Monitoring darknet activities by using network telescope

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Today, many hosts are connected to the Internet worldwide. Those hosts are intentionally or even accidentally targeted in a daily basis by malicious activities. Thus, it is essential to monitor Internet traffic in order to acquire the knowledge of the threats that is targeting computers and network systems. Security experts initiated numerous approaches for monitoring traffic that includes malicious activities, and network telescope was one of them. Network telescopes are valuable in the term of monitoring and gathering data associated with Internet attack activities. Analysis of traffic captured by network telescopes has been shown as an effective measure in characterizing evil traffic caused by worm propagation and distributed denial of service attacks. This paper will discuss monitoring traffic coming from Darknet using network telescope. Additionally, we will identify the security issues and threats introduced if no monitored device is placed within a network infrastructure. The objective of this paper is to introduce the effect of such a technology on entities, provide successful solution, and encourage future research in this area of interest.

Original languageBritish English
Title of host publication2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages123-128
Number of pages6
ISBN (Electronic)9781908320933
DOIs
StatePublished - 8 May 2018
Event12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 - Cambridge, United Kingdom
Duration: 11 Dec 201714 Dec 2017

Publication series

Name2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017

Conference

Conference12th International Conference for Internet Technology and Secured Transactions, ICITST 2017
Country/TerritoryUnited Kingdom
CityCambridge
Period11/12/1714/12/17

Keywords

  • Darknet
  • DDoS
  • Network Telescope
  • Worm

Fingerprint

Dive into the research topics of 'Monitoring darknet activities by using network telescope'. Together they form a unique fingerprint.

Cite this