Collaborative behavior visualization and its detection by observing darknet traffic

Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Recently, we have a problem about an attack generated by a botnet which consists of a group of compromised computers called bots. An attacker called botmaster controls it and a botnet invokes an attack such as scanning and DDoS attack. In this paper, we use the 3D-visualization to investigate the change of attack according to the darknet traffic. As a result, we discover the attack in which several source IP addresses transmit packets to a single destination within a short period of time. In addition, we find that the packet size and the destination port number are identical on its attack. Furthermore, we propose the method to detect this attack called behavior of collaborative attack. In our proposal, we focus on the number of source IP addresses which transmit packets to the single destination. We detected this packet and the rate of packet with the same packet size and destination port number occupied about 90% of the set unit of extracted packet.

Original languageEnglish
Title of host publicationCyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings
Pages212-226
Number of pages15
DOIs
Publication statusPublished - Dec 26 2012
Event4th International Symposium on Cyberspace Safety and Security, CSS 2012 - Melbourne, VIC, Australia
Duration: Dec 12 2012Dec 13 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7672 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Symposium on Cyberspace Safety and Security, CSS 2012
Country/TerritoryAustralia
CityMelbourne, VIC
Period12/12/1212/13/12

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Collaborative behavior visualization and its detection by observing darknet traffic'. Together they form a unique fingerprint.

Cite this