Internet sensor grid: experiences with passive and active instruments

Komisarczuk, Peter and Welch, Ian (2010) Internet sensor grid: experiences with passive and active instruments. In: WCITD/NF 2010, 20-23 Sept 2010, Brisbane, Australia.

Full text not available from this repository.


The Internet is constantly evolving with new emergent behaviours arising; some of them malicious. This paper discusses opportunities and research direction in an Internet sensor grid for malicious behaviour detection, analysis and countermeasures. We use two example sensors as a basis; firstly the honeyclient for malicious server and content identification (i.e. drive-by-downloads, the most prevalent attack vector for client systems) and secondly the network telescope for Internet Background Radiation detection (IBR - which is classified as unsolicited, non-productive traffic that traverses the Internet, often malicious in nature or origin). Large amounts of security data can be collected from such sensors for analysis and federating honeyclient and telescope data provides a worldwide picture of attacks that could enable the provision of countermeasures. In this paper we outline some experiences with these sensors and analyzing network telescope data through Grid computing as part of an “intelligence layer” within the Internet.

Item Type: Conference or Workshop Item (Paper)
ISSN: 1868-4238
ISBN: 9783642154751
Identifier: 10.1007/978-3-642-15476-8_14
Page Range: pp. 20-24
Identifier: 10.1007/978-3-642-15476-8_14
Subjects: Computing
Depositing User: Vani Aul
Date Deposited: 21 Mar 2014 15:09
Last Modified: 28 Aug 2021 07:17

Actions (login required)

View Item View Item