作者: Morteza Safaei Pour , Elias Bou-Harb
关键词: Darknet 、 Relation (database) 、 Context (language use) 、 Computer science 、 Computer security 、 Botnet 、 The Internet 、 IPv6 、 Intrusion detection system
摘要: Cyber space continues to be threatened by various debilitating attacks. In this context, executing passive measurements analyzing Internet-scale, one- way darknet traffic has proven an effective approach shed the light on Internet-wide maliciousness. While typically such are solely conducted from empirical perspective already deployed IP spaces using off-the-shelf Intrusion Detection Systems (IDS), their multidimensional theoretical foundations, relations and implications continue obscured. paper, we take a first step towards comprehending relation between attackers' behaviors, width of vantage points, probability detection minimum time. We perform stochastic modeling, derivation, validation, inter-correlation analysis parameters provide numerous insightful inferences, as most IDS suitable space, given activities in presence time/probability constraints. One outcomes suggests that widely-deployed Bro is ideal for inferring slow, stealthy probing leveraging measurements. Further, results do not recommend deploying Snort when available relatively small, which typical scenario darknets operated employed organizational sub-networks. concur generated derivations mathematical put forward first-of-akind formal accurate characterization darknet-centric notions, possess significant Internet This especially factual with advent evolving paradigms IPv6 deployments proliferation highly-distributed, orchestrated, large-scale botnets.