%0 Conference Proceedings %T Finding and Analyzing Evil Cities on the Internet %+ Design and Analysis of Communication Systems (DACS) %A Polen, Matthijs %A Moura, Giovane %A Pras, Aiko %Z Part 1: Security Management %< avec comité de lecture %( Lecture Notes in Computer Science %B 5th Autonomous Infrastructure, Management and Security (AIMS) %C Nancy, France %Y Isabelle Chrisment %Y Alva Couch %Y Rémi Badonnel %Y Martin Waldburger %I Springer %3 Managing the Dynamics of Networks and Services %V LNCS-6734 %P 38-48 %8 2011-06-13 %D 2011 %R 10.1007/978-3-642-21484-4_4 %K Geographical Analysis %K Bad Neighborhoods %K Internet Geolocation %K IP Geolocation %K Spam %K Network Attacks %K Honeypots %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocation analysis is performed at country level. Since countries usually have many cities/towns of different sizes, it is expected that they behave differently when performing malicious activities. Therefore, in this paper we refine geolocation analysis to the city level. The idea is to find the most dangerous cities on the Internet and observe how they behave. This information can then be used by security analysts to improve their methods and tools. To perform this analysis, we have obtained and evaluated data from a real-world honeypot network of 125 hosts and from production e-mail servers. %G English %Z TC 6 %2 https://inria.hal.science/hal-01585870/document %2 https://inria.hal.science/hal-01585870/file/978-3-642-21484-4_4_Chapter.pdf %L hal-01585870 %U https://inria.hal.science/hal-01585870 %~ LORIA2 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC6 %~ IFIP-AIMS %~ IFIP-LNCS-6734