A System for Characterising Internet Background Radiation

نویسنده

  • David Yates
چکیده

This literature review introduces the reader to Internet Background Radiation (IBR), both its components and common recording practices. In doing so, it will set up a theoretical basis for the construction of the IBR characterisation system to follow. The literature review is split into three main parts. Section 2 provides background information on IBR and its components: worms, scanning activities, backscatter from reflected distributed denial-of-service (DDoS) attacks, and misconfigurations. These are the sources of the data being characterised. Section 3 discusses the Border Gateway Protocol (BGP), the protocol used on the internet for routing packets between Autonomous Systems (ASs). This is of interest as the construction of live BGP tables for the collected data may provide a way of discovering spoofed IP addresses. Section 4 provides information on IBR collection tools and analysis methods. The collection tools discussed are darknets (also called network telescopes, sinkholes, blackhole monitors or background radiation monitors (Bailey et al., 2006)) and greynets (Harrop & Armitage, 2005). In this literature review, darknets and greynets will both referred to as network telescopes, with the terms “darknet” or “greynet” being used when more specificity is required. The analysis tools discussed are packet-level analysis, network flows and and honeynets. This section also delves into previous work in characterising network activities with statistical tools. This will form a basis for the system implemented in this study. In this literature review, the CIDR notations /8, /16 and /24 will be used to refer to the traditional pre-CIDR Class A, Class B and Class C subnets (Fuller et al., 1993) respectively, in order to maintain consistency with the referencing of differently sized IPv4 subnets (such as /19s). The number following the “/” denotes the number of fixed bits (out of 32 total bits) in each of the addresses within the subnet.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward a Model for Source Addresses of Internet Background Radiation

Internet background radiation, the fundamentally unproductive traffic that arises from misconfigurations and malicious activities, is pervasive and has complex characteristics. Understanding the network locations of hosts that generate background radiation can be helpful in the development of new techniques aimed at reducing this unwanted traffic. This paper presents an initial investigation of...

متن کامل

Characterising and modelling the internet topology The rich-club phenomenon and the PFP model

It is vital to obtain a good description of the Internet topology because structure fundamentally affects function. This paper reviews two recent achievements on characterising and modelling the Internet topology at the autonomous systems level, including a newly discovered structure, called the rich-club phenomenon, and one of the most successful Internet topology generators to date, the posit...

متن کامل

Prediction of University Students\' Internet Addiction Based on Brain-Behavioral Systems

Background and Aim: Internet addiction means excessive and unnecessary use of the Internet. The aim of this study was to investigate the role of brain-behavioral systems in Internet addiction among university students. Materials and Methods: This was a descriptive and correlational research. The statistical population was all the students of Islamic Azad University, Karaj Branch in the academi...

متن کامل

Designing an Expert System for Internet Connection Problems Troubleshooting for wired network users

Man, is living in an era that the knowledge is estimated to be doubled in a relatively short time. The fast rate of technology's growth in the "Century of information", is caused by fast growth of communication technologies like the internet which has become one of the best tools for a quick, cheap, effective and vastly supported communication. For an efficient and effective usage of tools and ...

متن کامل

AN INTEGRATED FIS-QFD MODEL FOR EVALUATION OF INTERNET SERVICE PROVIDER

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014