2020
DOI: 10.1145/3419373
|View full text |Cite
|
Sign up to set email alerts
|

IP Reputation Scoring with Geo-Contextual Feature Augmentation

Abstract: The focus of this article is to present an effective anomaly detection model for an encrypted network session by developing a novel IP reputation scoring model that labels the incoming session IP address based on the most similar IP addresses in terms of both network and geo-contextual knowledge. We provide empirical evidence that considering not only traditional network information but also geo-contextual information provides better threat assessment. The reputation scores provide a means to quantitatively ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…This information is easy to extract and does not require a large volume of data. In this case, the models that are created are based on computations about the frequencies at which contextual information appears, or again, clustering techniques [16][17][18][19]. A global accuracy of 0.77 is reached to classify an IP address as malicious or not.…”
Section: Related Workmentioning
confidence: 99%
“…This information is easy to extract and does not require a large volume of data. In this case, the models that are created are based on computations about the frequencies at which contextual information appears, or again, clustering techniques [16][17][18][19]. A global accuracy of 0.77 is reached to classify an IP address as malicious or not.…”
Section: Related Workmentioning
confidence: 99%
“…AI_Adaptive_POW consists of four main modules and each module is lightweight and customizable. Our baseline framework uses an AI module called DaBR [2], to produce reputation scores which can be replaced by even more sophisticated reputation score calculation techniques (for example, see [5]). The AI model is trained using a list of known malicious IPs provided by Cisco Talos [3] which can be replaced by any other third party IP list service or an amalgamation of more than one lists.…”
Section: Design Impactmentioning
confidence: 99%
“…To avoid these drawbacks, it is better to try to obtain more information about the sources before blocking its traffic. However, new blocklists using localization and political actualities [8] tend to have better results as they integrate context into the analysis.…”
Section: State Of the Artmentioning
confidence: 99%