TY - GEN
T1 - Shades of Grey
T2 - 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008
AU - Sinha, Sushant
AU - Bailey, Michael
AU - Jahanian, Farnam
PY - 2008
Y1 - 2008
N2 - Malicious code, or malware, executed on compromised hosts provides a platform for a wide variety of attacks against the availability of the network and the privacy and confidentiality of its users. Unfortunately, the most popular techniques for detecting and preventing malware have been shown to be significantly flawed [11], and it is widely believed that a significant fraction of the Internet consists of malware infected machines [17]. In response, defenders have turned to coarse-grained, reputation-based techniques, such as real time blackhole lists, for blocking large numbers of potentially malicious hosts and network blocks. In this paper, we perform a preliminary study of a type of reputation-based blacklist, namely those used to block unsolicited email, or spam. We show that, for the network studied, these blacklists exhibit non-trivial false positives and false negatives. We investigate a number of possible causes for this low accuracy and discuss the implications for other types of reputation-based blacklists.
AB - Malicious code, or malware, executed on compromised hosts provides a platform for a wide variety of attacks against the availability of the network and the privacy and confidentiality of its users. Unfortunately, the most popular techniques for detecting and preventing malware have been shown to be significantly flawed [11], and it is widely believed that a significant fraction of the Internet consists of malware infected machines [17]. In response, defenders have turned to coarse-grained, reputation-based techniques, such as real time blackhole lists, for blocking large numbers of potentially malicious hosts and network blocks. In this paper, we perform a preliminary study of a type of reputation-based blacklist, namely those used to block unsolicited email, or spam. We show that, for the network studied, these blacklists exhibit non-trivial false positives and false negatives. We investigate a number of possible causes for this low accuracy and discuss the implications for other types of reputation-based blacklists.
UR - http://www.scopus.com/inward/record.url?scp=58149096147&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=58149096147&partnerID=8YFLogxK
U2 - 10.1109/MALWARE.2008.4690858
DO - 10.1109/MALWARE.2008.4690858
M3 - Conference contribution
AN - SCOPUS:58149096147
SN - 9781424432899
T3 - 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008
SP - 57
EP - 64
BT - 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008
Y2 - 7 October 2008 through 8 October 2008
ER -