Proceedings of the 2015 Internet Measurement Conference 2015
DOI: 10.1145/2815675.2815702
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Internet Background Radiation for Opportunistic Network Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

4
21
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(25 citation statements)
references
References 43 publications
4
21
0
Order By: Relevance
“…A fifth of the remaining 14% that do not generate IBR traffic are blocks that belong to the US government. The temporal analysis in [4] also shows that most networks frequently generate IBR traffic, in particular when considering coarse grain aggregations. Indeed, the median time between observations is shorter than 1 minute for over 90% of countries, and is shorter than 10 minutes for about 75% of the ASs.…”
Section: Datasetmentioning
confidence: 95%
See 1 more Smart Citation
“…A fifth of the remaining 14% that do not generate IBR traffic are blocks that belong to the US government. The temporal analysis in [4] also shows that most networks frequently generate IBR traffic, in particular when considering coarse grain aggregations. Indeed, the median time between observations is shorter than 1 minute for over 90% of countries, and is shorter than 10 minutes for about 75% of the ASs.…”
Section: Datasetmentioning
confidence: 95%
“…Indeed, the amount of IBR packets that reaches network telescopes is considerable, incessant, and originates from a variety of applications [31]. In [4], Benson et al performed a spatial analysis and determined that IBR provided an Internet-wide view. All countries, except for 3 with a population of less than 4000 inhabitants, and more than half of all ASs are observed in their dataset.…”
Section: Datasetmentioning
confidence: 99%
“…Dainotti et al detect Internet outages at the country level by identifying times of reduced traffic from addresses in certain countries toward unused IPv4 address space [22]. Traffic to unused portions of the IPv4 address space is often sent by misconfigured devices or malicious hosts [12] who may spoof their source addresses, making it difficult to infer if addresses sending traffic to the darknet are actively in use by user devices.…”
Section: Related Workmentioning
confidence: 99%
“…While the existence of widespread port scanning activity is widely known [7,8,10,18], comparably little research has been devoted to study and understand scanners and their strategies in detail. The lack of high quality data stems mostly from the absence of data sources that can illuminate scanning activity at scale.…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, since darknets do not emit any traffic, their only attraction of traffic is their routed address space. Thus, darknets will only be able to detect scanning activity that targets either the entire IPv4 space, a sufficiently large random subset, or the unlikely case of scans targeting the darknet itself [10,18]. They cannot provide insights into scans targeting specific regions of the address space, e.g., prefixes or networks with known clients, servers or other types of "live" hosts.…”
Section: Introductionmentioning
confidence: 99%