TY - GEN
T1 - Clairvoyance
T2 - 22nd International Conference on Passive and Active Measurement, PAM 2021
AU - Li, Vector Guo
AU - Akiwate, Gautam
AU - Levchenko, Kirill
AU - Voelker, Geoffrey M.
AU - Savage, Stefan
N1 - Publisher Copyright:
© 2021, Springer Nature Switzerland AG.
PY - 2021
Y1 - 2021
N2 - One of the staples of network defense is blocking traffic to and from a list of “known bad” sites on the Internet. However, few organizations are in a position to produce such a list themselves, so pragmatically this approach depends on the existence of third-party “threat intelligence” providers who specialize in distributing feeds of unwelcome IP addresses. However, the choice to use such a strategy, let alone which data feeds are trusted for this purpose, is rarely made public and thus little is understood about the deployment of these techniques in the wild. To explore this issue, we have designed and implemented a technique to infer proactive traffic blocking on a remote host and, through a series of measurements, to associate that blocking with the use of particular IP blocklists. In a pilot study of 220K US hosts, we find as many as one fourth of the hosts appear to blocklist based on some source of threat intelligence data, and about 2% use one of the 9 particular third-party blocklists that we evaluated.
AB - One of the staples of network defense is blocking traffic to and from a list of “known bad” sites on the Internet. However, few organizations are in a position to produce such a list themselves, so pragmatically this approach depends on the existence of third-party “threat intelligence” providers who specialize in distributing feeds of unwelcome IP addresses. However, the choice to use such a strategy, let alone which data feeds are trusted for this purpose, is rarely made public and thus little is understood about the deployment of these techniques in the wild. To explore this issue, we have designed and implemented a technique to infer proactive traffic blocking on a remote host and, through a series of measurements, to associate that blocking with the use of particular IP blocklists. In a pilot study of 220K US hosts, we find as many as one fourth of the hosts appear to blocklist based on some source of threat intelligence data, and about 2% use one of the 9 particular third-party blocklists that we evaluated.
UR - http://www.scopus.com/inward/record.url?scp=85107280918&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85107280918&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-72582-2_4
DO - 10.1007/978-3-030-72582-2_4
M3 - Conference contribution
AN - SCOPUS:85107280918
SN - 9783030725815
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 57
EP - 75
BT - Passive and Active Measurement - 22nd International Conference, PAM 2021, Proceedings
A2 - Hohlfeld, Oliver
A2 - Lutu, Andra
A2 - Levin, Dave
PB - Springer
Y2 - 29 March 2021 through 1 April 2021
ER -