New and Updated R Packages for Security Data Science

August 12, 2014

(This article was first published on Data Driven Security, and kindly contributed to R-bloggers)

We’ve got some new and updated R packages that are (hopefully) helpful to security folks who are endeavouring to use R in their quest to find and prevent malicious activity. All packages now incorporate a testthat workflow and are fully roxygen-ized and present some best practices in R package development (a post on that very topic is pending).

We’ll start with the old and work our way to the new…

Changes to the resolv package

I’ve updated resolv for the newest Rcpp and for a better build on linux and OS X systems (still no Windows compatibiity). The package also includes vectorized versions of the core resolv_ functions. Here’s an example:


# Read in the Alexa top 1 million list
alexa <- fread("data/top-1m.csv") #

## Classes ‘data.table’ and 'data.frame':  1000000 obs. of  2 variables:
##  $ V1: int  1 2 3 4 5 6 7 8 9 10 ...
##  $ V2: chr  "" "" "" "" ...
##  - attr(*, ".internal.selfref")=

# How many of the Alexa top *1,000* have spf records?
alexa.txt <- TXT(alexa[1:1000]$V2) # this takes a few seconds as it's not performed in parallel

# iterate over the results, testing for presence spf records in each 
table(sapply(alexa.txt, function(x) { grepl("spf", unlist(x[1]));  }))

##   487   513

Doing all 1M would take a short while, but it’d be an interesting experiment to run (then, analyze the records to see which services these sites trust with their mail sending).

Updates to the netintel package

The netintel package is back from the dead! (thanks to a helpful push by David Severski).

All core functions have been re-written and the package now uses httr and data.table in some places for better realiability and speed. Functions that take AS numbers as parameters automagically strip or add the AS prefix as needed. To remind or introduce you to some of the workings:

# continuing from the previous code


# get the IP addresses of the top 10 alexa domains
alexa.a <- A(alexa[1:10]$V2)

# retrieve the AS information
origin <- BulkOrigin(as.character(unlist(alexa.a)))

##       AS              IP       BGP.Prefix CC Registry  Allocated                                                              AS.Name
## 1  15169 US     arin 2007-03-13                                              GOOGLE - Google Inc.,US
## 2  15169 US     arin 2007-03-13                                              GOOGLE - Google Inc.,US
## 3  15169 US     arin 2007-03-13                                              GOOGLE - Google Inc.,US
## 4  15169 US     arin 2007-03-13                                              GOOGLE - Google Inc.,US
## 5  15169 US     arin 2007-03-13                                              GOOGLE - Google Inc.,US
## 6  15169 US     arin 2007-03-13                                              GOOGLE - Google Inc.,US
## 7  32934 US     arin 2011-02-28                                         FACEBOOK - Facebook, Inc.,US
## 8  15169 US     arin 2003-08-18                                              GOOGLE - Google Inc.,US
## 9  15169 US     arin 2003-08-18                                              GOOGLE - Google Inc.,US
## 10 15169 US     arin 2003-08-18                                              GOOGLE - Google Inc.,US
## 11 15169 US     arin 2003-08-18                                              GOOGLE - Google Inc.,US
## 12 36646 US     arin 2007-12-07                                                 YAHOO-NE1 - Yahoo,US
## 13 26101 US     arin 2007-12-07                                                  YAHOO-3 - Yahoo!,US
## 14 36647 US     arin                                                            YAHOO-GQ1 - Yahoo,US
## 15  4808 CN    apnic 2007-01-29 CHINA169-BJ CNCGROUP IP network China169 Beijing Province Network,CN
## 16 23724 CN    apnic 2002-10-30      CHINANET-IDC-BJ-AP IDC, China Telecommunications Corporation,CN
## 17 23724 CN    apnic 2002-10-30      CHINANET-IDC-BJ-AP IDC, China Telecommunications Corporation,CN
## 18 14907 US     arin 2007-07-23                             WIKIMEDIA - Wikimedia Foundation Inc.,US
## 19 13414 US     arin 2010-07-09                                    TWITTER-NETWORK - Twitter Inc.,US
## 20 13414 US     arin 2010-07-09                                    TWITTER-NETWORK - Twitter Inc.,US
## 21 13414 US     arin 2010-07-09                                    TWITTER-NETWORK - Twitter Inc.,US
## 22 13414 US     arin 2010-07-09                                    TWITTER-NETWORK - Twitter Inc.,US
## 23  4837 CN    apnic 2005-12-30                      CHINA169-BACKBONE CNCGROUP China169 Backbone,CN
## 24 17623 CN    apnic 2011-03-30                          CNCGROUP-SZ China Unicom Shenzen network,CN
## 25 16509 US     arin 2004-12-30                                      AMAZON-02 -, Inc.,US
## 26 16509 US     arin 2004-12-30                                      AMAZON-02 -, Inc.,US
## 27 16509 IE  ripencc 2011-05-23                                      AMAZON-02 -, Inc.,US
## 28 16509 US     arin 2010-08-27                                      AMAZON-02 -, Inc.,US
## 29 37963 CN    apnic 2011-02-21     CNNIC-ALIBABA-CN-NET-AP Hangzhou Alibaba Advertising Co.,Ltd.,CN

You could then look up each peer and see how “connected” the top 10 are.

Introducing iptools

The iptools package is a set of tools for a working with IPv4 addresses. The aim is to provide functionality not presently available with any existing R package and to do so with as much speed as possible. To that end, many of the operations are written in Rcpp and require installation of the Boost libraries. A current, lofty goal is to mimic most of the functionality of the Python iptools module and make IP addresses first class R objects.

While resolv provides many helpful DNS functions, it is dependent upon the ldns library, which may not ever work well under Windows+Rcpp. The iptools package provides minimally featured functions for IPv4 PTR/A record lookups in an effort to (hopefully) make it usable under Windows.

The package also uses the v1 GeoLite MaxMind library to perform basic geolocation of a given IPv4 address. You must manually install both the maxmind library (brew install geoip on OS X, sudo apt-get install libgeoip-dev on Ubuntu) and the GeoLiteCity.dat & GeoLiteASNum.dat files for the geolocation/ASN functions to work. If there’s interest in porting to the newer library/GeoLite2 format, I’ll consider updating the package.

The following functions are implemented:


  • gethostbyaddr – Returns all PTR records associated with an IPv4 address
  • gethostsbyaddr – Vectorized version of gethostbyaddr
  • gethostbyname – Returns all A records associated with a hostname
  • gethostsbyname – Vectorized version of gethostbyname

IP int/string conversion

  • ip2long – Character (dotted-decimal) IPv4 Address Conversion to long integer
  • long2ip – Intger IPv4 Address Conversion to Character


  • validateIP – Validate IPv4 addresses in dotted-decimal notation
  • validateCIDR – Validate IPv4 CIDRs in dotted-decimal slash notation

Geo/ASN Lookup

  • geoip – Perform (local) maxmind geolocation on IPv4 addresses (see ?geoip for details)
  • asnip – Perform (local) maxmind AS # & org lookup on IPv4 addresses (see ?asnip for details)


  • randomIPs – generate a vector of valid, random IPv4 addresses (very helpful for testing)

The following data sets are included:

  • ianaportsIANA Service Name and Transport Protocol Port Number Registry
  • ianaipv4sparIANA IPv4 Special-Purpose Address Registry
  • ianaipv4assignmentsIANA IPv4 Address Space Registry
  • ianarootzonetldsIANA Root Zone Database
  • ianaprotocolnumbersIANA Protocol Numbers

iptools Installation


NOTE: Under Ubuntu (it probably applies to other variants), this only works with the current version (1.55) of the boost library, which I installed via the launchpad boost-latest package:

sudo add-apt-repository ppa:boost-latest/ppa
# sudo apt-get install python-software-properties if "add-apt-repository" is not found
sudo apt-get update
sudo apt-get install boost1.55 # might need to use 1.54 on some systems

homebrew (OS X) users can do: brew install boost and it should #justwork.

The first person(s) to get this working under Windows/mingw + boost/Rcpp gets a free copy of our book

We’ll give you an opportunity to play with iptools before covering some examples.

You are also encouraged to drop a note in the comments here or on github with any issues, suggestions or contributions. We’ve not quite worked out how we’ll be handling public gitlab issues/comments yet, but it’s on the TODO list.

To leave a comment for the author, please follow the link and comment on their blog: Data Driven Security. offers daily e-mail updates about R news and tutorials on topics such as: Data science, Big Data, R jobs, visualization (ggplot2, Boxplots, maps, animation), programming (RStudio, Sweave, LaTeX, SQL, Eclipse, git, hadoop, Web Scraping) statistics (regression, PCA, time series, trading) and more...

If you got this far, why not subscribe for updates from the site? Choose your flavor: e-mail, twitter, RSS, or facebook...

Comments are closed.

Search R-bloggers


Never miss an update!
Subscribe to R-bloggers to receive
e-mails with the latest R posts.
(You will not see this message again.)

Click here to close (This popup will not appear again)