download0 view680
twitter facebook

공공누리This item is licensed Korea Open Government License

Title
Self-similar properties of malicious teletraffic
Author(s)
이종숙
Publication Year
2012-11-01
Abstract
StudiesofmaliciousteletrafficrecordedinrealnetworksshouldhelptofindnewmethodsofprotectingInternetusersagainstvirusesandspam,makingweb
serversimmunetovirusattacksand/orprotectingthemagainstdataloss.Sincecomputervirusescanself-propagate,thenumberofcontaminatedpackets
canquicklygrowexponentially,leadingtonetworkcongestionorblockages.Similardamagingeffectscanbecausedbylargevolumesofspam,i.e.,by
unwanteddatacomingfromemails,electronicboardsandmessengers.Widelyvaryingestimatesofthecostsassociatedwithspamareavailableinthe
literature.Quantitativeanalysisofthestochasticpropertiesofmaliciousteletraffic,formedbyvirusesandspam,isstillanopenproblem.Inthispaperwe
investigatea4-yeardatasampleofrealmalicioustrafficrecordedbyJIRANSOFT’sSpamSniper,attheingressofthelocalnetworkofKoreanBibleUniversity
inSouthKorea,betweenMay2005andJuly2009.Ourmajorfindingsarethat:(i)real-timeinboundteletrafficcarryingvirusesandspamdataisstatistically
morecorrelated(self-similar)whencomparedtonormalteletraffic,and(ii)thedegreeofself-similaritymeasuredintermsoftheHurstparameterHand
obtainedfromdifferentestimationtechniquesisveryhigh.Sinceself-similarteletrafficrequiresmoreresourcesforagivenQoS,thissuggeststhatthecosts
ofsuchmaliciousteletrafficmaybeevenhigherthancurrentlyestimated.
Keyword
Self-similarprocess; maliciousteletraffic; computervirus; spam; Hurstparameter; estimationtechnique; futureInternet
Journal Title
Internationaljournalofcomputersystemsscience&engineering
Citation Volume
28
ISSN
0267-6192
Files in This Item:
There are no files associated with this item.
Appears in Collections:
7. KISTI 연구성과 > 학술지 발표논문
URI
https://repository.kisti.re.kr/handle/10580/14061
Export
RIS (EndNote)
XLS (Excel)
XML

Browse