To fight malicious attackers on the Internet, it’s important to quickly identify the Internet addresses from which they are operating and to communicate that information to others.
To do that, the Internet Systems Consortium (ISC)–the nonprofit organization that maintains the most popular software for running domain-name servers–collects and analyzes more than 20,000 records per second and stores the results in a massive database, members of the group told attendees at the Black Hat security conference on Wednesday.
“We want to find the badness either before the victims are affected or as the victims are being attacked,” said Andrew Fried, a security researcher with the ISC.
The organization–which runs one of the 13 Internet root-name servers (the F-root)–combines its feed of new domain registrations and changes with reputable blacklists of known bad Internet addresses. In addition, the group searches for domains pointing to multiple IP addresses with low time-to-live intervals (indicating frequent updates to the name server), and addresses that are geographically dispersed. By scoring the results and applying a threshold, the ISC can find Internet addresses that likely host malicious machines.
The analysis technique has helped the ISC and other researchers track the spread of the malicious program Conficker. While Conficker.C–the most prolific variant–has steadily become less prevalent since late March, more than 5 million IP addresses still exhibit signs of infection, Fried said.
According to Chris Lee, a member of the Shadowserver Foundation, China continues to have the lion’s share of computers infected with Conficker, with Russia and Brazil holding second and third place. “This tells us that we are not getting the word out in China [and Russia and Brazil],” said Lee, who also works with the ISC.
The group has also seen signs of Conficker’s peer-to-peer traffic drop off as well.
It will soon be easy for self-driving cars to hide in plain sight. We shouldn’t let them.
If they ever hit our roads for real, other drivers need to know exactly what they are.
Maximize business value with data-driven strategies
Every organization is now collecting data, but few are truly data driven. Here are five ways data can transform your business.
Cryptocurrency fuels new business opportunities
As adoption of digital assets accelerates, companies are investing in innovative products and services.
Where to get abortion pills and how to use them
New US restrictions could turn abortion into do-it-yourself medicine, but there might be legal risks.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.