ASwatch Flashcards

1
Q

a system that identifies malicious ASes using exclusively the control-plane (i.e., routing)
behavior of ASes.

A

ASwatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a malicious autonomous system (AS) owned by an Internet service provider that willingly hosts and protects illicit activities.

A

Such service providers are usually referred to as bulletproof hosting , due to their reluctance to address repeated abuse complaints regarding their customers and the illegal services they run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unfortunately, existing AS reputation systems have a

number of limitations

A

(1) They cannot distinguish between malicious and legitimate but abused ASes. Legitimate ASes often unwillingly host malicious network activities (e.g., C&C
servers, phishing sites) simply because the machines that they host are abused.

(2) Because of the inability to distinguish between malicious and legitimate but abused ASes, it is not clear how to use the existing AS rankings to defend
against malicious ASes.

(3) Existing AS reputation systems require direct observation of malicious activity from many different vantage points and for an extended period of time,
thus delaying detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unlike existing data-plane based reputation
systems, ASwatch explicitly aims to identify malicious
ASes, rather than assigning low reputation to legitimate ASes that have unfortunately been abused.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malicious AS may advertise and use small blocks of its IP address space,

A

so that as soon as one small block of IP addresses is blocked or blacklisted, a new block can be advertised and used to support malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

if it is managed and operated by cyber-criminals, and if its main purpose is to support illicit network activities (e.g., phishing,malware distribution, botnets).

A

Malicious AS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

if its main purpose is to provide legitimate Internet services. In some cases, a legitimate AS’s IP address
space may be abused by cyber-criminals to host malicious activities (e.g., sending spam, hosting a botnet command-and control server). Such abuse is distinct from those cases where cyber-criminals operate and manage the AS.

A

Legitimate AS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ASwatch learns the control-plane behavior of malicious and legitimate ASes

A

Training phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ASwatch monitors globally visible BGP routing activity and AS relationships, to determine which ASes exhibit control plane behavior typical of malicious ASes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Things that ASWatch…watches

A

1) Rewiring activity
2) Link Stability
3) AS presence and overall activity
4) Upstream connectivity
5) Attachment to popular providers
6) IP Space Fragmentation and Churn
7) Prefix reachability
8) Topology and policy changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ASwatch can assign a reputation score to new ASes (i.e., ASes for which no ground truth is yet available). ASwatch computes a reputation score for each new AS observed in the BGP messages from Route views.

A

Operational Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which is better? BGP Ranking or ASWatch?

A

We found that ASwatch detected 72% of our set of malicious ASes over a three year period, and BGP Ranking detected about 34%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ASwatch is based on the intuition that malicious ASes exhibit “agile” control plane behavior (e.g., short-lived routes, aggressive rewiring).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly