DocumentCode :
2529789
Title :
Tracking Darkports for Network Defense
Author :
Whyte, David ; Oorschot, Paul C.van ; Kranakis, Evangelos
fYear :
2007
fDate :
10-14 Dec. 2007
Firstpage :
161
Lastpage :
171
Abstract :
We exploit for defensive purposes the concept of darkports ­ the unused ports on active systems. We are particularly in- terested in such ports which transition to become active (i.e. become trans-darkports). Darkports are identified by pas- sively observing and characterizing the connectivity behav- ior of internal hosts in a network as they respond to both le- gitimate connection attempts and scanning attempts. Dark- ports can be used to detect sophisticated scanning activity, enable fine-grained automated defense against automated malware attacks, and detect real-time changes in a network that may indicate a successful compromise. We show, in a direct comparison with Snort, that darkports offer a better scanning detection capability with fewer false positives and negatives. Our results also show that the network awareness gained by the use of darkports enables active response op- tions to be safely focused exclusively on those systems that directly threaten the network.
Keywords :
Access control; Application software; Computer science; Computer security; IP networks; Internet; Probes; Reconnaissance; Recruitment; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual
Conference_Location :
Miami Beach, FL, USA
ISSN :
1063-9527
Print_ISBN :
978-0-7695-3060-4
Type :
conf
DOI :
10.1109/ACSAC.2007.38
Filename :
4412986
Link To Document :
بازگشت