The HoneyTank: A scalable approach to collect malicious internet traffic

被引:4
|
作者
Vanderavero, Nicolas [1 ]
Brouckaert, Xavier [1 ]
Bonaventure, Olivier [1 ]
Le Charlier, Baudouin [1 ,2 ]
机构
[1] Department of Computing Science and Engineering, Universiteá Catholique de Louvain (UCL), Belgium
[2] Computing Science Department, Catholic University of Louvain-la-Neuve
关键词
Computational methods - Computer worms - Internet protocols - Intrusion detection;
D O I
10.1504/IJCIS.2008.016100
中图分类号
学科分类号
摘要
In this paper, we propose an efficient method for collecting large amounts of malicious internet traffic. The key advantage of our method is that it does not need to maintain any state to emulate TCP services running on a large number of emulated end-systems. We implemented a prototype on the ASAX intrusion detection system and we provide several examples of the malicious activities that were collected on a campus network attached to the internet. We explain how we implemented various protocols in a stateless way. We also discuss how our method can be improved to make an accurate but still stateless emulation of stateful protocols. Copyright © 2008 Inderscience Enterprises Ltd.
引用
收藏
页码:185 / 205
相关论文
共 50 条
  • [41] An Easily Scalable Docker-Based Privacy-Preserving Malicious Traffic Detection Architecture for IoT Environments
    Niu, Tong
    Liu, Yaqiu
    Li, Qingfeng
    Bao, Qichi
    IEEE ACCESS, 2024, 12 : 191010 - 191019
  • [42] Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks
    Abubaker, Zain
    Javaid, Nadeem
    Almogren, Ahmad
    Akbar, Mariam
    Zuair, Mansour
    Ben-Othman, Jalel
    COMPUTER NETWORKS, 2022, 204
  • [43] A Scalable Approach to Tomography-based Internet Measurement System
    Tagami, Atsushi
    Hasegawa, Teruyuki
    Ano, Shigehiro
    Hasegawa, Toru
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 489 - 494
  • [44] Scalable Explicit Multicasting on Internet: A Topological-Aware Approach
    Jia, Wen-Kang
    Liu, Gen-Hen
    Chen, Yaw-Chung
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 745 - 752
  • [45] LKD-STNN: A Lightweight Malicious Traffic Detection Method for Internet of Things Based on Knowledge Distillation
    Zhu, Shizhou
    Xu, Xiaolong
    Zhao, Juan
    Xiao, Fu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 6438 - 6453
  • [46] Network Traffic Images: A Deep Learning Approach to the Challenge of Internet Traffic Classification
    Saleh, Ibraheem
    Ji, Hao
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 329 - 334
  • [47] A tensor train approach for internet traffic data completion
    Zhang, Zhiyuan
    Ling, Chen
    He, Hongjin
    Qi, Liqun
    ANNALS OF OPERATIONS RESEARCH, 2024, 339 (03) : 1461 - 1479
  • [48] Internet Traffic Classification Using Multifractal Analysis Approach
    Zavala, Yulios
    de Godoy Stenico, Jeferson Wilian
    Ling, Lee Luan
    15TH COMMUNICATIONS AND NETWORKING SYMPOSIUM 2012 (CNS 2012), 2012, 44 (03): : 39 - 43
  • [49] Characterization and classification of malicious Web traffic
    Goseva-Popstojanova, Katerina
    Anastasovski, Goce
    Dimitrijevikj, Ana
    Pantev, Risto
    Miller, Brandon
    COMPUTERS & SECURITY, 2014, 42 : 92 - 115
  • [50] Feature analysis of encrypted malicious traffic
    Shekhawat, Anish Singh
    Di Troia, Fabio
    Stamp, Mark
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 125 : 130 - 141