• Login
    View Item 
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • View Item
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    On the Design and Use of Internet Sinks for Network Abuse Monitoring

    Thumbnail
    File(s)
    TR1497.pdf (2.703Mb)
    Date
    2004
    Author
    Yegneswaran, Vinod
    Barford, Paul
    Plonka, Dave
    Publisher
    University of Wisconsin-Madison Department of Computer Sciences
    Metadata
    Show full item record
    Abstract
    Network abuse monitoring (eg., for intrusions and denial of service attacks) is an important component in security architecture. Monitoring unused IP addresses offers opportunities to significantly improve perspective on abuse activity without many of the problems associated with typical network intrusion detection and firewall systems. In this paper, we describe a scalable architecture for an IP traffic monitoring system called an Internet Sink (isink). The objective of this system is to measure abuse activity on unused or "dark" IP addresses in an efficient and scalable fashion. A distinguishing feature of an isink in contrast to traditional intrusion detection systems or firewalls, is that it includes a stateless active component that generates response packets to incorning traffic. This gives the isink an important advantage in discriminating between different types of attacks (through examination of the response payloads). In the second part of the paper, we report a case study of live deployment and performance results of our isink implementation in controlled laboratory experiments. The case study demonstrates the utility of isink by revealing interesting network phenomena such as periodic probing and SMTP hot-spots. The laboratory results demonstrate the efficiency and scalability of our implementation.
    Permanent Link
    http://digital.library.wisc.edu/1793/60382
    Type
    Technical Report
    Citation
    TR1497
    Part of
    • CS Technical Reports

    Contact Us | Send Feedback
     

     

    Browse

    All of MINDS@UWCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    Contact Us | Send Feedback