skip to main content
10.1145/1080173.1080177acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

Greynets: a definition and evaluation of sparsely populated darknets

Published:22 August 2005Publication History

ABSTRACT

Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise network operators. We introduce and evaluate the Greynet - a region of IP address space that is sparsely populated with 'darknet' addresses interspersed with active (or 'lit') IP addresses. Based on a small sample of traffic collected within a university campus network we saw that relatively sparse greynets can achieve useful levels of network scan detection.

References

  1. "Bro: A System for Detecting Network Intruders in Real-Time", V. Paxson, Proceedings of the 7th USENIX Security Symposium, January 26-29, 1998 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. "Bro", http://www.icir.org/vern/bro-info.html, August 2004Google ScholarGoogle Scholar
  3. D. Moore, C. Shannon, G. M. Voelkery, S. Savagey, "Network Telescopes: Technical Report", CAIDA, April 2004Google ScholarGoogle Scholar
  4. Telescope Analysis, http://www.caida.org/analysis/security/telescope/, April 2005Google ScholarGoogle Scholar
  5. M. Bailey, E. Cooke, "Tracking Global Threats with the Internet Motion Sensor", Nanog 32, September 7th, 2004Google ScholarGoogle Scholar
  6. University of Michigan Internet Motion Sensor, "http://ims.eecs.umich.edu/", April 2005Google ScholarGoogle Scholar
  7. E. Cooke, M. Bailey, Z. M. Mao, D. Watson, F. Jahanian, D. McPherson, "Toward Understanding Distributed Blackhole Placement", Conference on Computer and Communications Security, Proceedings of the 2004 ACM workshop on Rapid malcode, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. The Team Cymru Darknet Project, "http://www.cymru.com/Darknet/", April 2005Google ScholarGoogle Scholar
  9. D. Moore, G. Voelker, S. Savage, "Inferring Internet Denial-of-Service Activity," 2001USENIX Security Symposium August 2001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Lau, "The Spinning Cube of Potential Doom", LBNL Computer Protection Brown Bag seminar, Jan 2004Google ScholarGoogle Scholar
  11. S. Lau, "http://www.nersc.gov/nusers/security/TheSpinningCube.php", April 2005Google ScholarGoogle Scholar
  12. G. Gu et al, "Worm Detection, Early Warning and Response Based on Local Victim Information", ACSAC, December 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Greynets: a definition and evaluation of sparsely populated darknets

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MineNet '05: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
      August 2005
      296 pages
      ISBN:1595930264
      DOI:10.1145/1080173

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 August 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader