Clustering Payloads

Grouping Randomized Scan Probes Into Campaign Templates

Conference Paper (2022)
Author(s)

V.D.H. Ghiëtte (TU Delft - Cyber Security)

C. Dörr (Hasso Plattner Institute)

Research Group
Cyber Security
Copyright
© 2022 V.D.H. Ghiette, C. Dörr
DOI related publication
https://doi.org/10.23919/IFIPNetworking55013.2022.9829757
More Info
expand_more
Publication Year
2022
Language
English
Copyright
© 2022 V.D.H. Ghiette, C. Dörr
Research Group
Cyber Security
Pages (from-to)
1-9
ISBN (print)
978-1-6654-8726-9
ISBN (electronic)
978-3-903176-48-5
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Over the past decade, the scanning landscape has significantly changed. Powerful tools such as Masscan or Zmap allow anyone to scan the entire Internet in a matter of hours. Simultaneously, we witnessed the emergence of stealthy scanners, which map the Internet from thousands of vantage points at a low rate attempting to forego detection. As scanning is typically the first step towards later intrusion, organizations need to track, understand and draw intelligence from these scan campaigns. Organizations benefit from obtaining insights into what adversaries are currently looking for, which might reveal some new vulnerabilities. Furthermore, relating IP addresses with each other participating in scan campaigns provides valuable insights into the adversary's capabilities. In this paper, we describe a protocol-agnostic approach to extract commonalities and patterns from UDP scan traffic, relate individual scan packets regardless of whether they are sending static data or randomizing their payloads across destinations, and obtain 97% pattern accuracy with a data coverage of 96%. We apply our methodology on seven years of NTP and DNS scan traffic demonstrating that our automatic clustering provides stable tracking of strategies over time and identifies groups of source IPs with these behavioral characteristics effectively.

Files

Clustering_Payloads_Grouping_R... (pdf)
(pdf | 1.22 Mb)
- Embargo expired in 01-07-2023
License info not available