Detecting Black IP Using for Classification and Analysis Through Source IP of Daily Darknet Traffic

被引:0
|
作者
Park, Jinhak [1 ]
Choi, Jangwon [1 ]
Song, Jungsuk [1 ,2 ]
机构
[1] Korea Inst Sci & Technol Informat, Daejeon, South Korea
[2] Korea Univ Sci & Technol, Daejeon, South Korea
关键词
Darknet; Network vulnerabillty; Detection of black IP;
D O I
10.1007/978-3-319-70139-4_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, the community is recognizing to an importance of network vulnerability. Also, through the using this vulnerability, attackers can acquire the information of vulnerable users. Therefore, many researchers have been studying about a countermeasure of network vulnerabillty. In recent, the darknet is a received attention to research for detecting action of attackers. The means of darknet are formed a set of unused IP addresses and no real systems of connect to the darknet. In this paper, we proposed an using darknet for the detecting black IPs. So, it was choosen to classification and analysis through source IP of daily darknet traffic. The proposed method prepared 8,192 destination IP addresses in darknet space and collected the darknet traffic during 1 months. It collected total 277,002,257 in 2016, August. An applied results of the proposed process were seen for an effectiveness of pre-detection for real attacks.
引用
收藏
页码:427 / 433
页数:7
相关论文
共 50 条
  • [31] Detecting Unprotected SIP-based Voice Over IP Traffic
    Carvajal, Leonardo
    Chen, Lei
    Varol, Cihan
    Rawat, Dandy
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 44 - 48
  • [32] A statistical approach to IP-level classification of network traffic
    Crotti, Manuel
    Gringoli, Francesco
    Pelosato, Paolo
    Salgarelli, Luca
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 170 - 176
  • [33] Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification
    Karunanayake, Ishan
    Ahmed, Nadeem
    Malaney, Robert
    Islam, Rafiqul
    Jha, Sanjay K.
    IEEE ACCESS, 2023, 11 : 70011 - 70022
  • [34] A Neural Network Model for Detecting DDoS Attacks Using Darknet Traffic Features
    Ali, Siti Hajar Aminah
    Ozawa, Seiichi
    Ban, Tao
    Nakazato, Junji
    Shimamura, Jumpei
    2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2016, : 2979 - 2985
  • [35] Ip traceback using flow based classification
    Bhavani Y.
    Janaki V.
    Sridevi R.
    Recent Advances in Computer Science and Communications, 2020, 13 (03) : 482 - 490
  • [36] A Queueing Theoretic Analysis of Source IP NAT
    Westphal, Cedric
    Perkins, Charles E.
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [37] Analysis and modeling of practical experiment on IP traffic control
    Suzuki, Tadamichi
    Ito, Jungo
    Nakano, Kazushi
    Miki, Tetsuya
    IEEJ Transactions on Industry Applications, 2008, 128 (04) : 529 - 536
  • [38] Filtering Spoofed IP Traffic Using Switching ASICs
    Bai, Jiasong
    Bi, Jun
    Zhang, Menghao
    Li, Guanyu
    SIGCOMM'18: PROCEEDINGS OF THE ACM SIGCOMM 2018 CONFERENCE: POSTERS AND DEMOS, 2018, : 51 - 53
  • [39] IP traffic generator using container virtualization technology
    Fujdiak, Radek
    Uher, Vaclav
    Mlynek, Petr
    Blazek, Petr
    Slacik, Jan
    Misurec, Jiri
    Volkova, Marina
    Chmelar, Petr
    Sedlacek, Vladimir
    2018 10TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2018): EMERGING TECHNOLOGIES FOR CONNECTED SOCIETY, 2018,
  • [40] Traffic engineering standards in IP networks using MPLS
    Ghanwani, A
    Jamoussi, B
    Fedyk, D
    Ashwood-Smith, P
    Li, L
    Feldman, N
    IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (12) : 49 - 53