作者: Giulia De Santis , Abdelkader Lahmadi , Jerome Francois , Olivier Festor
DOI: 10.1109/NTMS.2018.8328698
关键词:
摘要: Internet-wide scanners are heavily used for malicious activities. This work models, from the scanned system point of view, spatial and temporal movements Network Scanning Activities (NSAs), related to difference successive IP addresses timestamps, respectively. Based on real logs incoming packets collected a darknet, Hidden Markov Models (HMMs) assess what scanning tool is operating. The proposed methodology, using only one aforementioned features tool, able fingerprint network scanner originated perceived darknet traffic.