ABSTRACT
The monitoring of packets destined for routeable, yet unused, Internet addresses has proved to be a useful technique for measuring a variety of specific Internet phenomenon (e.g., worms, DDoS). In 2004, Pang et al. stepped beyond these targeted uses and provided one of the first generic characterizations of this non-productive traffic, demonstrating both its significant size and diversity. However, the six years that followed this study have seen tremendous changes in both the types of malicious activity on the Internet and the quantity and quality of unused address space. In this paper, we revisit the state of Internet "background radiation" through the lens of two unique data-sets: a five-year collection from a single unused 8 network block, and week-long collections from three recently allocated 8 network blocks. Through the longitudinal study of the long-lived block, comparisons between blocks, and extensive case studies of traffic in these blocks, we characterize the current state of background radiation specifically highlighting those features that remain invariant from previous measurements and those which exhibit significant differences. Of particular interest in this work is the exploration of address space pollution, in which significant non uniform behavior is observed. However, unlike previous observations of differences between unused blocks, we show that increasingly these differences are the result of environmental factors (e.g., misconfiguration, location), rather than algorithmic factors. Where feasible, we offer suggestions for clean up of these polluted blocks and identify those blocks whose allocations should be withheld.
- D. Moore, V. Paxon, S. Savage, and Shannon C. Inside the Slammer Worm. In Proceedings of IEEE Security and Privacy, Jun 2003. Google Scholar
Digital Library
- D. Moore, C. Shannon, and J. Brown. A Case Study on the Spread and Victims of an Internet Worm. In Proceedings of ACM SIGCOMM Internet Measurement Workshop, Nov 2002. Google Scholar
Digital Library
- Michael Bailey, Evan Cooke, David Watson, Farnam Jahanian, and Jose Nazario. The Blaster Worm: Then and Now. IEEE Security & Privacy, 3(4):26--31, 2005. Google Scholar
Digital Library
- D. Moore, G. Voelker, and S. Savage. Inferring Internet Denial of Service Activity. In Proceedings of the 2001 USENIX Security Symposium, Aug 2001. Google Scholar
Digital Library
- M. Bailey, E. Cooke, D. Watson, F. Jahanian, and N. Provos. Practical Darknet Measurement. In Proceedings of the 40th Annual Conference on Information Sciences and Systems (CISS), Mar 2006.Google Scholar
Cross Ref
- D. Moore, C. Shannon, G.M. Voelker, and S. Savage. Network Telescopes. Cooperative Association for Internet Data Analysis - Technical Report, 2004.Google Scholar
- M. Bailey, E. Cooke, D. Watson, F. Jahanian, and N. Provos. Towards Understanding Distributed Blackhole Placement. In Proceedings of the 2nd Workshop on Rapid Malcode (WORM), Oct 2004. Google Scholar
Digital Library
- V. Yegneswaran, P. Barford, and D. Plonka. On the Design and Use of Internet Sinks for Network Abuse Monitoring. In Proceedings of the Symposium on Recent Advances in Intrusion Detection, Sep 2004.Google Scholar
Cross Ref
- M. Bailey, E. Cooke, D. Watson, F. Jahanian, and N. Provos. The In- ternet Motion Sensor - A Distributed Blackhole Monitoring System. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS), Feb 2005.Google Scholar
- R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Charac- teristics of Internet Background Radiation. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, Oct 2004. Google Scholar
Digital Library
- Moheeb Abu Ra jab, Jay Zarfoss, Fabian Monrose, and Andreas Terzis. A multifaceted approach to understanding the botnet phenomenon. In IMC '06: Proceedings of the 6th ACM SIGCOMM on Internet measurement, pages 41--52, New York, NY, USA, 2006. ACM Press. Google Scholar
Digital Library
- Evan Cooke, Farnam Jahanian, and Danny McPherson. The Zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop), Cambridge, MA, July 2005. Google Scholar
Digital Library
- E. Eugene Schultz. Where have the worms and viruses gone?--new trends in malware. Computer Fraud & Security, 2006(7):4--8, 2006.Google Scholar
Cross Ref
- Craig Labovitz, Scott Iekel-Johnson, Danny McPherson, Jon Oberheide, and Farnam Jahanian. Internet Inter-Domain Traffic. In Proc. ACM SIGCOMM (To Appear), 2010. Google Scholar
Digital Library
- Geoý Huston. The changing Foundation of the Internet: confronting IPv4 Address Exhaustion. The Internet Protocol Journal, September 2008.Google Scholar
- Protected Repository for the Defense of Infrastructure Against Cyber Threats. http://www.predict.org.Google Scholar
- Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, and David Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. Proceedings of the USENIX/ACM Internet Measurement Conference, October 2005. Google Scholar
Digital Library
- Sushant Sinha, Michael Bailey, and Farnam Jahanian. Shedding light on the configuration of dark addresses. In Proceedings of Network and Distributed System Security Symposium (NDSS '07), February 2007.Google Scholar
- John Bethencourt, Jason Franklin, and Mary Vernon. Mapping Internet sensors with probe response attacks. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005. Google Scholar
Digital Library
- Moheeb Abu Ra jab, Fabian Monrose, and Andreas Terzis. On the eýective- ness of distributed worm monitoring. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005. Google Scholar
Digital Library
- Evan Cooke, Z. Morley Mao, and Farnam Jahanian. Hotspots: The root causes of non-uniformity in self-propagating malware. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'2006), June 2006. Google Scholar
Digital Library
- Abhishek Kumar, Vern Paxson, and Nicholas Weaver. Exploiting underlying structure for detailed reconstruction of an internet-scale event. Proceedings of the USENIX/ACM Internet Measurement Conference, October 2005. Google Scholar
Digital Library
- Mark Allman, Vern Paxson, and Jeý Terrell. A brief history of scanning. In IMC '07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, New York, NY, USA, 2007. Google Scholar
Digital Library
- Route Views Pro ject. University of Oregon Route Views Project. http://archive.routeviews.org/, Aug 2010.Google Scholar
- RIPE (Rseaux IP Europens). RIS Raw Data. http://www.ripe.net/projects/ris/rawdata.html, Aug 2010.Google Scholar
- RADb: Merit network inc. routing assets database. http://www.radb. net/.Google Scholar
- B. Kantor, S. Savage, R. Wesson, B. Enright, P. Porras, V. Yeg- neswaran, J. Wolfgang, and Castro S. Conflicker/Conflicker/Downadup as seen from the UCSD Network Telescope - Feb 2009. http://www.caida.org/research/security/ms08-067/conflicker.xml.Google Scholar
- S. Gauci. RTP Traffic to 1.1.1.1 - Feb 2010. http://blog.sipvicious.org/2010/02/rtp-traffic-to-1111.html.Google Scholar
- S. Eivind. usken.no - VoIP news! - Feb 2010. http://www.usken.no/2010/02/sip-scanning-causes-ddos-on-ip-1-1-1-1/.Google Scholar
- Adrian MariÃ{o. Fake Servers List - Official eMule-Board - Apr 2010. http://forum.emule-project.net/index.php?showtopic=139609&st=60.Google Scholar
- Evan Cooke, Michael Bailey, Farnam Jahanian, and Richard Mortier. The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discov- ery. In Proceedings of the 3rd Symposium on Networked Systems Design & Implementation (NSDI'06), pages 101--114, San Jose, California, USA, May 2006. Google Scholar
Digital Library
Index Terms
Internet background radiation revisited





Comments