Keywords

1 Introduction

The Internet is an important infra resource that it controls the economy and society of our country. Also, it is a providing convenience and an efficiency of the everyday life. But, the Internet for developed part of everyday life is threatened through an intelligent and an advanced various attacks. Therefore, a detection of black IP is important. The black IP is known for a result of malicious action of attacker. Because, it have an effectiveness of pre-detection for real attacks. So, many researchers have been studying about the countermeasure [1,2,3,4,5,6,7]. But, these research take disadvantage of high cost, detection time, difficulty of management, etc. Therefore, in this paper focus on the detection of black IP. Because, it take advantage of low cost, easily and early detection. So, the early detection time is important compared with a detection time of antivirus solutions. In this paper, a proposed method is an using source IPs in the collected darknet packets.

We propose for how to detect black IP using for classification and analysis through source IPs of daily darknet traffic. The main contribution of proposed process is an early detection for sign of attacks. The proposed process prepared 8,192 destination IP addresses in darknet space and collected the darknet traffic during 2016, August. These collected the number of darknet packets 277,002,257 and unique source IPs 8,392,962. Case of an using to monthly duplicate IPs, black IPs were predicted 18 of total 34. It is percentage of 52.94%.

The rest of paper is organized as follows. In Sect. 2, we give a brief description of existing approaches related to the darknet system. In Sect. 3, we present the proposed process and the experimental results are given in Sect. 4. Finally, we explain conclusions for given advantages in Sect. 5.

2 Related Work

Recently, many researchers have been studying about the darknet. An analysis of darknet traffic consist of two methods to classification of traffic and pattern search through analyzed traffic. In this paper targets to classification of darknet traffic. The darknet has been used for studying and developing the countermeasures against malicious activities on the Internet. Among them, three popular systems were proposed in Refs. [1,2,3].

Many studies have been devoted to characterizing common anomalous events in the darknet. [8] is a combined method of IDS and darknet, [9] is a how to collect darknet traffic. Also, darknet have massive data. Therefore, recently statistical analysis is important [10], method of [11] classify the darknet traffic either normal or abnormal.

3 Proposed Process

3.1 All Kinds of Collected Darknet Packets

The common kinds of collected darknet packets are composed of scanning packets, real attack packets, misconfiguration packets, etc. Firstly, the scanning packets are equal to a pre-investigation for real attacks. Also, the network scanning is constituted for a majority of darknet data. The scanning activities are the result of reconnaissance and DRDoS activities. Attackers scan the Internet to identify vulnerabilities and running services with an intent to compromise them. Secondly, we could detect packets of real attack through known patterns. Therefore, trends and patterns for a some attack were identified. Finally, the misconfiguration packets are occurred by errors and data management in network communications. Users often can enter an composing wrong IP address and port information in a network environment. In practice, these errors were observed that deployed networks suffer from well known errors and faulty configuration. As a result, the scanning packets and the real attack packets are taken for a large percentage of darknet packets.

3.2 Proposed Method

We need to choose one of various darknet information due to need for choice and concentration. Actually, the darknet information is composed to such as source IP, source port, destination IP, destination port, payload, event time, etc. Consequently, this paper have chosen focusing on source IPs in the darknet packets. Therefore, we chose top 10 of source IPs of daily detected packets. Because, the more inflow packets by the detected source IPs is, the more high probability of malicious actions is. Also, this paper is initial phase to verify efectiveness of the proposed method. So, if we change a setup like a period and a number of source IPs, then it can be generated for another results. Figure 1 shows an overall proposed process.

Fig. 1.
figure 1

An overall proposed process

Fig. 2.
figure 2

A main idea of detecting black IPs

The VirusTotal could provides verification results of various antivirus solutions. So, the chosen top 10 of source IPs are analyzed through VirusTotal site either malicious or normal IPs. And then, we make a comparison between a detection day by VirusTotal and a collected day of darknet packets. Finally, if a day of detected source IP was before a detection day by VirusTotal, then we can early know a malicious IP through darknet. Figure 2 shows a main idea of detecting black IPs.

4 Experimental Results

We show real experimental results of the proposed process. The proposed process prepared the 8,192 destination IP addresses in darknet space and the collected the darknet traffic in 2016, August. These collected the number of darknet packets 277,002,257 and unique source IPs 8,392,962.

Fig. 3.
figure 3

The number of malicious IPs to daily duplicate IPs

An analyzed result by VirusTotal, the experimental results focus on a daily source IPs in August. Figure 3 shows the number of malicious IPs to daily duplicate IPs. Figure 4 shows the number of malicious IPs to monthly duplicate IPs. Previously mentioned, daily duplicate IPs are an independent IP of each day. Also, monthly duplicate IPs are an independent IP of each month.

Fig. 4.
figure 4

The number of malicious IPs to monthly duplicate IPs

In the results, the daily duplicate IPs are total 142. Also, the monthly duplicate IPs are total 34. Therefore, the experimental results can be changed by the period and the number of source IPs. Table 1 shows an one result of daily source IPs in August.

Table 1. An one result of daily source IPs in August

The VirusTotal results are detected malicious IPs through Latest detected URLs, Latest detected files that were downloaded from this IP address, Latest Detected Files that communicate with this IP address, etc. So, if many antivirus solutions could decide malicious IPs then we can get confidence results. In the result, daily duplicate IPs are predicted 111 of total 142. It is percentage of 72.17%. Monthly duplicate IPs are predicted 18 of total 34. It is percentage of 52.94%. Therefore, experimental results can be changed depend on the selection of duplicate IPs.

Table 2. A top 10 source IPs of 2016, August

Additionally, if we have been analyze a lengthy period of time then we can get another results. For example, case of focus on monthly source IPs, Table 2 shows a top 10 source IPs in Aug, 2016. In the result, we could know in advance 3(rank 1, 3, 6) of 4 malicious IPs(rank 1, 3, 6, 8).

5 Conclusions

We proposed practical classification and analysis through using darknet information. Also, an using the real darknet data, it find for a detecting black IPs. But, an analysis of darknet packets is a difficulty handling about overfull data. So, it can get confidence results by top 10 source IPs thereby choice and concentration. On the basis of statistical analysis, we focus on the source IPs in the darknet packets. Also, through experimental results, if we have been analyze a lengthy period of time then we can get improved results. Applying to security control, malicious and suspicious IPs must have managed and duplicate IPs must have managed. Because, suspicious IPs will be detected malicious IPs. If condition of proposed process is changed such as period of time, day, week, month, etc. and top 10, top 50, top 100, etc. then results can be changed. Therefore, optimal conditions can be found through a various experiment. It need to a various combination of conditions. As a result, if applying to security control system, then it will be improve efficiency and accuracy.