Identifying and modeling unwanted traffic on the Internet
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2006.
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Language: | eng |
Published: |
Massachusetts Institute of Technology
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/37100 |
_version_ | 1811068499879002112 |
---|---|
author | Soto, Paul, M. Eng. Massachusetts Institute of Technology |
author2 | Richard Lippmann. |
author_facet | Richard Lippmann. Soto, Paul, M. Eng. Massachusetts Institute of Technology |
author_sort | Soto, Paul, M. Eng. Massachusetts Institute of Technology |
collection | MIT |
description | Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2006. |
first_indexed | 2024-09-23T07:56:54Z |
format | Thesis |
id | mit-1721.1/37100 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T07:56:54Z |
publishDate | 2007 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/371002022-01-13T07:54:29Z Identifying and modeling unwanted traffic on the Internet Soto, Paul, M. Eng. Massachusetts Institute of Technology Richard Lippmann. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Electrical Engineering and Computer Science. Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2006. Includes bibliographical references (p. 61-62). Accurate models of Internet traffic are important for successful testing of devices that provide network security. However, with the growth of the Internet. it has become increasingly difficult to develop and maintain accurate traffic models. While much internet traffic is legitimate, productive communications between users and services, a significant portion of Internet traffic is the result of unwanted messages sent to IP addresses without regard as to whether there is an active host at that address. In an effort to analyze unwanted traffic, tools were developed that generate statistics and plots on captured unwanted traffic to unused IP addresses. These tools were used on a four-day period of traffic received on an inactive IPv4 class A network address space. Each class B subnet in this address space received an average of 7 million packets corresponding to 21 packets per second. Analyses were performed on a range of class B and C subnets with the intent of discovering the types of variability that are characteristic of unwanted traffic. Traffic volume over time, number of scans, destinations ports, and traffic sources varied substantially across class B and C subnets. (cont.) The results of the analyses, along with tools to replay traffic. allow security tools to be analyzed on the LARIAT network testbed. LARIAT is a real-time adaptable network testbed developed at Lincoln Laboratory that provides an Internet-like environment in which to test network hardware and software. by Paul Soto. M.Eng. 2007-04-03T17:11:32Z 2007-04-03T17:11:32Z 2005 2006 Thesis http://hdl.handle.net/1721.1/37100 84904594 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 146 p. application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Soto, Paul, M. Eng. Massachusetts Institute of Technology Identifying and modeling unwanted traffic on the Internet |
title | Identifying and modeling unwanted traffic on the Internet |
title_full | Identifying and modeling unwanted traffic on the Internet |
title_fullStr | Identifying and modeling unwanted traffic on the Internet |
title_full_unstemmed | Identifying and modeling unwanted traffic on the Internet |
title_short | Identifying and modeling unwanted traffic on the Internet |
title_sort | identifying and modeling unwanted traffic on the internet |
topic | Electrical Engineering and Computer Science. |
url | http://hdl.handle.net/1721.1/37100 |
work_keys_str_mv | AT sotopaulmengmassachusettsinstituteoftechnology identifyingandmodelingunwantedtrafficontheinternet |