{"id":2673,"date":"2019-10-09T03:59:59","date_gmt":"2019-10-09T03:59:59","guid":{"rendered":"https:\/\/www.aiproblog.com\/index.php\/2019\/10\/09\/using-machine-learning-to-hunt-down-cybercriminals\/"},"modified":"2019-10-09T03:59:59","modified_gmt":"2019-10-09T03:59:59","slug":"using-machine-learning-to-hunt-down-cybercriminals","status":"publish","type":"post","link":"https:\/\/www.aiproblog.com\/index.php\/2019\/10\/09\/using-machine-learning-to-hunt-down-cybercriminals\/","title":{"rendered":"Using machine learning to hunt down cybercriminals"},"content":{"rendered":"<p>Author: Adam Conner-Simons | MIT CSAIL<\/p>\n<div>\n<p>Hijacking IP addresses is an increasingly popular form of cyber-attack. This is done for a range of reasons, from sending <a href=\"http:\/\/people.eecs.berkeley.edu\/~sylvia\/cs268-2019\/papers\/\/net-spammers.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">spam<\/a> and <a href=\"http:\/\/dyn.com\/blog\/vast-world-of-fraudulent-routing\/\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a> to <a href=\"http:\/\/hackingdistributed.com\/2017\/05\/01\/bgp-attacks-on-btc\/\" target=\"_blank\" rel=\"noopener noreferrer\">stealing Bitcoin<\/a>. It\u2019s estimated that in 2017 alone, routing incidents such as IP hijacks affected <a href=\"http:\/\/www.internetsociety.org\/blog\/2018\/01\/14000-incidents-2017-routing-security-year-review\/\">more than 10 percent<\/a> of all the world\u2019s routing domains. There have been major incidents at <a href=\"http:\/\/arstechnica.com\/information-technology\/2018\/04\/suspicious-event-hijacks-amazon-traffic-for-2-hours-steals-cryptocurrency\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon<\/a> and <a href=\"http:\/\/arstechnica.com\/information-technology\/2018\/11\/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> and even in nation-states \u2014 <a href=\"http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1050&#038;context=mca\" target=\"_blank\" rel=\"noopener noreferrer\">a study last year<\/a> suggested that a Chinese telecom company used the approach to gather intelligence on western countries by rerouting their internet traffic through China.<\/p>\n<p>Existing efforts to detect IP hijacks tend to look at specific cases when they\u2019re already in process. But what if we could predict these incidents in advance by tracing things back to the hijackers themselves?\u00a0\u00a0<\/p>\n<p>That\u2019s the idea behind a new machine-learning system developed by researchers at MIT and the University of California at San Diego (UCSD). By illuminating some of the common qualities of what they call \u201cserial hijackers,\u201d the team trained their system to be able to identify roughly 800 suspicious networks \u2014 and found that some of them had been hijacking IP addresses for years.\u00a0<\/p>\n<p>\u201cNetwork operators normally have to handle such incidents reactively and on a case-by-case basis, making it easy for cybercriminals to continue to thrive,\u201d says lead author Cecilia Testart, a graduate student at MIT\u2019s Computer Science and Artificial Intelligence Laboratory (CSAIL) who will present the paper at the ACM Internet Measurement Conference in Amsterdam on Oct. 23. \u201cThis is a key first step in being able to shed light on serial hijackers\u2019 behavior and proactively defend against their attacks.\u201d<\/p>\n<p>The paper is a collaboration between <a href=\"https:\/\/www.csail.mit.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSAIL<\/a> and the <a href=\"http:\/\/www.caida.org\/home\/\" target=\"_blank\" rel=\"noopener noreferrer\">Center for Applied Internet Data Analysis<\/a> at UCSD\u2019s Supercomputer Center. The paper was written by Testart and David Clark, an MIT senior research scientist, alongside MIT postdoc Philipp Richter and data scientist Alistair King as well as research scientist Alberto Dainotti of UCSD.<\/p>\n<p><strong>The nature of nearby networks<\/strong><\/p>\n<p>IP hijackers exploit a key shortcoming in the Border Gateway Protocol (BGP), a routing mechanism that essentially allows different parts of the internet to talk to each other. Through BGP, networks exchange routing information so that data packets find their way to the correct destination.\u00a0<\/p>\n<p>In a BGP hijack, a malicious actor convinces nearby networks that the best path to reach a specific IP address is through their network. That\u2019s unfortunately not very hard to do, since BGP itself doesn\u2019t have any security procedures for validating that a message is actually coming from the place it says it\u2019s coming from.<\/p>\n<p>\u201cIt\u2019s like a game of Telephone, where you know who your nearest neighbor is, but you don\u2019t know the neighbors five or 10 nodes away,\u201d says Testart.<\/p>\n<p>In 1998 the U.S. Senate&#8217;s first-ever cybersecurity hearing featured a team of hackers who claimed that they could use IP hijacking to take down the Internet in <a href=\"http:\/\/nam02.safelinks.protection.outlook.com\/?url=http%3A%2F%2Ficm-tracking.meltwater.com%2Flink.php%3FDynEngagement%3Dtrue%26H%3DqJ9juQrYQnz1cqUgIm8psgUQ75z%252Bv%252FUt%252BmzLgDhho6nnEEJMrQdYl1zRhdmgwVO4ZkH8iFZ8leicwpTNmnill8TjEmDJtJrw1in5PMqdl6fvBGZZu6N0kSo2ToJ0eVpn%26G%3D0%26R%3Dhttp%253A%252F%252Fwww.washingtonpost.com%252Fsf%252Fbusiness%252F2015%252F06%252F22%252Fnet-of-insecurity-part-3%252F%26I%3D20191003162801.00000000dd18%2540mail6-42-usnbn1%26X%3DMHwxMDQ2NzU4OjVkODUyOTlhYWY4YTQzYWIyZDdiMDhkZTs%253D%26S%3DQc9hT5EK4NxzdnIYP8gRwBcyA5xzZjSY74mQM7k_yFc&#038;data=02%7C01%7Crick.merritt%40aspencore.com%7Cd2953db84a084c554e4608d7481ea95b%7C171a2fb16cc240019d57e77b84e3294f%7C1%7C0%7C637057168847531124&#038;sdata=IrnfHyItk1yXNoio1myUiH17LkjtJzshE3DsxtS7RKM%3D&#038;reserved=0\">under 30 minutes<\/a>. Dainotti says that, more than 20 years later, the lack of deployment of security mechanisms in BGP is still a serious concern.<\/p>\n<p>To better pinpoint serial attacks, the group first pulled data from several years\u2019 worth of network operator mailing lists, as well as historical BGP data taken every five minutes from the global routing table. From that, they observed particular qualities of malicious actors and then trained a machine-learning model to automatically identify such behaviors.<\/p>\n<p>The system flagged networks that had several key characteristics, particularly with respect to the nature of the specific blocks of IP addresses they use:<\/p>\n<ul>\n<li>Volatile changes in activity<strong>: <\/strong>Hijackers\u2019 address blocks seem to disappear much faster than those of legitimate networks. The average duration of a flagged network\u2019s prefix was under 50 days, compared to almost two years for legitimate networks.<\/li>\n<li>Multiple address blocks<strong>: <\/strong>Serial hijackers tend to advertise many more blocks of IP addresses, also known as \u201cnetwork prefixes.\u201d<\/li>\n<li>IP addresses in multiple countries:<strong> <\/strong>Most networks don\u2019t have foreign IP addresses. In contrast, for the networks that serial hijackers advertised that they had, they were much more likely to be registered in different countries and continents.<\/li>\n<\/ul>\n<p><strong>Identifying false positives<\/strong><\/p>\n<p>Testart said that one challenge in developing the system was that events that look like IP hijacks can often be the result of human error, or otherwise legitimate. For example, a network operator might use BGP to defend against distributed denial-of-service attacks in which there\u2019s huge amounts of traffic going to their network. Modifying the route is a legitimate way to shut down the attack, but it looks virtually identical to an actual hijack.<\/p>\n<p>Because of this issue, the team often had to manually jump in to identify false positives, which accounted for roughly 20 percent of the cases identified by their classifier. Moving forward, the researchers are hopeful that future iterations will require minimal human supervision and could eventually be deployed in production environments.<\/p>\n<p>\u201cThe authors&#8217; results show that past behaviors are clearly not being used to limit bad behaviors and prevent subsequent attacks,\u201d says David Plonka, a senior research scientist at Akamai Technologies who was not involved in the work. \u201cOne implication of this work is that network operators can take a step back and examine global Internet routing across years, rather than just myopically focusing on individual incidents.\u201d<\/p>\n<p>As people increasingly rely on the Internet for critical transactions, Testart says that she expects IP hijacking\u2019s potential for damage to only get worse. But she is also hopeful that it could be made more difficult by new security measures. In particular, large backbone networks such as AT&#038;T have <a href=\"http:\/\/mailman.nanog.org\/pipermail\/nanog\/2019-February\/099501.html\" target=\"_blank\" rel=\"noopener noreferrer\">recently announced<\/a> the adoption of resource public key infrastructure (RPKI), a mechanism that uses cryptographic certificates to ensure that a network announces only its legitimate IP addresses.\u00a0<\/p>\n<p>\u201cThis project could nicely complement the existing best solutions to prevent such abuse that include filtering, antispoofing, coordination via contact databases, and sharing routing policies so that other networks can validate it,\u201d says Plonka. \u201cIt remains to be seen whether misbehaving networks will continue to be able to game their way to a good reputation. But this work is a great way to either validate or redirect the network operator community&#8217;s efforts to put an end to these present dangers.\u201d<\/p>\n<p>The project was supported, in part, by the MIT Internet Policy Research Initiative, the William and Flora Hewlett Foundation, the National Science Foundation, the Department of Homeland Security, and the Air Force Research Laboratory.<\/p>\n<\/div>\n<p><a href=\"http:\/\/news.mit.edu\/2019\/using-machine-learning-hunt-down-cybercriminals-1009\">Go to Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Adam Conner-Simons | MIT CSAIL Hijacking IP addresses is an increasingly popular form of cyber-attack. This is done for a range of reasons, from [&hellip;] <span class=\"read-more-link\"><a class=\"read-more\" href=\"https:\/\/www.aiproblog.com\/index.php\/2019\/10\/09\/using-machine-learning-to-hunt-down-cybercriminals\/\">Read More<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":470,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/posts\/2673"}],"collection":[{"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/comments?post=2673"}],"version-history":[{"count":0,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/posts\/2673\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/media\/465"}],"wp:attachment":[{"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/media?parent=2673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/categories?post=2673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/tags?post=2673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}