Internet Background Radiation

Subscribers:
349,000
Published on ● Video Link: https://www.youtube.com/watch?v=3YZ-djm36U4



Duration: 1:22:20
228 views
2


Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses---thus we term the traffic ``background radiation.'' Background radiation reflects fundamentally nonproductive traffic, either malicious (flooding backscatter, scans for vulnerabilities, worms) or benign (misconfigurations). While the general presence of background radiation is well known to the network operator community, its nature had not been previously characterized. We developed a broad characterization [1] based on data collected from unused networks in the Internet over the last two years. Three key elements of our methodology are (1) the use of filtering to reduce load on the measurement system, and (2) the use of active responders to elicit further activity from scanners in order to differentiate different types of background radiation, and (3) the use of application level traffic semantic analysis to uncover activity details at application protocol level. While we find a menagerie of activity, probes from worms and autorooters heavily dominate the traffic. We conclude with considerations of how to incorporate our characterizations into monitoring and detecting activities. [1] R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet background radiation. Internet Measurement Conference 2004




Other Videos By Microsoft Research


2016-09-06Supporting Construction, Analysis, and Understanding of Software Models.
2016-09-06Program Verification via Three-Valued Logic Analysis
2016-09-06Efficient Data Dissemination in Bandwidth-Asymmetric P2P Networks
2016-09-06Tractable Learning of Structured Prediction Models
2016-09-06Future Hype: The Myths of Technology Change
2016-09-06Improving Packet Delivery Efficiency Using Multi-Radio Diversity in Wireless LANs
2016-09-06Algorithmic Foundations of P2P and Wireless Networks
2016-09-06Semi-unsupervised learning of taxonomic and non-taxonomic relationships from the web
2016-09-06The Weather Makers: How Man is Changing the Climate and What it Means for Life on Earth
2016-09-06Touched with Light: Scanned beams display or capture information at video rates
2016-09-06Internet Background Radiation
2016-09-06Understanding and Improving Wireless Networks
2016-09-06SAFECode: A Platform for Developing Reliable Software in Unsafe Languages
2016-09-06Enabling Internet Malware Investigation and Defense Using Virtualization
2016-09-06Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
2016-09-06Approximate inference techniques for optimal design in self-assembly and automated programming
2016-09-06Machine Learning Methods for Structured and Collective Classification
2016-09-06Communication Technology: Interruption and Overload
2016-09-06ParaEval: Using Paraphrases to Improve Machine Translation and Summarization Evaluations
2016-09-06Rethinking Processor and System Architecture
2016-09-06Crashing the Gate: Netroots, Grassroots, and the Rise of People-Powered Politics



Tags:
microsoft research