BLAG: Blacklist Aggregator


IP address blacklists are a useful source of information about repeat attackers. Such information can be used to prioritize which traffic to divert for deeper inspection (e.g., repeat offender traffic), or which traffic to serve first (e.g., traffic from sources that are not blacklisted). But blacklists also suffer from overspecialization – each list is geared towards a specific purpose – and they may be inaccurate due to misclassification or stale information. We propose BLAG, a system that evaluates and aggregates multiple blacklists feeds, producing a more useful, accurate and timely master blacklist, tailored to the specific customer network. BLAG uses a sample of the legitimate sources of the customer network’s inbound traffic to evaluate the accuracy of each blacklist over regions of address space. It then leverages recommendation systems to select the most accurate information to aggregate into its master blacklist. Finally, BLAG identifies portions of the master blacklist that can be expanded into larger address regions (e.g. /24 prefixes) to uncover more malicious addresses with minimum collateral damage. Our evaluation of 157 blacklists of various attack types and three ground-truth datasets shows that BLAG achieves high specificity up to 99%, improves recall by up to 114 times compared to competing approaches, and detects attacks up to 13.7 days faster, which makes it a promising approach for blacklist generation. BLAG collects historical data from multiple blacklists (B) and updates this dataset wheneverblacklist is updated by its maintainers. When a customer wants to use BLAG, our system uses its historical dataset (B) and a sample of the legitimate sources that send inbound traffic to the customer network (Ltr) to curate a master blacklist tailored to that customer.


Blacklists are updated daily here.


All necessary scripts to run BLAG in your network can be found here.


BLAG: Improving the Accuracy of Blacklists
Sivaramakrishnan Ramanathan, Jelena Mirkovic and Minlan Yu
Network and Distributed System Security Symposium (NDSS 20)
BibTeX | Slides