Internet Sensor Grid: Experiences with Passive and Active Instruments - Communications: Wireless in Developing Countries and Networks of the Future
Conference Papers Year : 2010

Internet Sensor Grid: Experiences with Passive and Active Instruments

Abstract

The Internet is constantly evolving with new emergent behaviours arising; some of them malicious. This paper discusses opportunities and research direction in an Internet sensor grid for malicious behaviour detection, analysis and countermeasures. We use two example sensors as a basis; firstly the honeyclient for malicious server and content identification (i.e. drive-by-downloads, the most prevalent attack vector for client systems) and secondly the network telescope for Internet Background Radiation detection (IBR - which is classified as unsolicited, non-productive traffic that traverses the Internet, often malicious in nature or origin). Large amounts of security data can be collected from such sensors for analysis and federating honeyclient and telescope data provides a worldwide picture of attacks that could enable the provision of countermeasures. In this paper we outline some experiences with these sensors and analyzing network telescope data through Grid computing as part of an "intelligence layer" within the Internet.
Fichier principal
Vignette du fichier
5-_Komisarczuk.pdf (775.67 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01054750 , version 1 (08-08-2014)

Licence

Identifiers

Cite

Peter Komisarczuk, Ian Welch. Internet Sensor Grid: Experiences with Passive and Active Instruments. Third IFIP TC6 International Conference on Wireless Communications and Information Technology in Developing Countries (WCITD) / IFIP TC 6 International Network of the Future Conference (NF) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.132-145, ⟨10.1007/978-3-642-15476-8_14⟩. ⟨hal-01054750⟩
223 View
324 Download

Altmetric

Share

More