On the analysis of backscatter traffic

作者: Eray Balkanli , A. Nur Zincir-Heywood

DOI: 10.1109/LCNW.2014.6927719

关键词: Computer scienceBackscatterDarknetNetwork securityComputer networkIntrusion detection systemDenial-of-service attack

摘要: This work offers in-depth analysis of three different darknet datasets captured in 2004, 2006 and 2008 to provide insights into the nature backscatter traffic. Moreover, we analyzed these using two well-known open source intrusion detection systems (IDSs), namely Snort Bro. Our shows that there are interesting trends help us understand traffic over a 4-year period time. However, it also is challenging identify attacks generated this

参考文章(17)
Nevil Brownlee, One-way traffic monitoring with iatmon passive and active network measurement. pp. 179- 188 ,(2012) , 10.1007/978-3-642-28537-0_18
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Vinod Yegneswaran, Paul Barford, Dave Plonka, On the Design and Use of Internet Sinks for Network Abuse Monitoring recent advances in intrusion detection. pp. 146- 165 ,(2004) , 10.1007/978-3-540-30143-1_8
Riyad Alshammari, A. Nur Zincir-Heywood, Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? Computer Networks. ,vol. 55, pp. 1326- 1350 ,(2011) , 10.1016/J.COMNET.2010.12.002
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, Geoff Huston, None, Internet background radiation revisited internet measurement conference. pp. 62- 74 ,(2010) , 10.1145/1879141.1879149
Qian Wang, Zesheng Chen, Chao Chen, Darknet-Based Inference of Internet Worm Temporal Characteristics IEEE Transactions on Information Forensics and Security. ,vol. 6, pp. 1382- 1393 ,(2011) , 10.1109/TIFS.2011.2161288
Masashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao, nicter: a large-scale network incident analysis system: case studies for understanding threat landscape european conference on computer systems. pp. 37- 45 ,(2011) , 10.1145/1978672.1978677
Claude Fachkha, Elias Bou-Harb, Amine Boukhtouta, Son Dinh, Farkhund Iqbal, Mourad Debbabi, Investigating the dark cyberspace: Profiling, threat-based analysis and correlation conference on risks and security of internet and systems. pp. 1- 8 ,(2012) , 10.1109/CRISIS.2012.6378947
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang, Accurate, scalable in-network identification of p2p traffic using application signatures Proceedings of the 13th conference on World Wide Web - WWW '04. pp. 512- 521 ,(2004) , 10.1145/988672.988742
Zouheir Trabelsi, Latifa Alketbi, None, Using network packet generators and snort rules for teaching denial of service attacks Proceedings of the 18th ACM conference on Innovation and technology in computer science education - ITiCSE '13. pp. 285- 290 ,(2013) , 10.1145/2462476.2465580