Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis

Keisuke Furumoto, Korehito Kashiki, M. Morii, Masato Ikegami, Tomohisa Hasegawa, Teiichi Ishikawa, K. Nakao
{"title":"Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis","authors":"Keisuke Furumoto, Korehito Kashiki, M. Morii, Masato Ikegami, Tomohisa Hasegawa, Teiichi Ishikawa, K. Nakao","doi":"10.1109/CANDAR.2017.87","DOIUrl":null,"url":null,"abstract":"PRACTICE (Proactive Response Against Cyber-attacks Through International Collaborative Exchange) project was initiated with the aim of reducing the risk of cyber-attacks, by constructing a coordination system on cyber-attacks internationally and analyzing observed data of darknet sensors installed in 10 countries participating in PRACTICE. However, all of the previous studies related to PRACTICE are narrow-ranging results focusing on specific attacking hosts. In this paper, we analyzed the wide-ranging relationship between darknets sensors installed in countries participating in PRACTICE from the viewpoint of inbound packet and outbound packet for each port number. Inbound packet is a packet observed in countries participating in PRACTICE, and outbound packet is a summary of packets from a specific country observed in countries participating in PRACTICE. As a result, when attacking port 23 in countries participating in PRACTICE, it became clear that the attack tendency is clearly divided depending on the attacking country. Furthermore, assuming that Malware is involved in the difference in attack tendency by country, we conducted a correlation analysis of observed data of PRACTICE and observed data of Malware by country provided by ESET. As a result, it became clear that outbound packet for port 23 and downloader type malware related to botnet closely interlocked and this malware spreads infection by using Telnet (port 23). From the analysis results, as pointed out previously, it was revealed that the darknet packet for a specific port number is linked to Malware's activity.","PeriodicalId":157467,"journal":{"name":"2017 Fifth International Symposium on Computing and Networking (CANDAR)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Fifth International Symposium on Computing and Networking (CANDAR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CANDAR.2017.87","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

PRACTICE (Proactive Response Against Cyber-attacks Through International Collaborative Exchange) project was initiated with the aim of reducing the risk of cyber-attacks, by constructing a coordination system on cyber-attacks internationally and analyzing observed data of darknet sensors installed in 10 countries participating in PRACTICE. However, all of the previous studies related to PRACTICE are narrow-ranging results focusing on specific attacking hosts. In this paper, we analyzed the wide-ranging relationship between darknets sensors installed in countries participating in PRACTICE from the viewpoint of inbound packet and outbound packet for each port number. Inbound packet is a packet observed in countries participating in PRACTICE, and outbound packet is a summary of packets from a specific country observed in countries participating in PRACTICE. As a result, when attacking port 23 in countries participating in PRACTICE, it became clear that the attack tendency is clearly divided depending on the attacking country. Furthermore, assuming that Malware is involved in the difference in attack tendency by country, we conducted a correlation analysis of observed data of PRACTICE and observed data of Malware by country provided by ESET. As a result, it became clear that outbound packet for port 23 and downloader type malware related to botnet closely interlocked and this malware spreads infection by using Telnet (port 23). From the analysis results, as pointed out previously, it was revealed that the darknet packet for a specific port number is linked to Malware's activity.
基于出站数据包的多暗网分析及其在恶意软件分析中的应用
通过国际合作交流主动应对网络攻击(PRACTICE)项目启动,旨在通过构建国际网络攻击协调系统和分析在10个参与PRACTICE的国家安装的暗网传感器的观测数据,降低网络攻击的风险。然而,以往与PRACTICE相关的研究都是针对特定攻击主机的窄范围研究结果。在本文中,我们从每个端口号的入站数据包和出站数据包的角度分析了参与PRACTICE的国家安装的黑暗传感器之间的广泛关系。入方向数据包是参与PRACTICE的国家观测到的数据包,出方向数据包是参与PRACTICE的国家观测到的某一特定国家的数据包汇总。因此,当攻击参与PRACTICE的国家的23号端口时,很明显,攻击倾向根据攻击国家而明显划分。进一步,假设国别攻击趋势差异与恶意软件有关,我们将PRACTICE的观测数据与ESET提供的国别恶意软件观测数据进行相关性分析。结果,很明显,端口23的出站数据包和与僵尸网络相关的下载类型恶意软件紧密相连,这种恶意软件通过使用Telnet(端口23)传播感染。从分析结果来看,正如之前指出的那样,揭示了特定端口号的暗网数据包与恶意软件的活动有关。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信