Home > Research > Publications & Outputs > A first look at the misuse and abuse of the IPv...

Electronic data

  • VGiotsas_PAM2020_IPv4_Transfers_abuse

    Accepted author manuscript, 441 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

A first look at the misuse and abuse of the IPv4 Transfer Market

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Close
Publication date18/03/2020
Host publicationPassive and Active Measurement Conference (PAM) 2020
EditorsAnna Sperotto, Alberto Dainotti, Burkhard Stiller
PublisherSpringer
Pages88-103
Number of pages16
ISBN (electronic) 9783030440817
ISBN (print)9783030440800
<mark>Original language</mark>English
EventPassive and Active Measurement Conference 2020 - University of Oregon, Eugene, United States
Duration: 30/03/202031/03/2020
https://pam2020.cs.uoregon.edu

Conference

ConferencePassive and Active Measurement Conference 2020
Abbreviated titlePAM
Country/TerritoryUnited States
CityEugene
Period30/03/2031/03/20
Internet address

Conference

ConferencePassive and Active Measurement Conference 2020
Abbreviated titlePAM
Country/TerritoryUnited States
CityEugene
Period30/03/2031/03/20
Internet address

Abstract

The depletion of the unallocated address space in combination with the slow pace of IPv6 deployment have given rise to the IPv4 transfer market, namely the trading of allocated IPv4 prefixes between ASes. While RIRs have established detailed policies in an effort to regulate the IPv4 transfer market for malicious networks such as spammers and bulletproof ASes, IPv4 transfers pose an opportunity to bypass reputational penalties of abusive behaviour since they can obtain "clean" address space or offload blacklisted address space. Additionally, IP transfers create a window of uncertainty about legitimate ownership of prefixes, which adversaries to hijack parts of the transferred address space. In this paper, we provide the first detailed study of how transferred IPv4 prefixes are misused in the wild by synthesizing an array of longitudinal IP blacklists and lists of prefix hijacking incidents. Our findings yield evidence that the transferred network blocks are used by malicious networks to address botnets and fraudulent sites in much higher rates compared to non-transferred addresses, while the timing of the attacks indicates efforts to evade filtering mechanisms.