Tracking Darkports For Network Defense

Miami Beach, FL, USA(2007)

引用 29|浏览286
暂无评分
摘要
We exploit for defensive purposes the concept of darkports - the unused ports on active systems. We are particularly interested in such ports which transition to become active (i.e. become trans-darkports). Darkports are identified by passively observing and characterizing the connectivity behavior of internal hosts in a network as they respond to both legitimate connection attempts and scanning attempts. Darkports can be used to detect sophisticated scanning activity, enable fine-grained automated defense against automated malware attacks, and detect real-time changes in a network that may indicate a successful compromise. We show, in a direct comparison with Snort, that darkports offer a better scanning detection capability with fewer false positives and negatives. Our results also show that the network awareness gained by the use of darkports enables active response options to be safely focused exclusively on those systems that directly threaten the network.
更多
查看译文
关键词
access control,false positive,internet,real time,computer science,application software,computer security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要