Abstract

Today, many hosts are connected to the Internet worldwide. Those hosts are intentionally or even accidentally targeted in a daily basis by malicious activities. Thus, it is essential to monitor Internet traffic in order to acquire the knowledge of the threats that is targeting computers and network systems. Security experts initiated numerous approaches for monitoring traffic that includes malicious activities, and network telescope was one of them. Network telescopes are valuable in the term of monitoring and gathering data associated with Internet attack activities. Analysis of traffic captured by network telescopes has been shown as an effective measure in characterizing evil traffic caused by worm propagation and distributed denial of service attacks. This paper will discuss monitoring traffic coming from Darknet using network telescope. Additionally, we will identify the security issues and threats introduced if no monitored device is placed within a network infrastructure. The objective of this paper is to introduce the effect of such a technology on entities, provide successful solution, and encourage future research in this area of interest.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call