Practical darknet measurement

被引:35
作者
Bailey, Michael [1 ]
Cooke, Evan [1 ]
Jahanian, Farnam [1 ]
Myrick, Andrew [1 ]
Sinha, Sushant [1 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
来源
2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4 | 2006年
关键词
D O I
10.1109/CISS.2006.286376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet today is beset with constant attacks targeting users and infrastructure. One popular method of detecting these attacks and the infected hosts behind them is to monitor unused network addresses. Because many Internet threats propagate randomly, infection attempts can be captured by monitoring the unused spaces between live addresses. Sensors that monitor these unused address spaces are called darknets, network telescopes, or blackholes. They capture important information about a diverse range of threats such as Internet worms, denial of services attacks, and botnets. In this paper, we describe and analyze the important measurement issues associated with deploying darknets, evaluating the placement and service configuration of dark-nets, and analyzing the data collected by darknets. To support the discussion, we leverage 4 years of experience operating the Internet Motion Sensor (IMS), a network of distributed darknet sensors monitoring 60 distinct address blocks in 19 organizations over 3 continents.
引用
收藏
页码:1496 / 1501
页数:6
相关论文
共 21 条
[1]   The Blaster worm: Then and now [J].
Bailey, M ;
Cooke, E ;
Jahanian, F ;
Watson, D ;
Nazario, J .
IEEE SECURITY & PRIVACY, 2005, 3 (04) :26-31
[2]  
BAILEY M, 2005, P USENIX ACM INT MEA
[3]  
Bailey Michael, 2005, NDSS
[4]  
*CERT COORD CTR, 2001, CA200126 CERT COORD
[5]  
COOKE E, 2005, P STEPS RED UNW TRAF
[6]  
COOKE E, 2006, P 3 USENIX S NETW SY
[7]  
COOKE E, 2004, P 2004 ACM WORKSH RA
[8]  
GREENE BR, 2003, SINKHOLES SWISS ARMY
[9]   Inside the slammer worm [J].
Moore, David ;
Paxson, Vern ;
Savage, Stefan ;
Shannon, Colleen ;
Staniford, Stuart ;
Weaver, Nicholas .
IEEE Security and Privacy, 2003, 1 (04) :33-39
[10]  
Moore D, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, P9