DocumentCode
1707192
Title
Flow based observations from NETI@home and honeynet data
Author
Grizzard, Julian B. ; Simpson, Charles R., Jr. ; Krasser, Sven ; Owen, Henry L. ; Riley, George F.
Author_Institution
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol. Atlanta, USA
fYear
2005
Firstpage
244
Lastpage
251
Abstract
We conduct a flow based comparison of honeynet traffic, representing malicious traffic, and NETI@home traffic, representing typical end user traffic. We present a cumulative distribution function of the number of packets for a TCP flow and learn that a large portion of these flows in both datasets are failed and potentially malicious connection attempts. Next, we look at a histogram of TCP port activity over large time scales to gain insight into port scanning and worm activity. One key observation is that new worms can linger on for more than a year after the initial release date. Finally, we look at activity relative to the IP address space and observe that the sources of malicious traffic are spread across the allocated range.
Keywords
Internet; invasive software; packet switching; telecommunication network routing; telecommunication security; telecommunication traffic; transport protocols; IP address; Internet; NETI@home data; NETI@home traffic; TCP flow; TCP port activity; computer worms; cumulative distribution function; end user traffic; flow based observations; honeynet data; honeynet traffic; malicious connection attempts; malicious traffic; packets; port scanning; worm activity; Computer worms; Distribution functions; Histograms; IP networks; Internet; Software packages; Space technology; Statistics; TCPIP; Telecommunication traffic;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
Print_ISBN
0-7803-9290-6
Type
conf
DOI
10.1109/IAW.2005.1495959
Filename
1495959
Link To Document