Verification of the Effectiveness to Monitor Darknet across Multiple Organizations

K. Nishijima, Takao Kondo, Tatsumi Hosokawa, Tomohiro Shigemoto, N. Kawaguchi, Hiroyuki Hasegawa, Hideyuki Honda, Yasuhito Suzuki, T. Kaji, Osamu Nakamura
{"title":"Verification of the Effectiveness to Monitor Darknet across Multiple Organizations","authors":"K. Nishijima, Takao Kondo, Tatsumi Hosokawa, Tomohiro Shigemoto, N. Kawaguchi, Hiroyuki Hasegawa, Hideyuki Honda, Yasuhito Suzuki, T. Kaji, Osamu Nakamura","doi":"10.1109/CANDARW53999.2021.00065","DOIUrl":null,"url":null,"abstract":"Researchers and network operators regularly monitor unused Internet address space called the darknet to understand malicious activities on the Internet such as malware infections, DDoS, and scanning to find vulnerable systems. The purpose of this study is to demonstrate the effectiveness of darknet monitoring across multiple organizations by conducting a detailed similarity analysis. In this paper, we analyze darknet data observed in two organizations in different industries and the first octet subnet range. We compared the results of the similarity analysis between intra-organization and inter-organization calculations by dividing the address space into multiple blocks so that one organization conducts similarity analysis in an intra-organization manner. The results show that the similarity of the source hosts is lower in the inter-organization calculation than in the intra-organization calculation. In addition, we monitor more source hosts in inter-organization. Moreover, this work also reports that the results differ depending on the destination ports/protocols. From the results obtained, we clarified the effectiveness of distributing the monitoring points of the darknet across multiple organizations.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CANDARW53999.2021.00065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Researchers and network operators regularly monitor unused Internet address space called the darknet to understand malicious activities on the Internet such as malware infections, DDoS, and scanning to find vulnerable systems. The purpose of this study is to demonstrate the effectiveness of darknet monitoring across multiple organizations by conducting a detailed similarity analysis. In this paper, we analyze darknet data observed in two organizations in different industries and the first octet subnet range. We compared the results of the similarity analysis between intra-organization and inter-organization calculations by dividing the address space into multiple blocks so that one organization conducts similarity analysis in an intra-organization manner. The results show that the similarity of the source hosts is lower in the inter-organization calculation than in the intra-organization calculation. In addition, we monitor more source hosts in inter-organization. Moreover, this work also reports that the results differ depending on the destination ports/protocols. From the results obtained, we clarified the effectiveness of distributing the monitoring points of the darknet across multiple organizations.
跨多个组织监控暗网的有效性验证
研究人员和网络运营商定期监控被称为暗网的未使用的互联网地址空间,以了解互联网上的恶意活动,如恶意软件感染、DDoS和扫描以发现易受攻击的系统。本研究的目的是通过进行详细的相似性分析来证明跨多个组织的暗网监测的有效性。在本文中,我们分析了在不同行业的两个组织中观察到的暗网数据和第一个八位子网范围。我们通过将地址空间划分为多个块来比较组织内和组织间计算的相似度分析结果,使一个组织以组织内的方式进行相似度分析。结果表明,在组织间计算中,源主机的相似度低于组织内计算。此外,我们在组织间监控更多的源主机。此外,这项工作还报告了结果因目标端口/协议而异。从获得的结果中,我们明确了将暗网监测点分布在多个组织中的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信