skip to main content
10.1145/2398776.2398781acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Classifying internet one-way traffic

Published:14 November 2012Publication History

ABSTRACT

Internet background radiation (IBR) is a very interesting piece of Internet traffic as it is the result of attacks and misconfigurations. Previous work has primarily analyzed IBR traffic to large unused IP address blocks called network telescopes. In this work, we build new techniques for monitoring one-way traffic in live networks with the main goals of 1) expanding our understanding of this interesting type of traffic towards live networks as well as of 2) making it useful for detecting and analyzing the impact of outages. Our first contribution is a classification scheme for dissecting one-way traffic into useful classes, including one-way traffic due to unreachable services, scanning, peer-to-peer applications, and backscatter. Our classification scheme is helpful for monitoring IBR traffic in live networks solely based on flow level data. After thoroughly validating our classifier, we use it to analyze a massive data-set that covers 7.41 petabytes of traffic from a large backbone network to shed light into the composition of one-way traffic. We find that the main sources of one-way traffic are malicious scanning, peer-to-peer applications, and outages. In addition, we report a number of interesting observations including that one-way traffic makes a very large fraction, i.e., between 34% and 67%, of the total number of flows to the monitored network, although it only accounts for only 3.4% of the number of packets, which suggests a new conceptual model for Internet traffic in which IBR is dominant in terms of flows. Finally, we demonstrate the utility of one-way traffic of the particularly interesting class of unreachable services for monitoring network and service outages by analyzing the impact of interesting events we detected in the network of our university.

Skip Supplemental Material Section

Supplemental Material

References

  1. One-way Traffic Classification Website. http://www.ow-class.ethz.ch/.Google ScholarGoogle Scholar
  2. Akamai Technologies. The state of the internet report (3rd quarter, 2009). Technical report, 2009.Google ScholarGoogle Scholar
  3. M. Allman, V. Paxson, and J. Terrell. A brief history of scanning. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, page 82. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Bailey, E. Cooke, F. Jahanian, D. Watson, and J. Nazario. The blaster worm: Then and now. IEEE Security and Privacy, 3:26--31, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian. Anomaly extraction in backbone networks using association rules. In Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC'09, pages 28--34, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. Brownlee. One-way traffic monitoring with iatmon. In Passive and Active Measurement Conference, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. CAIDA. UCSD Network Telescope. http://www.caida.org/data/realtime/telescope/.Google ScholarGoogle Scholar
  8. Y.-J. Chi, R. Oliveira, and L. Zhang. Cyclops: the as-level connectivity observatory. SIGCOMM Comput. Commun. Rev., 38(5), Sept. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Cymru. The Bogon Reference. http://www.team-cymru.org/Services/Bogons/, 2012.Google ScholarGoogle Scholar
  10. A. Dainotti, R. Amman, E. Aben, and K. C. Claffy. Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the internet. SIGCOMM Comput. Commun. Rev., 42(1):31--39, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Cooperative Network Security Community -- Internet Security. www.dshield.org.Google ScholarGoogle Scholar
  12. E. Glatz and X. Dimitropoulos. Classifying internet one-way traffic. TIK-Report 336, ETH Zurich, May 2012.Google ScholarGoogle Scholar
  13. S. Guha, J. Chandrashekar, N. Taft, and K. Papagiannaki. How healthy are today's enterprise networks? In Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, pages 145--150. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. X. Hu and Z. M. Mao. Accurate real-time identification of ip prefix hijacking. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. IANA - Internet Assigned Numbers Authority. PORT NUMBERS. http://www.iana.org/assignments/port-numbers, 2011.Google ScholarGoogle Scholar
  16. C. Inacio and B. Trammell. Yaf: yet another flowmeter. In Proceedings of the 24th international conference on Large installation system administration, pages 1--16. USENIX Association, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Y. Jin, Z. Zhang, K. Xu, F. Cao, and S. Sahu. Identifying and tracking suspicious activities through IP gray space analysis. In Proceedings of the 3rd annual ACM workshop on Mining network data, page 12. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. W. John and S. Tafvelin. Heuristics to classify internet backbone traffic based on connection patterns. International Conference on Information Networking (ICOIN), pages 1--5, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  19. J. Jung, V. Paxson, A. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In Proceedings of the IEEE Symposium on Security and Privacy, pages 211--225, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  20. T. Karagiannis, A. Broido, and M. Faloutsos. Transport layer identification of p2p traffic. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 121--134, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. T. Karagiannis, K. Papagiannaki, and M. Faloutsos. Blinc: multilevel traffic classification in the dark. In Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. E. Katz-Bassett, H. V. Madhyastha, J. P. John, A. Krishnamurthy, D. Wetherall, and T. Anderson. Studying black holes in the internet with hubble. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. Katz-Bassett, C. Scott, D. R. Choffnes, I. Cunha, V. Valancius, N. Feamster, H. V. Madhyastha, T. Anderson, and A. Krishnamurthy. Lifeguard: practical repair of persistent route failures. In Proceedings of the ACM SIGCOMM 2012, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee. Internet traffic classification demystified: myths, caveats, and the best practices. In Proceedings of the 2008 ACM CoNEXT conference, page 11. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. PHAS: A prefix hijack alert system. In In Proc. USENIX Security Symposium, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. Lee and N. Brownlee. Passive measurement of one-way and two-way flow lifetimes. SIGCOMM Comput. Commun. Rev., 37(3):17--28, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security and Privacy, 1:33--39, July 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. Moore, C. Shannon, G. Voelker, and S. Savage. Network telescopes: Technical report. Technical report, CAIDA, 2004.Google ScholarGoogle Scholar
  29. D. Moore, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. In SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium, Berkeley, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet background radiation. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 27--40. ACM New York, NY, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. Perényi, T. D. Dang, A. Gefferth, and S. Molnr. Identification and analysis of peer-to-peer traffic. JOURNAL OF COMMUNICATIONS, 1(7), 2006.Google ScholarGoogle Scholar
  32. D. Schatzmann, S. Leinen, J. Kogel, and W. Muhlbauer. Fact: Flow-based approach for connectivity tracking. In Passive and Active Measurement conference, Mar. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. X. Shi, Y. Xiang, Z. Wang, X. Yin, and J. Wu.Detecting prefix hijackings in the internet with argus. In Proceedings of the 12th ACM SIGCOMM conference on Internet measurement. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. B. Trammell and E. Boschi. Bidirectional flow export using IPFIX. RFC 5103, January 2008.Google ScholarGoogle Scholar
  35. J. Treurniet. A network activity classification schema and its application to scan detection. IEEE/ACM Trans. Netw., 19(5):1396--1404, Oct. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. US Homeland Security. BGPmon. http://bgpmon.net/.Google ScholarGoogle Scholar
  37. Wikipedia. Netflow. http://en.wikipedia.org/wiki/Netflow.Google ScholarGoogle Scholar
  38. E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Huston. Internet background radiation revisited. In Proceedings of the 10th annual conference on Internet measurement, IMC'10, pages 62--74, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. V. Yegneswaran, P. Barford, and J. Ullrich. Internet intrusions: global characteristics and prevalence. SIGMETRICS Perform. Eval. Rev., 31(1):138--147, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, and R. Bush. ispy: detecting ip prefix hijacking on my own. IEEE/ACM Trans. Netw., 18(6), Dec. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis. A light-weight distributed scheme for detecting ip prefix hijacks in real-time. In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Classifying internet one-way traffic

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IMC '12: Proceedings of the 2012 Internet Measurement Conference
      November 2012
      572 pages
      ISBN:9781450317054
      DOI:10.1145/2398776

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 November 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate277of1,083submissions,26%

      Upcoming Conference

      IMC '24
      ACM Internet Measurement Conference
      November 4 - 6, 2024
      Madrid , AA , Spain

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader