Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement - IMC '05 2005
DOI: 10.1145/1330107.1330135
|View full text |Cite
|
Sign up to set email alerts
|

Data reduction for the scalable automated analysis of distributed darknet traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(23 citation statements)
references
References 0 publications
0
22
0
1
Order By: Relevance
“…Based on a preliminary analysis, we expect that IBR will also be a good source to determine patterns of in when reassignment occurs 18 , and pools of addresses used in reassignment 19 .…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on a preliminary analysis, we expect that IBR will also be a good source to determine patterns of in when reassignment occurs 18 , and pools of addresses used in reassignment 19 .…”
Section: Discussionmentioning
confidence: 99%
“…Compared to the RIPE Atlas 17 For an IP address A.B.C.D, we use the number A×2 24 +B×2 16 +C×2 8 +D. 18 A preliminary analysis of the number of reassignments in an AS per hour varies across ASes. Often we observe a diurnal pattern (consistent with Internet usage being higher during waking hours), but, in a few cases, we observe spikes (possibly due to outages or provider induced events).…”
Section: Discussionmentioning
confidence: 99%
“…However, the work was only concentrated towards detecting stealthy portscans. Bailey et al [17] focused on scalable monitoring of darknets and reducing the amount of data for the forensic honeypots by using source-distribution based methods. Maier et al [18] suggested storing the network traffic up to a cutoff limit of bytes per connection.…”
Section: Related Work In Network Forensicsmentioning
confidence: 99%
“…In subsequent work [25], the authors have improved the filtering mechanisms taking into account, for example, the source payload, source port, source destination and source connection. Furthermore, Bailey et al [26] improved the source-based filtering mechanism through expanding the individual darknets into multiple darknets for observing the global behavior and the source distribution. On the other hand, packet inspection based filtering mechanism is another popular approach to reduce repeated data.…”
Section: Traffic Classification and Filtering Mechanismsmentioning
confidence: 99%
“…Bailey et al [26] improved the source-destination based filtering mechanism through expanding the individual darknets into multiple darknets for observing the global behavior and the source distribution.…”
Section: B Attack Preventionmentioning
confidence: 99%