作者: Falguni Gadhia , Jangwon Choi , Buseung Cho , Jungsuk Song
DOI: 10.1109/ICACT.2015.7224757
关键词:
摘要: Today, Internet is incessantly attacked by wide variety of network-based threats. One the ways to monitor or identify such prevailing threats incoming traffic unused network addresses popularly known as darknet and often also referred with various other names like telescope black hole. As, all arriving at mainly result from malicious probing mis configuration in network. It expected that have similar behaviour across different sensors, however, studies found it different. Various reason cited behind misconfiguration, certain kind attack, difference filtering parameter system itself. However, concrete beside this still missing. In regard, get further understanding, study, we performed deeper comparative analysis between two sensors (KISTI Darknet network) are differently located but configuration. Comparative considering total packet, number source host, targeting destination port protocol revealed there exists characteristics sensors. Moreover, for TCP UDP comparison, showed more particular block (difference sensors), contrast it, scanning (similarity sensor).