2004
DOI: 10.1007/978-3-540-30143-1_8
|View full text |Cite
|
Sign up to set email alerts
|

On the Design and Use of Internet Sinks for Network Abuse Monitoring

Abstract: Abstract.Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with typical network intrusion detection and firewall systems. In this paper, we address the problem of designing and deploying a system for monitoring large unused address spaces such as class A telescopes with 16M IP addresses. We describe the architecture and implementation of the Internet Sink (iSink) system which measures packet traffi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
79
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 125 publications
(79 citation statements)
references
References 16 publications
0
79
0
Order By: Relevance
“…We use IP-aliasing to emulate source and destination IP addresses from 32 different class C subnets (16 subnets for client IP addresses and 16 subnets for server IP addresses). We used the iSink system's active response capability to send response packets to malicious MACE traffic [19]. This enables bidirectional communication required to accurately recreate certain exploits.…”
Section: A Setup and Configurationmentioning
confidence: 99%
“…We use IP-aliasing to emulate source and destination IP addresses from 32 different class C subnets (16 subnets for client IP addresses and 16 subnets for server IP addresses). We used the iSink system's active response capability to send response packets to malicious MACE traffic [19]. This enables bidirectional communication required to accurately recreate certain exploits.…”
Section: A Setup and Configurationmentioning
confidence: 99%
“…There have been many real-world developments and deployments of ITM systems. Examples include DOMINO (Distributed Overlay for Monitoring InterNet Outbreaks) [8], SANs ISC (Internet Storm Center) [6], Internet Sink [9], Network Telescope [10], CAIDA [11], MyNetWatchMan [12], and Honeynet [13], [14].…”
Section: Introductionmentioning
confidence: 99%
“…If the locations of monitors are identified, the attacker can deliberately avoid these monitors and directly attack the uncovered IP address space. It is a known fact that the number of sub-networks covered by monitors is much smaller than the total number of subnetworks in the Internet [6], [9], [10]. In other words, the IP address space covered by monitors represents a very small portion of the entire IP address space [6].…”
Section: Introductionmentioning
confidence: 99%
“…On one hand, the source-based filtering mechanisms are effective at reducing large repeated traffic rates into small number of manageable events. iSinks [24] uses a filtering strategy consisting of analyzing the connections established with the first N destination IPs per every source IP. In subsequent work [25], the authors have improved the filtering mechanisms taking into account, for example, the source payload, source port, source destination and source connection.…”
Section: Traffic Classification and Filtering Mechanismsmentioning
confidence: 99%
“…sensors, redirectors, etc. ), such as network telescopes [19], darknet [20], blackholes [21], IMS [27], and iSinks [24], or software artifice assigned with a portion of routed IP address space. Instead of deploying a large number of HIHs across multiple networks, they can be centrally deployed in a consolidated location.…”
Section: Hih Mih Lihmentioning
confidence: 99%