Detecting Black IP Using for Classification and Analysis Through Source IP of Daily Darknet Traffic

作者: Jinhak Park , Jangwon Choi , Jungsuk Song

DOI: 10.1007/978-3-319-70139-4_43

关键词:

摘要: Recently, the community is recognizing to an importance of network vulnerability. Also, through using this vulnerability, attackers can acquire information vulnerable users. Therefore, many researchers have been studying about a countermeasure vulnerabillty. In recent, darknet received attention research for detecting action attackers. The means are formed set unused IP addresses and no real systems connect darknet. paper, we proposed black IPs. So, it was choosen classification analysis source daily traffic. method prepared 8,192 destination in space collected traffic during 1 months. It total 277,002,257 2016, August. An applied results process were seen effectiveness pre-detection attacks.

参考文章(11)
David Moore, Colleen Shannon, Geoffrey M Voelker, Stefan Savage, Network Telescopes: Technical Report ,(2004)
HeeSeok Kim, Sang-Soo Choi, Jungsuk Song, A Methodology for Multipurpose DNS Sinkhole Analyzing Double Bounce Emails international conference on neural information processing. pp. 609- 616 ,(2013) , 10.1007/978-3-642-42054-2_76
Jungsuk Song, Jang-Won Choi, Sang-Soo Choi, A malware collection and analysis framework based on darknet traffic international conference on neural information processing. pp. 624- 631 ,(2012) , 10.1007/978-3-642-34481-7_76
Vinod Yegneswaran, Paul Barford, Dave Plonka, On the Design and Use of Internet Sinks for Network Abuse Monitoring recent advances in intrusion detection. pp. 146- 165 ,(2004) , 10.1007/978-3-540-30143-1_8
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, David Watson, None, The Internet Motion Sensor - A Distributed Blackhole Monitoring System. network and distributed system security symposium. ,(2005)
Haeng-Gon Lee, Sang-Soo Choi, Youn-Su Lee, Hark-Soo Park, Enhanced Sinkhole System by Improving Post-processing Mechanism international conference on future generation information technology. pp. 469- 480 ,(2010) , 10.1007/978-3-642-17569-5_46
Sang-soo Choi, Jungsuk Song, Seokhun Kim, Sookyun Kim, A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic Security and Communication Networks. ,vol. 7, pp. 1612- 1621 ,(2014) , 10.1002/SEC.796
L. Spitzner, The Honeynet Project: trapping the hackers ieee symposium on security and privacy. ,vol. 1, pp. 15- 23 ,(2003) , 10.1109/MSECP.2003.1193207
Fahim H. Abbasi, R. J. Harris, Experiences with a Generation III virtual Honeynet australasian telecommunication networks and applications conference. pp. 1- 6 ,(2009) , 10.1109/ATNAC.2009.5464785
Sangjun Ko, Kyuil Kim, Younsu Lee, Jungsuk Song, A Classification Method of Darknet Traffic for Advanced Security Monitoring and Response Neural Information Processing. pp. 357- 364 ,(2014) , 10.1007/978-3-319-12643-2_44