IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
Revealing Potential Threats of Multiple Malware Infections through Large-Scale ISP Flow Data Analysis
Kosuke MURAKAMIMasataka NAKAHARATakashi MATSUNAKAAyumu KUBOTA
著者情報
キーワード: C2 Server, Sinkhole, Flow Data
ジャーナル フリー 早期公開

論文ID: 2025ICT0002

詳細
抄録

As a countermeasure against the damage inflicted by bot-nets, one widely adopted approach is the takedown of Command and Control (C2) servers, which attackers utilize to issue commands to compromised bots. Although new malicious activities typically cease after such takedowns, pre-existing operations and default behaviors of infected hosts may continue. Moreover, these hosts often lack adequate security measures, leaving them susceptible to subsequent infections by other types of malware. Alternatively, Sinkhole observation—an approach that monitors communications from malware-infected hosts via the domains of seized C2 servers—offers valuable insight. In this study, we analyze the communication behaviors of infected hosts by correlating Sinkhole observation data with network flow data collected from ISP-operated environments, enabling the examination not only of traffic destined for Sinkhole servers but also of communications to other external destinations. Furthermore, by cross-referencing these communication destinations with known malicious server lists, we assess the current landscape of malware infections. Our analysis demonstrates that approximately 30% of infected IP addresses identified in Sinkhole data exhibit communication patterns indicative of multiple simultaneous malware infections.

著者関連情報
© 2025 The Institute of Electronics, Information and Communication Engineers
前の記事 次の記事
feedback
Top