Talks and Poster Presentations (with Proceedings-Entry):
T. Zseby, N. Brownlee, A. King, K. Claffy:
"Nightlights: Entropy-based Metrics for Classifying Darkspace Traffic Patterns";
Poster: Passive and Active Measurements Conference 2014,
Los Angeles, CA, USA;
- 03-11-2014; in: "Passive and Active Measurement",
Lecture Notes in Computer Science Volume 8362,
An IP darkspace is a globally routed IP address space with no active hosts. All traffic destined to darkspace addresses is unsolicited and often originates from network scanning or attacks. A sudden increases of different types of darkspace traffic can serve as indicator of new vulnerabilities, misconfigurations or large scale attacks. In our analysis we take advantage of the fact that darkspace traffic typically originates from processes that use randomly chosen addresses or ports (e.g. scanning) or target a specific address or port (e.g. DDoS, worm spreading). These behaviors induce a concentration or dispersion in feature distributions of the resulting traffic aggregate and can be distinguished using entropy as a compact representation. Its lightweight, unambiguous, and privacy-compatible character makes entropy a suitable metric that can facilitate early warning capabilities, operational information exchange among network operators, and comparison of analysis results among a network of distributed IP darkspaces.
"Official" electronic version of the publication (accessed through its Digital Object Identifier - DOI)
Created from the Publication Database of the Vienna University of Technology.