SlideShare a Scribd company logo
CYBERSPACE
PATTERNS & ANOMALIES IN
TIM BASS
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017
CYBERSPACE
SITUATIONAL AWARENESS



PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017
VISUALIZING NEAR REAL TIME NETWORK
OBJECTS & RELATIONSHIPS
FOR INCREASED SITUATIONAL KNOWLEDGE
OF CYBERSPACE ACTIVITY & ANOMALIES



PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
TIM BASS 8 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
CLANDESTINE BAIDU BOTS …. GEOIP CHINA
TIM BASS 9 MARCH 2017
INDEXING WEBSITE
CLANDESTINELY
BLOCKED
TIM BASS 8 MARCH 2017
CLANDESTINE BAIDU BOTS …. GEOIP CHINA
TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
INDEXING WEBSITE
CLANDESTINELY
BLOCKED
TIM BASS 8 MARCH 2017
LINK INDEXING BOT NETWORK …
TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
INDEXING WEBSITE
IDENTIFIED AS
AHREF BOTS - GEOIP US
PERMISSION GRANTED
TIM BASS 8 MARCH 2017
CLANDESTINE BAIDU BOTS …. GEOIP BRAZIL
TIM BASS 9 MARCH 2017
UNREGISTERED
USER
REGISTERED
WEBSITE USER
PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
TIM BASS 8 MARCH 2017
CLANDESTINE BAIDU BOTS …. GEOIP BRAZIL
TIM BASS 9 MARCH 2017
“NORMAL” BOT NETWORKS
PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
BLOCKED
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017
CLANDESTINE BAIDU BOTS …. GEOIP CHINA
PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
INDEXING WEBSITE
CLANDESTINELY
BLOCKED
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017
PATTERN-BASED ANOMALY DETECTION
OBSERVE SITUATIONS IN CYBERSPACE
4
- PATTERNS ANOMALIES
- STRANGE BEHAVIOR
- UNEXPECTED SITUATIONS
- UNEXPLAINABLE OBSERVATIONS
PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
CLANDESTINE BAIDU BOTS …. GEOIP BRAZIL
A CLOSER LOOK SHOWS > 200 BOTS DISGUISED AS NORMAL USERS
BLOCKED
TIM BASS 8 MARCH 2017
NORMAL “LARGE”
BOTNET - INDEXING
WEBSITE AS AFREF BOTS
TIM BASS 9 MARCH 2017
LARGE “IDENTIFIED” SEARCH BOT NETWORK - GEOIP US
PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
PERMISSION GRANTED
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
CLANDESTINE BOT NETWORK - GEOIP KOREA …
INDEXING WEBSITE
DISGUISED AS NORMAL WEB USERS (NOT BOTS)
BLOCKED
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
CLANDESTINE “BANKRUPT IP ADDRESS BLOCK” BOTNET - GEOIP US …
ADDRESS SPACE ASSIGNED TO
BANKRUPT GRAPHICS CHIP
COMPANY NOW RUNNING
UNIDENTIFIED BOT NETWORK FROM
ASSIGNED IP ADDRESS SPACE
CI - TRIDENT MICROSYSTEMS SID-18863
BLOCKED
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
CLANDESTINE BOT NETWORK - GEOIP INDIA …
SUSPICIOUS ACTIVITY
FROM IP ADDRESS
CLUSTER IN INDIA
ADDED TO WATCH LIST
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
YANDEX BOT DISGUISED AT MOBILE DEVICE - GEOIP RUSSIA …
YANDEX BOT IDENTIFYING
ITSELF AS AN APPLE IOS
DEVICE IN USER AGENT (UA)
STRING
IGNORED
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017
PATTERN-BASED VISUAL ANOMALY DETECTION
SHOULD APPLIED TO MOST (IF NOT ALL) NETWORK OBJECTS
- WEBSITES & SERVERS
- MOBILE PHONES
- SMART DEVICES - IOTS
- NETWORK INFRASTRUCTURE
PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017
REFERENCES
TIM BASS, INTRUSION DETECTION SYSTEMS AND MULTISENSOR DATA FUSION,
COMMUNICATIONS OF THE ACM 43(4): 99-105, APRIL 2000, DOI 10.1145/332051.332079
TIM BASS, CYBERSPACE SITUATIONAL AWARENESS DEMANDS MIMIC TRADITIONAL
COMMAND REQUIREMENTS, SIGNAL, OFFICIAL PUBLICATION OF AFCEA, FEBRUARY 2000,
DOI 10.13140/RG.2.2.27068.85127
TIM BASS, CYBERSPACE SITUATION GRAPHS - A BRIEF OVERVIEW, PRESENTATION,
AFFILIATION: WWW.THECEPBLOG.COM, SEPTEMBER 2016, DOI 10.13140/RG.
2.2.16014.56643/9
TIM BASS, A JOURNEY INTO CYBERSPACE, PRESENTATION, AFFILIATION:
WWW.THECEPBLOG.COM, MARCH 4, 2017, DOI 10.13140/RG 2.2.26109.77284/1
PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
MY SINCERE APOLOGIES FOR THE SELF-REFERENCES
TIM BASS 8 MARCH 2017
TIM BASS 8 MARCH 2017
© TIM BASS, MARCH 2017
ALL RIGHTS RESERVED
TIM@UNIX.COM
PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 9 MARCH 2017

More Related Content

Viewers also liked

Planificaciondesistemas er
Planificaciondesistemas erPlanificaciondesistemas er
Planificaciondesistemas er
Jorge Pong Ng Chong
 
AMAR - Projeto Jardim Oceânico Presente
AMAR - Projeto Jardim Oceânico PresenteAMAR - Projeto Jardim Oceânico Presente
AMAR - Projeto Jardim Oceânico Presente
Amar Jardim Oceânico
 
Kim kleps 10 most dangerous sports
Kim kleps 10 most dangerous sportsKim kleps 10 most dangerous sports
Kim kleps 10 most dangerous sports
KimKleps
 
Procesos con arranque de material
Procesos con arranque de materialProcesos con arranque de material
Procesos con arranque de material
Oscar Barrios
 
Yinyin Liu-Portfolio2017-Landscape Architecture&photography
Yinyin Liu-Portfolio2017-Landscape Architecture&photographyYinyin Liu-Portfolio2017-Landscape Architecture&photography
Yinyin Liu-Portfolio2017-Landscape Architecture&photography
yinyin liu
 
The art of writing proper paragraphs
The art of writing proper paragraphsThe art of writing proper paragraphs
The art of writing proper paragraphs
Marc Draijer
 
художественная культура китая
художественная культура китая художественная культура китая
художественная культура китая
HOME
 

Viewers also liked (7)

Planificaciondesistemas er
Planificaciondesistemas erPlanificaciondesistemas er
Planificaciondesistemas er
 
AMAR - Projeto Jardim Oceânico Presente
AMAR - Projeto Jardim Oceânico PresenteAMAR - Projeto Jardim Oceânico Presente
AMAR - Projeto Jardim Oceânico Presente
 
Kim kleps 10 most dangerous sports
Kim kleps 10 most dangerous sportsKim kleps 10 most dangerous sports
Kim kleps 10 most dangerous sports
 
Procesos con arranque de material
Procesos con arranque de materialProcesos con arranque de material
Procesos con arranque de material
 
Yinyin Liu-Portfolio2017-Landscape Architecture&photography
Yinyin Liu-Portfolio2017-Landscape Architecture&photographyYinyin Liu-Portfolio2017-Landscape Architecture&photography
Yinyin Liu-Portfolio2017-Landscape Architecture&photography
 
The art of writing proper paragraphs
The art of writing proper paragraphsThe art of writing proper paragraphs
The art of writing proper paragraphs
 
художественная культура китая
художественная культура китая художественная культура китая
художественная культура китая
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Patterns & Anomalies in Cyberspace

  • 2. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017 CYBERSPACE SITUATIONAL AWARENESS
 
 PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
  • 3. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017 VISUALIZING NEAR REAL TIME NETWORK OBJECTS & RELATIONSHIPS FOR INCREASED SITUATIONAL KNOWLEDGE OF CYBERSPACE ACTIVITY & ANOMALIES
 
 PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
  • 4. TIM BASS 8 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 CLANDESTINE BAIDU BOTS …. GEOIP CHINA TIM BASS 9 MARCH 2017 INDEXING WEBSITE CLANDESTINELY BLOCKED
  • 5. TIM BASS 8 MARCH 2017 CLANDESTINE BAIDU BOTS …. GEOIP CHINA TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 INDEXING WEBSITE CLANDESTINELY BLOCKED
  • 6. TIM BASS 8 MARCH 2017 LINK INDEXING BOT NETWORK … TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 INDEXING WEBSITE IDENTIFIED AS AHREF BOTS - GEOIP US PERMISSION GRANTED
  • 7. TIM BASS 8 MARCH 2017 CLANDESTINE BAIDU BOTS …. GEOIP BRAZIL TIM BASS 9 MARCH 2017 UNREGISTERED USER REGISTERED WEBSITE USER PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
  • 8. TIM BASS 8 MARCH 2017 CLANDESTINE BAIDU BOTS …. GEOIP BRAZIL TIM BASS 9 MARCH 2017 “NORMAL” BOT NETWORKS PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 BLOCKED
  • 9. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017 CLANDESTINE BAIDU BOTS …. GEOIP CHINA PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 INDEXING WEBSITE CLANDESTINELY BLOCKED
  • 10. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017 PATTERN-BASED ANOMALY DETECTION OBSERVE SITUATIONS IN CYBERSPACE 4 - PATTERNS ANOMALIES - STRANGE BEHAVIOR - UNEXPECTED SITUATIONS - UNEXPLAINABLE OBSERVATIONS PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
  • 11. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 CLANDESTINE BAIDU BOTS …. GEOIP BRAZIL A CLOSER LOOK SHOWS > 200 BOTS DISGUISED AS NORMAL USERS BLOCKED
  • 12. TIM BASS 8 MARCH 2017 NORMAL “LARGE” BOTNET - INDEXING WEBSITE AS AFREF BOTS TIM BASS 9 MARCH 2017 LARGE “IDENTIFIED” SEARCH BOT NETWORK - GEOIP US PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 PERMISSION GRANTED
  • 13. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 CLANDESTINE BOT NETWORK - GEOIP KOREA … INDEXING WEBSITE DISGUISED AS NORMAL WEB USERS (NOT BOTS) BLOCKED
  • 14. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 CLANDESTINE “BANKRUPT IP ADDRESS BLOCK” BOTNET - GEOIP US … ADDRESS SPACE ASSIGNED TO BANKRUPT GRAPHICS CHIP COMPANY NOW RUNNING UNIDENTIFIED BOT NETWORK FROM ASSIGNED IP ADDRESS SPACE CI - TRIDENT MICROSYSTEMS SID-18863 BLOCKED
  • 15. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 CLANDESTINE BOT NETWORK - GEOIP INDIA … SUSPICIOUS ACTIVITY FROM IP ADDRESS CLUSTER IN INDIA ADDED TO WATCH LIST
  • 16. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 YANDEX BOT DISGUISED AT MOBILE DEVICE - GEOIP RUSSIA … YANDEX BOT IDENTIFYING ITSELF AS AN APPLE IOS DEVICE IN USER AGENT (UA) STRING IGNORED
  • 17. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017 PATTERN-BASED VISUAL ANOMALY DETECTION SHOULD APPLIED TO MOST (IF NOT ALL) NETWORK OBJECTS - WEBSITES & SERVERS - MOBILE PHONES - SMART DEVICES - IOTS - NETWORK INFRASTRUCTURE PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2
  • 18. TIM BASS 8 MARCH 2017TIM BASS 9 MARCH 2017 REFERENCES TIM BASS, INTRUSION DETECTION SYSTEMS AND MULTISENSOR DATA FUSION, COMMUNICATIONS OF THE ACM 43(4): 99-105, APRIL 2000, DOI 10.1145/332051.332079 TIM BASS, CYBERSPACE SITUATIONAL AWARENESS DEMANDS MIMIC TRADITIONAL COMMAND REQUIREMENTS, SIGNAL, OFFICIAL PUBLICATION OF AFCEA, FEBRUARY 2000, DOI 10.13140/RG.2.2.27068.85127 TIM BASS, CYBERSPACE SITUATION GRAPHS - A BRIEF OVERVIEW, PRESENTATION, AFFILIATION: WWW.THECEPBLOG.COM, SEPTEMBER 2016, DOI 10.13140/RG. 2.2.16014.56643/9 TIM BASS, A JOURNEY INTO CYBERSPACE, PRESENTATION, AFFILIATION: WWW.THECEPBLOG.COM, MARCH 4, 2017, DOI 10.13140/RG 2.2.26109.77284/1 PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 MY SINCERE APOLOGIES FOR THE SELF-REFERENCES
  • 19. TIM BASS 8 MARCH 2017
  • 20. TIM BASS 8 MARCH 2017 © TIM BASS, MARCH 2017 ALL RIGHTS RESERVED TIM@UNIX.COM PRESENTATION DOI 10.13140/RG.2.2.31306.77766/2 9 MARCH 2017