Characterizing Intelligence Gathering and Control on an Edge Network
2011 (English)In: ACM Transactions on Internet Technology, ISSN 1533-5399, Vol. 11, no 1Article in journal (Refereed) Published
here is a continuous struggle for control of resources at every organization that is connected to the Internet. The local organization wishes to use its resources to achieve strategic goals. Some external entities seek direct control of these resources, for purposes such as spamming or launching denial-of-service attacks. Other external entities seek indirect control of assets (e. g., users, finances), but provide services in exchange for them. less thanbrgreater than less thanbrgreater thanUsing a year-long trace from an edge network, we examine what various external organizations know about one organization. We compare the types of information exposed by or to external organizations using either active (reconnaissance) or passive (surveillance) techniques. We also explore the direct and indirect control external entities have on local IT resources.
Place, publisher, year, edition, pages
ASSOC COMPUTING MACHINERY, 2 PENN PLAZA, STE 701, NEW YORK, NY 10121-0701 USA , 2011. Vol. 11, no 1
Measurement, Workload characterization
Engineering and Technology
IdentifiersURN: urn:nbn:se:liu:diva-69988DOI: 10.1145/1993083.1993085ISI: 000293162800002OAI: oai:DiVA.org:liu-69988DiVA: diva2:433997