PUMA publications for /bibtexkey/dainotti2012extracting/jaeschkehttps://puma.uni-kassel.de/bibtexkey/dainotti2012extracting/jaeschkePUMA RSS feed for /bibtexkey/dainotti2012extracting/jaeschke2024-03-29T10:27:11+01:00Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the internethttps://puma.uni-kassel.de/bibtex/2dc796731675fad942af97e1bd0c17366/jaeschkejaeschke2012-10-09T14:07:12+02:00analysis disaster event ibr internet malware revolution traffic <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Alberto Dainotti" itemprop="url" href="/author/Alberto%20Dainotti"><span itemprop="name">A. Dainotti</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Roman Amman" itemprop="url" href="/author/Roman%20Amman"><span itemprop="name">R. Amman</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Emile Aben" itemprop="url" href="/author/Emile%20Aben"><span itemprop="name">E. Aben</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Kimberly C. Claffy" itemprop="url" href="/author/Kimberly%20C.%20Claffy"><span itemprop="name">K. Claffy</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>SIGCOMM Computer Communication Review</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">42 </span></span>(<span itemprop="issueNumber">1</span>):
<span itemprop="pagination">31--39</span></em> </span>(<em><span>Januar 2012<meta content="Januar 2012" itemprop="datePublished"/></span></em>)Tue Oct 09 14:07:12 CEST 2012New York, NY, USASIGCOMM Computer Communication Reviewjan131--39Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the internet422012analysis disaster event ibr internet malware revolution traffic Unsolicited one-way Internet traffic, also called Internet background radiation (IBR), has been used for years to study malicious activity on the Internet, including worms, DoS attacks, and scanning address space looking for vulnerabilities to exploit. We show how such traffic can also be used to analyze macroscopic Internet events that are unrelated to malware. We examine two phenomena: country-level censorship of Internet communications described in recent work, and natural disasters (two recent earthquakes). We introduce a new metric of local IBR activity based on the number of unique IP addresses per hour contributing to IBR. The advantage of this metric is that it is not affected by bursts of traffic from a few hosts. Although we have only scratched the surface, we are convinced that IBR traffic is an important building block for comprehensive monitoring, analysis, and possibly even detection of events unrelated to the IBR itself. In particular, IBR offers the opportunity to monitor the impact of events such as natural disasters on network infrastructure, and in particular reveals a view of events that is complementary to many existing measurement platforms based on (BGP) control-plane views or targeted active ICMP probing.