Observing Internet Worm and Virus Attacks with a Small Network Telescope

  • Authors:
  • Uli Harder;Matt W. Johnson;Jeremy T. Bradley;William J. Knottenbelt

  • Affiliations:
  • Department of Computing, Imperial College London, South Kensington Campus, London SW7 2AZ, United Kingdom;Department of Computing, Imperial College London, South Kensington Campus, London SW7 2AZ, United Kingdom;Department of Computing, Imperial College London, South Kensington Campus, London SW7 2AZ, United Kingdom;Department of Computing, Imperial College London, South Kensington Campus, London SW7 2AZ, United Kingdom

  • Venue:
  • Electronic Notes in Theoretical Computer Science (ENTCS)
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

A network telescope is a portion of IP address space dedicated to observing inbound internet traffic. The purpose of a network telescope is to detect and log malicious traffic which originates from internet worms and viruses. In this paper, we investigate the statistical properties of observed traffic from a passive Class C telescope over a total of three months. We observe that only a few IP sources and destination ports are responsible for the majority of the traffic. We also demonstrate various ways to visualise the traffic profile from a telescope. We show that specific profiles can identify and distinguish portscans, hostscans and distributed denial-of-service (DDOS) attacks. Looking at the inter-arrival time of packets, the power spectrum and the detrended fluctuation analysis of the observed traffic, we show that there is very little sign of long-range dependence. This is in stark contrast to other network traffic and presents exciting possibilities for identifying malicious traffic purely from its traffic profile.