScholarGoogle Scholar
  32. The RouteViews Project. www.routeviews.org/.Google ScholarGoogle Scholar
  33. F. Roveta, G. Caviglia, L. Di Mario, S. Zanero, F. Maggi, and P. Ciuccarelli. Burn: Baring unknown rogue networks. In International Symposium on Visualization for Cyber Security (VizSec), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Sitevet. http://sitevet.com/.Google ScholarGoogle Scholar
  35. Spamhaus. www.spamhaus.org.Google ScholarGoogle Scholar
  36. B. Stone-Gross, C. Kruegel, K. Almeroth, A. Moser, and E. Kirda. FIRE: Finding rogue networks. In IEEE Computer Security Applications Conference (ACSAC), pages 231--240. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. C. Wagner, J. Francois, R. State, A. Dulaunoy, T. Engel, and G. Massen. ASMATRA: Ranking ASes providing transit ser- vice to malware hosters. In IFIP/IEEE International Sympososium on Integrated Network Management, pages 260--268, 2013.Google ScholarGoogle Scholar
  38. Y. Xie, F. Yu, K. Achan, R. Panigrahy, and G. Hulten. Spamming Botnets: Signatures and Characteristics. In SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. J. Zhang, Z. Durumeric, M. Bailey, M. Karir, and M. Liu. On the Mismanagement and Maliciousness of Networks. In Proceedings of the 21st Annual Network & Distributed System Security Symposium (NDSS '14), San Diego, California, USA, February 2013.Google ScholarGoogle Scholar
  40. J. Zhang, J. Rexford, and J. Feigenbaum. Learning-based anomaly detection in BGP updates. In ACM SIGCOMM Workshop on Mining Network Data (MineNet), pages 219--220. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGCOMM '15: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication
        August 2015
        684 pages
        ISBN:9781450335423
        DOI:10.1145/2785956

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 August 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SIGCOMM '15 Paper Acceptance Rate40of242submissions,17%Overall Acceptance Rate554of3,547submissions,16%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader