Title
Fingerprinting Traffic Log
Abstract
As malwares such as worms, viruses, spy wares, and bots keep being large threats in Internet security, a number of projects suggest monitoring their macroscopic network activities by globally distributed sensors. These sensors are deployed in various pertinent organizations and keep collecting traffic logs. Eventually these logs are shared among entities who analyze them. As such activities rise, more and more traffic logs are shared among the organizations and their traceability becomes an important issue. In this paper, we propose a fingerprinting method to embed an id into traffic logs. Particularly, we consider fingerprinting darknet traffic logs, which are common in network monitoring. By focusing on the nature of darknet traffic, our method enhances traceability while introducing minor degradation to them. Experiments using real darknet traffic show the robustness of the proposed scheme against several typical randomized attacks.
Year
DOI
Venue
2008
10.1109/IIH-MSP.2008.276
IIH-MSP
Keywords
DocType
ISBN
important issue,darknet traffic log,darknet traffic,fingerprinting traffic log,internet security,network monitoring,real darknet traffic,macroscopic network activity,activities rise,traffic log,fingerprinting method,fingerprinting,internet,fingerprint recognition,security,robustness
Conference
978-0-7695-3278-3
Citations 
PageRank 
References 
1
0.37
3
Authors
2
Name
Order
Citations
PageRank
Katsunari Yoshioka114722.92
Tsutomu Matsumoto21156197.58