<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>One of the interesting questions we get asked at TheatSTOP concerns how long an IP address remains bad once it has been identified as such. The answer is not completely straightforward and varies depending on which threat list it has been put on. Moreover many lists do not have specific "first seen" or "last seen" data on each IP address, rather they simply list the currently active list (where active typically means that they have been identified as bad within the last week or so). Possibly worse for questioner, some of the threat sources we use are distributed under terms that prohibit us from answering the question.</p> <!--more--> <p>However the <a href="http://dshield.org">DShield</a> organization makes their <a href="http://www.dshield.org/ipsascii.html">top N lists public</a> and they contain the first seen and last seen dates so it is possible to analyze that data to figure out how long an IP address remains bad. So we have done some analysis using the maximum DShield list size (Top 10,000). Here is the breakdown from yesterday</p> <p><a href="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/20100823-xls-2.png"><img class="alignnone size-medium wp-image-144" title="Dshield Top 10k Persistence 2010-08-23" src="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/20100823-xls.png" alt="Dshield Top 10k Persistence 2010-08-23" width="300" height="172"></a></p> <p>As you can see about half the IP addresses remain bad for over a month. However over a quarter are only seen for a week or less and well over 10% (actually about a sixth) disappear in one day or less. I have run this analysis quite often over the last month or so and the numbers, while they vary a little, do remain quite consistent.</p> <p>What this means is that when people say that <a href="http://www.scmagazineus.com/part-two-blacklists-clustering-and-the-matrix/article/177195/">blacklists are dead</a> or that the internet needs to move to some kind of <a href="http://www.theregister.co.uk/2010/08/20/sysadmin_blog_presumed_guilty/">"assume everything is guilty" model</a>, they are partly right. Manual blacklist maintenance is clearly ineffective because the chances are high that by the time you add an ip address to the black list it has been fixed (if you touch your black lists once a month you have a 50% chance of this, once a week almost 30% and once a day about 15%). And those repaired ip addresses can a) lull you into a false sense of security and b) cause major user satisfaction issues when there is interaction with one of these ip addresses - the false positive problem.</p> <p>However the fact that the blacklist needs to be kept up to date doesn't invalidate the utility of the concept. It just means you need something like ThreatSTOP to automatically update the list on a timely basis so that you get coverage against the short-lived threats while they are active.</p> <p>Interestingly we also have data from last year (17 September 2009) which our CEO used in a presentation at a security conference shows a slight difference in breakdown - just 40% of threats are over 30 days and almost a quarter are one day or less. My hypothesis (I need to do some data checking) is that what has happened is that some computers become periodically reinfected and thus they gradually move from the short term list to the long term one.</p> <p><a href="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/20090917-xls.png"><img class="alignnone size-medium wp-image-145" title="Dshield Threat Persistence 2009-09-17" src="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/20090917-xls-1.png" alt="Dshield Threat Persistence 2009-09-17" width="300" height="170"></a></p> <p>If I am correct then this is yet further evidence to show that frequent updates to a blacklist are the best way to go because the frequent update will catch these ip addresses when they become compromised and then clean them out once they have been cleaned up.</p></span>