2012
DOI: 10.1007/978-3-642-34500-5_73
|View full text |Cite
|
Sign up to set email alerts
|

Behavior Analysis of Long-term Cyber Attacks in the Darknet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 14 publications
0
9
0
1
Order By: Relevance
“…Darknet data have been utilized to study DDoS attacks [9,10,15,42], DoS attacks and BGP blackholing [25], IPv6 routing instabilities [11], and long-term cyber attacks [4]. Application-level responses to IBR observed in Darknet have also been used to characterize Internet-wide scanning activities [33].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Darknet data have been utilized to study DDoS attacks [9,10,15,42], DoS attacks and BGP blackholing [25], IPv6 routing instabilities [11], and long-term cyber attacks [4]. Application-level responses to IBR observed in Darknet have also been used to characterize Internet-wide scanning activities [33].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, Darknets have been frequently used by the networking and security communities to shed light into dubious malware propagation and interminable network scanning activities [14,20,33,36,43]. They have also been used to detect cyber-threats, e.g., botnets [2], DDoS and other types of attacks [4,15,32], and to detect novel attack patterns [3].…”
Section: Introductionmentioning
confidence: 99%
“…In prior research [1], [2], [14], [7], [15], [10], [9], [16], [17], [5], [18], [19], darknet data is used to detect botnet hosts, typically by clustering and classifying the src IPs with features such as the dst port and packet size.…”
Section: A Mining Darknet Trafficmentioning
confidence: 99%
“…Previous studies have shown that packets sent to darknet IP addresses are usually the result of network probing/scanning, worm propagation, and a DDoS attacks [5], [6]. Therefore, darknet data can be used by an ISP's cyber emergency response team (CERT) to infer threat intelligence related to ongoing malicious activities or new emerging attacks [7] (see Figure 1).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation