The design of connectivity detect system by reuse of SPAM Mail

Download Report

Transcript The design of connectivity detect system by reuse of SPAM Mail

The design of connectivity
detect system by reuse of
SPAM Mail
Koji OKAMURA and Hiroaki Towata
Kyushu University
Our Idea
ASzzzz
ASxxyy
ASxxxx
ASxxzz
ASyyyy
Investigation for connectivity
are interesting.
Active method (ICMP Echo
etc) is not scaled.
ASyyzz
Our Idea
ASzzzz
ASxxyy
ASxxxx
ASxxzz
ASyyyy
Useless SPAM Mail may be
used for this!
ASyyzz
The Merit of using SPAM Mail
• TCP
• Re-transmission
• We can use what are necessary from so
huge SPAM Mail.
Example Analysis

Analysis by mail communication
 March
2007
 I plot the mail communication.
AS number
Day
Re-transmission
• If no SPAM Mail,
– Trouble of Connectivity
– Actually no SPAM
• Re-Transmission of e-mail help to analyze
this.
– E-mail has time stamp
– We can use what are necessary from so huge
SPAM Mail.
Example Analysis

The analysis by referring the time lag.

I plot the mail communication when the time lag is more than 1
hour.
AS number
Day
Future Works
• How to distinguish the trouble when we
don’t have SPAM.
• How to Display AS which may have
trouble.
– We should not know AS path topology.
• Study Behavior of re-transmission of
SPAM
• How many ASes will be covered by our
method?