Identifying and Modeling Unwanted Traffic on the Internet by

Identifying and Modeling
Unwanted Traffic on the Internet
by
Paul Soto
Submitted to the Department of Electrical Engineering and Computer Science
in Partial Fulfillment of the Requirements for the Degree of
Master of Engineering in Electrical Engineering and Computer Science
at the
MASSACH'JSETTS INSTITUTE OF TECHNOLOGY
November)005
0 2005 Paul Soto. All rights reserved.
The author hereby grants to M.I.T. permission to reproduce and
distribute publicly paper and electronic copies of this thesis
and to grant others the right to do so.
Author
Ddkartment'of Ele'ctrica1 Engineering and Computer Science
November 4, 2005
Certified by_
a
Dr . Rhard Lippmann
-Te
Supervisor
Accepted by___
L' Arthur C. Smith
Chairman, Department Committee on Graduate Theses
MASACUSETSINS=F
OF TECHNOLOGY
AUG 142006
LIBRARIES
BARKER
2
Identifying and Modeling
Unwanted Traffic on the Internet
by
Paul Soto
Submitted to the
Department of Electrical Engineering and Computer Science
Nov. 4, 2005
In Partial Fulfillment of the Requirements for the Degree of
Master of Engineering in Electrical Engineering and Computer Science
ABSTRACT
Accurate models of Internet traffic are important for successful testing of devices that provide
network security. However, with the growth of the Internet, it has become increasingly difficult
to develop and maintain accurate traffic models. While much Internet traffic is legitimate,
productive communications between users and services, a significant portion of Internet traffic is
the result of unwanted messages sent to IP addresses without regard as to whether there is an
active host at that address. In an eftort to analyze unwanted traffic, tools were developed that
generate statistics and plots on captured unwanted traffic to unused IP addresses. These tools
were used on a four-day period of traffic received on an inactive IPv4 class A network address
space. Each class B subnet in this address space received an average of 7 million packets
corresponding to 21 packets per second. Analyses were performed on a range of class B and C
subnets with the intent of discovering the types of variability that are characteristic of unwanted
traffic. Traffic volume over time, number of scans, destinations ports, and traffic sources varied
substantially across class B and C subnets. The results of the analyses, along with tools to replay
traffic, allow security tools to be analyzed on the LARIAT network testbed. LARIAT is a realtime adaptable network testbed developed at Lincoln Laboratory that provides an Internet-like
environment in which to test network hardware and software.
Thesis Supervisor: Dr. Richard Lippmann
Title: Information Systems Technology Senior Staff, MIT Lincoln Laboratory
3
4
Acknowledgements
I would like to give my sincere thanks to Richard Lippmann. It was a privilege to have
worked under his guidance. I valued his thought-provoking questions, which always had me
wanting to go back to the dataset for further analysis.
I am deeply grateful to have worked with William Streilein. He has been an immense
help on everything throughout the project.
Both Rich and Bill have provided me with many suggestions on avenues of approach for
analyzing and understanding the dataset They also offered useful comments and numerous
corrections on the various drafts of this thesis, helping to make it clearer and more thorough.
I would like to thank Lee Rossey and Robert Cashman for their help. Among other
things, they have provided me with ideas on the causes behind the traffic, how the traffic can be
used in real-world systems, and what consumers would want to gather from analyzed traffic.
Many thanks go to Colleen Shannon at CAIDA for her insightful observations and
remarks during the frequent reviews of the traffic result.
I would like to thank CAIDA for providing the dataset used in this research and Lincoln
Laboratory for providing the resources to analyze the dataset
Finally, my biggest thanks goes to my family for their never-ending support and
encouragement.
I cannot stress enough how much I appreciated the help everyone had provided me.
Thank you.
5
6
Contents
1 IN TR O D U CT ION ....................................................................................................................................................13
2 N E T WO RK T E R M INO L O GY ............................................................................................................................15
2.1 CLASSES OF 1Pv4 A DDRESS RANGES ...............................................................................................................15
2.2 NETW ORK TELESCOPES .....................................................................................................................................15
2.3 BACKSCATTE .....................................................................................................................................................16
3 UNWANTED TRAFFIC CHARACTERIZATION .......................................................................................17
3.1 PREVIOUS W ORK ................................................................................................................................................17
3.2 TRAFFic D ATA U SED FOR A NALYSIS ..............................................................................................................18
3.3 M ETHODOLOGY ..................................................................................................................................................19
4 T O O L S D E V E L O PE D ...........................................................................................................................................21
4.1 M EASUREM ENTS ................................................................................................................................................21
4.2 TABLES .................................................................................................................................................................24
4.3 PLO TS ...................................................................................................................................................................25
5 CHARACTERISTICS OF UNWANTED TRAFFIC ....................................................................................29
5.1 GENERAL RESULTS ............................................................................................................................................29
5. 1. 1 The Na ture of Backscatter........................................................................................................................ 30
5.1.2 ,5nortalerts.................................................................................................................................................37
5.2 CLASS B RESULTS ..............................................................................................................................................38
5.2.1 Non-Un form Backscatter........................................................................................................................ 39
5.2.2 Non-U ni rm Primary Traffi c .................................................................................................................41
5.2.3 Banded Traffi c ...........................................................................................................................................42
5.2.4 Afulti-port TCP attacks ............................................................................................................................44
5.2.5 High Volum e ICMP Destination Unreachable.................................................................................... 45
5.2.6 1CA1fP Echo R equest Sw eep.....................................................................................................................46
5.2.7 Class B UD P Sw eep..................................................................................................................................47
5.2.8 Select Tar get High Volum e UD P Traffic ..............................................................................................48
5.3 CLASS C RESULTS ..............................................................................................................................................48
5.3. 1 Packet N oise ..............................................................................................................................................49
5.4 TARGETED IP A DDRESS RESULTS ....................................................................................................................52
5.4. 1 Diurnal Packet Pattern............................................................................................................................52
5.4.2 Sim ilar Temp oral Trqffic Patternacross Class B Subnets ................................................................ 53
5.4.3 Single Target P2P Primary Trqffic ........................................................................................................56
6 C O N CL U SIO N .........................................................................................................................................................59
R E FE R E N C E S .............................................................................................................................................................61
A PPE N D IX A ...............................................................................................................................................................63
A . I - X X. 1.0.0/ 16 .....................................................................................................................................................65
A .2 - XX .49.0.0/16 ...................................................................................................................................................69
A.3 - XX .81.0.0/16 ...................................................................................................................................................73
A.4 - XX . 128.0.0/16 ................................................................................................................................................. 77
A .5 - X X . 168.0.0/16 ................................................................................................................................................. 81
A .6 - XX .204.0.0/16 ................................................................................................................................................. 85
A.7 - XX .229.0.0/16 ................................................................................................................................................. 89
A .8 - XX .243.0.0/16 ................................................................................................................................................. 93
A .9 - XX .244.0.0/16 ................................................................................................................................................. 97
A . 10 - XX .248.0.0/16 ............................................................................................................................................. 101
A. I I - XX .2 51.0.0/16 ............................................................................................................................................. 105
A PPENDIX B ............................................................................................................................................................. 109
B. I - XX . 5 5.14 5.0/24 ............................................................................................................................................. III
B.2 - X X. 128.8.0/24 ............................................................................................................................................... 115
B.3 - X X .198.188.0/24 ........................................................................................................................................... 119
BA - XX .209.239.0/24 ........................................................................................................................................... 123
B.5 - X X.218.68.0/24 ............................................................................................................................................. 127
B.6 - X X .220.236.0/24 ........................................................................................................................................... 131
B.7 - X X .226.255.0/24 ........................................................................................................................................... 135
B.8 - XX .239.255.0/24 ........................................................................................................................................... 139
B.9 - X X.248.246.0/24 ........................................................................................................................................... 143
List of Figures
Figure 1- The total amount of TCP, UDP, and [CMP packets received by each class B subnet...............30
31
Figure 2 - The three significant TCP packet types received on each class B subnet ....................................
32
Figure 3 - The remaining TCP packet types received on each class B subnet..............................................
33
Figure 4 - Backscatter received on each class B subnet......................................................................................
33
Figure 5 - Primary and backscatter traffic amounts destined to the class B subnets......................................
Figure 6 - The amount of RST/ACKs compared to SYN/ACKs that each class B subnet received...............34
Figure 7 - The amount of ACKs compared to SYN/ACKs that each class B subnet received................... 35
Figure 8 - Primary and backscatter amounts for each class B subnet as a function of destination ports ....... 36
Figure 9 - Primary and backscatter amounts for each class B subnet as a function of IP sources............... 36
38
Figure 10 - Snort alerts in 10 1B ..................................................................................................................................
40
Figure 11 - Traffic destined to 204B, where TCP traffic is non-uniform.......................................................
40
Figure 12 - Destination ports for 204B, where high ports receive a distinct pattern of traffic .....................
Figure 13 - A non-uniform distribution of packets received by each class C subnet in 204B....................41
Figure 14 - A non-uniform distribution of packets received by each class C subnet in 192B ..................... 42
43
Figure 15 - Vertical bands of traffic in the 49B destination IP address plot ...................................................
Figure 16 - Four ports on 243B received packets at the same time and with the same duration ................ 44
Figure 17 - Snort alerts for I B, where ICMP destination unreachable is the highest volume alert ............ 45
Figure 18 - An ICMP sweep going across 81 B starting at +72 hours and ending at +84 hours ................. 46
Figure 19 - Traffic destined to 168B, where vertical UDP sweeps visually outnumber the TCP sweeps.....47
49
Figure 20 - Total backscatter in the low and mid volume class C subnets.....................................................
50
Figure 21 - Total amount of traffic received by each IP address within 55.145C.........................................
51
Figure 22 - A plot of every packet received by each IP address in 55.145C...................................................
Figure 23 - A plot of every packet received by each IP address in 198.188C ................................................
51
Figure 24 - Diurnal packet per hour versus time plot for 109.116C.................................................................
53
54
Figure 25 - Packet per hour plot for 5.67C in which 210.245.191.90 sent little traffic .................................
Figure 26 - Packet per hour plot for 101.204C in which 210.245.191.90 sent a high volume of traffic ........ 55
55
Figure 27 - Packet count from the top 18 IP sources, sent to 4 IP addresses ..................................................
Figure 28 - Total backscatter received on the 23 IP addresses, based on the rightmost octet..................... 56
57
Figure 29 - Packet per hour plot of P2P traffic sent to xx.218.68.212 ...........................................................
9
10
List of Tables
Table I - Breakdown of packet types in the dataset ...........................................................................................
Table 2 - The traffic breakdown, by port, for the 5 IP addresses that had a diurnal packet pattern ...........
II
29
53
12
Chapter 1
Introduction
Accurate models of Internet traffic are required to design and test devices that process,
analyze, and act upon this traffic. Accurate estimates of traffic rates enable a manufacturer to
design and build forwarding devices, such as routers and switches, which will keep up and not
collapse under typical activity. Similarly, a commercial website designed in anticipation of a
realistic number of requests per day stands a better chance delivering services to customers than
one that has not been designed with these factors in mind. In addition to traffic rates, traffic
complexity plays an important role in testing security devices. Firewalls, intrusion detection
systems, and other security devices must be resilient to harmless traffic patterns that generate
false alarms.
As the Internet has grown, the quantity and variety of Internet traffic has increased an
enormous rate [1]. One might expect that such an increase in traffic is the result of productive
communications between a growing number of users and new web pages and service applications
now available on the Internet. While this is true to a large degree, it is also true that a significant
amount of traffic seen on the Internet is destined to hosts that either did not request or do not
expect the traffic. The increasing quantity and variety of this unrequested and unexpected traffic
makes it difficult to develop realistic models of Internet traffic [1]. For the discussion and
analysis that follows, unrequested and unexpected traffic is referred to as unwanted traffic (UT).
UT is generally composed of malicious traffic sent from worms, viruses, probes, and spyware, but
can also consist of traffic sent from misconfigured routers or applications, and traffic corrupted
by noise or interference on network transmission lines [2,3]. While there has been a large amount
of study on the volume and variety of productive traffic on the Internet, little work has been done
to understand and classify UT on the Internet.
The goal of this project is to gain an understanding of key characteristics of UT through
the use of exploratory data analysis. Toward this end, software tools were developed that
13
describe UT through plots, tables, and short summaries. These representations of UT
demonstrate that UT is complex and highly variable across subnets and time, and thus hard to
model. Instead of modeling UT, I show how it can be replayed on a network testbed, for device
testing. In addition, I attempt to classify a wide range of UT seen and catalog the attacks
commonly seen in UT.
This project is motivated by the need to develop a testing environment that includes
realistic UT. The analyses in this project will allow for the development of systems that model
the Internet with greater accuracy. One system that models and generates Internet traffic is the
Lincoln Adaptable Real-time Information Assurance Testbed (LARIAT) [4]. LARIAT generates
Internet traffic that allows hardware and software security tools, such as, intrusion detection
systems (IDS's) and firewalls, to be tested under reliable, repeatable realworld conditions
without being exposed to real Internet traffic. This is accomplished using a network of computers
that replicate Internet sites and model the various behaviors of users, such as browsing web
pages, writing documents, and sending and receiving email. While this system does a good job at
modeling typical user behavior and interaction with server machines, the generated traffic does
not contain UT, as described above. The analyses performed here make it possible to select
portions of UT to replay on LARIAT. This traffic replay will contain realistic UT traffic
characteristics previously unavailable on LARIAT.
Another motivation of this project is to enhance the current understanding of Internet
traffic. Organizations such as the Cooperative Association for Internet Data Analysis, CAIDA,
strive to "provide enhanced insight into the function of Internet infrastructure worldwide" [5].
Developing tools that enable the identification and analysis of UT, now and in the future, will
allow for the observation of trends in this area of traffic.
The rest of this thesis is laid out as follows. Chapter 2 explains the terminology used in
the paper. Chapter 3 discusses previous work done in related areas and the traffic data used in the
analysis. The methodology and analysis procedures are presented here. Chapter 4 presents the
details of how the measurements, tables, and plots of the exploratory data analysis tools work and
how their output should be interpreted. Chapter 5 discusses the results of the analyses and the
various phenomena observed in UT. Chapter 6 presents a summary of the work and considers
future directions.
14
Chapter 2
Network Terminology
This chapter defines terminology used to discuss and analyze unwanted traffic.
2.1 Classes of IPv4 Address Ranges
A class A network is a contiguous range of 224 (16,777,216) IPv4 addresses, where the
leading octet of the IP address is any constant between 1 and 126, inclusive. Each of the other
three octets can range from 0 to 255, inclusive. The CIDR equivalent subnet mask for a class A
network is /8. Class B subnets refer to an IP address range where the first two leading octets of
the IP address are constant (ex. 1.2.0.0/16). There are 216 (65,536) IP addresses within a class B
subnet. Similarly, class C subnets refer to an IP address range where the first three leading octets
of the IP address are constant (ex. 1.2.3.0/24). There are 28 (256) IP addresses within a class C
subnet.
2.2 Network Telescopes
A network telescope [6,7] is a routed but unused IP address space. An unused IP address
space is a range of IP addresses that contains no active hosts generating or replying to traffic.
Sources that send traffic to a network telescope have no reason to believe that there are active
hosts to respond to the traffic, and so there is no legitimate purpose in sending traffic to a network
telescope. A network telescope can be of any size, with larger network telescopes being more
likely to observe packets sooner from Internet events, such as worms spreading. Network
15
telescopes offer a convenient way of observing Internet-wide events, as there are no outbound
packets, which would interfere with the composition of the traffic from these events.
2.3 Backscatter
Backscatter is defined as traffic received from victims that are responding to malicious
denial-of-service (DOS) attacks. Since backscatter is response traffic, the packet types that
backscatter can consist of are limited to TCP SYN/ACKs, TCP RST/ACKs, and certain ICMP
types like Echo Reply and Destination Unreachable. Backscatter arrives at the unused address
space because the source addresses of the attack traffic are spoofed. If the source address is
spoofed randomly from the entire IPv4 address space, the probability of a backscatter packet
reaching a network telescope is n/23 , where n is the size of the network teLscope.
16
Chapter 3
Unwanted Traffic Characterization
This chapter discusses some of the previous work performed in relation to unwanted
traffic. The data used in the analyses and the methodology is also explained.
3.1 Previous Work
Only recently have researchers begun to analyze unwanted traffic. UT can be categorized
into primary and secondary unwanted traffic. Primary UT is typically an initiating packet, such
as a connection request originating from an attacker or misconfigured host. These packets are
commonly TCP SYNs, UDP, or ICMP Echo Request packets. Secondary UT is response traffic
solicited by primary traffic, where the source IP address is spoofed. These packets are commonly
TCP SYN/ACKs, TCP RST/ACKs, or ICMP Destination Unreachable. Moore et al. [8] have
looked at secondary unwanted traffic, referred to as backscatter, while Pang et al. [9] have looked
at primary unwanted traffic.
The work of Moore et al. [8], presents an in-depth analysis of backscatter traffic as
received by a network telescope. Through their analysis of three weeks worth of traffic from
February 2001, on a class A network telescope, the authors derive an estimate of the composition
of backscatter and the duration of denial-of-service attacks seen on the Internet. They observed
approximately 71% of the backscatter packets to be ICMP packets (Destination Unreachable and
TTL exceeded), 21% to be TCP RST/ACK packets, and 7% to be TCP SYN/ACK and TCP RST
packets. They also observed that 90% of the attacks lasted less than an hour. Backscatter traffic
represents a significant portion of unwanted traffic and will be a component of the data replayed
through the current research. The work of Moore et al. did not look at primary unwanted traffic,
which will be the other component of the replayed data.
17
Pang et al [9] present a second research effort related to the analysis of unwanted traffic.
In a fashion similar to the work of Moore et al., the researchers capture and analyze traffic
received at various unused IP address spaces. Denoting the unwanted traffic received as
'background radiation,' Pang et al. develop response agents that interact with primary traffic
sources. By engaging the sources of the primary traffic in communication, the researchers are
able to recognize specific attack types and develop detailed descriptions of the composition of
this component of unwanted traffic. Before developing the responding agents to any packets,
they collected a week of traffic on 10 contiguous class B subnets, from April 28 to May 5, 2004,
and a week of traffic on a class A network with 1/10 sampling, from March 11 to March 18,
2004. On the 10 class B subnets, the traffic was composed of 56.5% TCP, 39.6% ICMP, and
3.8% UDP. The top 3 TCP ports targeted, based on packet count, were 135, 445, and 139. These
three ports accounted for over 60% of the TCP SYN packets. On the class A network, the traffic
was comprised of 88.5% TCP, 0.3% ICMP, and 11.3% UDP packets. In both of these datasets,
99% of the TCP packets were TCP SYNs. Except for the ICMP packets in the 10 class B subnets
(99.9% of which were ICMP Echo Request), there were no temporal patterns observed in the
packet rate.
3.2 Traffic Data Used for Analysis
One of the goals of this project was to analyze unwanted traffic, including both primary
and backscatter UT. UT was defined as unrequested and unexpected traffic. Care was taken to
ensure that the dataset selected for analysis did not contain Internet traffic that was not UT. For
this reason, the dataset chosen was derived from a network telescope. Because these sources sent
traffic to a network telescope, which, by definition, have no active hosts, this traffic was
unrequested and unexpected, hence, unwanted traffic.
The dataset used was provided by CAIDA. It represents traffic destined for a class A
network telescope. The dataset was collected over a period of 93 hours starting from 2:30 PM
EST on Monday February 28, 2005 and ending at 11:30 AM EST on Friday, March 4, 2005. In
total, there were 160GB of trace files.
There were certain filtering requirements on the traffic data. Although the address range
of the network telescope was unused, it was not completely empty; there existed hosts on this
network that were the source of data. While none of the machines in the network telescope
communicated to the Internet, certain machines communicated to other machines within the class
18
A network. The class B subnets in the dataset that contained any machine either transmitting or
receiving internal traffic within the class A subnet were filtered. This left 123 class B subnets
free of any type of data contamination.
3.3 Methodology
The first analysis step was to break the data up into manageable segments and select the
segments to analyze. The UT to be incorporated into LARIAT will be played back onto class B
or C subnets, and so we analyzed the data as such. There were 123 class B and 31,488 class C
subnets available for analysis. Unfortunately, performing a thorough analysis on this many
subnets would have meant going through hundreds of thousands of plots and charts. As this
would have be too time consuming, a quick analysis was performed on a measurement of interest
to the users of LARIAT, namely, total traffic destined to a subnet. The class B and C subnets
were divided into those at the top, middle, and bottom of a sorted total packet count list. Then 30
subnets were thoroughly analyzed from each group, 180 subnets in total.
The second step was to choose what information to extract from the chosen subnets. The
set of measurements chosen are representative of some of the basic characteristics of network
traffic. These measurements include traffic protocol composition, destinations addresses and
ports hit, the number of source addresses sending traffic to the subnet, and the number of alerts
and scans seen in the traffic. These measurements were analyzed with respect to all the traffic,
the top 90% of traffic, and top 50% of traffic. The notion of 'top X% of traffic' is different with
each measurement, and is explained in detail in chapter 4.2.
With all these measurements, one large table was created, where each row represented a
different subnet and each column represented a measurement. The table was sorted according to
different measurements, and groupings of subnets based on similar measurements were
extrapolated.
The data revealed that class B subnets are hard to cluster based on their measurements.
This is attributed to the relative low number of class B subnets available and the different
combinations of variability found with 256 class C subnets composing a class B subnet.
However, some patterns were identified as targeted specifically to a class B subnet.
The data revealed that class C subnets are easier to cluster based on their measurements.
For example, many subnets have low traffic volume and share similar attributes in terms of
number of sources sending traffic and number of unique ports destined. The ability to cluster
19
these subnets will allow users to test security tools with a fraction of the class C subnets and yet
achieve a wide coverage of the behaviors observed.
20
Chapter 4
Tools Developed
Software tools were developed that describe UT through measurements, tables, and plots.
These tools were developed using the CoralReef [13] software suite, Dislin plotting library [14],
and custom Perl scripts. This chapter describes traffic measurements used in the exploratory data
analysis and how to interpret these measurements.
4.1 Measurements
The following is a description of each measurement taken on the subnets analyzed. In
certain measurements, three values represent the measurement with respect to the top 100%, top
90%, and top 50% of traffic. The precise definition for 'top X% of traffic' differs depending on
the measurement, and is defined explicitly in each of the applicable measurements.
1. Total packet and byte count
The totalpacket and byte count is a measure of the volume of traffic seen on a
subnet. This measurement is used as an initial classifier of subnets, where we sorted
the subnets by the total packet count, and then analyzed the subnets from the top,
middle, and bottom of this list.
2.
Average packet and byte rate
The averagepacket and byte rate for a subnet is the totalpacket and byte count
divided by the duration, in seconds, of the dataset.
3.
Peak packet and byte rate
21
The peakpacket and byte rate is the highest count of packets and bytes received by
the subnet in any one-second interval. This value represents the amount of traffic a
replay system must be able to handle to avoid dropping packets.
4.
Traffic composition in terms of percentage of TCP, UDP, and ICMP
The traffic composition indicates the percentage of TCP, UDP, and ICMP traffic
reaching the subnet. This is calculated by taking separate counts of TCP, UDP, and
ICMP packets and dividing by the total packet count for the subnet. Occasionally,
these three counts will not add up to 100%, since subnets can receive traffic protocols
other than TCP, UDP, and ICMP. However, no other traffic protocol contributed
more than 0.1% of the traffic, in any of the subnets analyzed.
5. TCP packet type breakdown
TCP packets are further broken down into counts of TCP SYN, SYN/ACK, ACK,
RST, RST/ACK, and OTHER types. TCP OTHER packets are any TCP packets
where the TCP flags do not fall into any of the previously mentioned TCP types.
6. Number of unique Snort alerts
The number of unique Snort alerts indicates how many different types of suspicious
activities are hitting a subnet based on the output from Snort [10]. Snort is a widely
deployed intrusion detection system (IDS) that uses a rule -based language to detect
potentially malicious packets. Snort was chosen as it represents a popular IDS used
in industry.
7.
Total number of Snort alerts
The total number ofSnort alerts is the sum of all the alerts, as seen by Snort,
triggered by the packets received on the subnet.
8.
Total number of scans and number of packets composing the scans
This measurement indicates the total number of scans detected by Snort along with
the sum of the packet count of each scan. In the analysis, a scan was defined as
containing at least a 1/16 packet count in relation to the number of IP addresses of the
subnet. In other words, a scan in a class C subnet, which contains 256 IP addresses,
is comprised of at least 16 packets. A scan in a class B subnet, which contains
65,536 IP addresses, is comprised of at least 4,096 packets. Although somewhat
arbitrary, 1/16 is the smallest fraction of packets pertaining to a scan that one can
easily notice in the corresponding destinationIP address index versus time plot.
9.
Total number of unique destination ports
22
The total number of unique destinationports seen in the traffic help distinguish the
level of focus of probes and attacks in the traffic. In the case of ICMP traffic, the
ICMP type is treated as unique destination ports (ex. ICMP Destination Unreachable
and ICMP TTL Exceeded would be two unique destination ports separate from any
TCP or UDP port). The top X% in this measurement is calculated by sorting the total
number of packets sent to each TCP port, UDP port, and ICMP type. The sum up the
number of packets in this list, in descending order, is taken until the packet count is at
least X% of the total packet count. A very low number of ports in the top X% mean
that most of the traffic was focused on exploiting a small set of vulnerabilities. A
high number in the top X% might mean that there was a lot of backscatter traffic
destined for random ports.
10. Number of unique source IP hosts
This measurement represents the number of unique IP hosts (IP addresses) sending
traffic to the subnet. The maximum number of possible hosts in the IP address space
is approximately 4 billion. The top X% is taken by sorting a list of source IP
addresses, in descending order, by the total number of packets sent to this subnet.
The packets sent by each IP address is added until the total contribution of packets
sent by these source IP hosts is at least X% of the total number of packets sent. A
high number of unique source IP hosts in the top X% means there is a relatively large
number of IP addresses sending packets to this subnet. This signifies a distributed
attack or random traffic. A low number of unique source IP hosts in the top X% can
signify an attack from few sources, or backscatter arriving on the subnet due to a
spoofed source IP address in the original attack packet.
I1. Average packet and byte count per source
The averagepacket and byte count per source is calculated by dividing the total
packet and byte count by the number of unique source IP hosts sending traffic to the
subnet. The top X% is calculated by dividing the total packet and byte count by the
top X% value for the number of unique source IP hosts.
12. Number of unique destination IP hosts
This measurement is similar to the number of unique source IP hosts measurement,
except that the count is of the number of unique IP addresses inside the subnet that
received traffic. The maximum number of possible destination hosts is 65,536 in a
class B subnet and 256 in a class C subnet. Given enough time, every host in a class
B or C subnet is expected to receive at least one packet. The top X% is calculated by
23
sorting the list of destination IP addresses by total packets received. The packets
received by each destination IP address is added, in descending order, until at least
X% of the total traffic received on the subnet is accounted for. A high number of
destination IP addresses in the top X% signifies that traffic is randomly distributed
across the subnet. A low number of destination IP addresses in the top X% signifies
that an attack is being directed to a specific machines, or that these machines are
receiving backscatter.
13. Average packet and byte count per destination
The averagepacket and byte count per destination is calculated by dividing the total
packet and byte count by the number of unique destination IP addresses receiving
traffic. The top X% is calculated by dividing the total packet and byte count by the
top X% value for the number of unique destination IP addresses.
4.2 Tables
Several tables were developed as part of the analysis. Although only the top three values
for each table per subnet are shown, the software tools developed create complete tables that
account for all the traffic. The following is a description of the tables.
1. Protocol type and port destination, across TCP, UDP, and ICMP
This table shows the total packet and byte counts and percentages destined to a
unique protocol port. ICMP packets are included in this table but the ICMP type is
used in place of the destination port. This table is sorted by packet count. Table Al4 in Appendix A is an example of this table. In this example, ICMP does not show up
because no ICMP type accounted for more than 12.9% of the packets.
2.
Destination IP addresses
This table contains the total count and percentage of traffic received by each IP
address in the subnet, sorted by descending packet count. The first octet of each IP
address in the table has been replaced by 'xx' to mask the class A network from
which this dataset was collected. Table A1-5 in Appendix A is an example of this
table.
3.
Source IP addresses
24
Similar to the destinationIP addressestable, this table shows the count and
percentage of traffic each source IP address sent to the subnet. This table is sorted by
packet count. Table A 1-6 in Appendix A is an example of this table.
4. Snort alerts
This table displays each Snort alert triggered by the traffic along with a count of the
number of times the alert was triggered and a percentage of the total alert count.
Table A1-7 in Appendix A is an example of this table.
4.3 Plots
There are six plots generated for each of the class B and C subnets analyzed. The
following is a description of the types of plots generated for each subnet analyzed. Two of the
plots have minor differences between the class B and C subnet versions, and are distinguished as
different plot types in the list below.
1.
Packets per hour versus time
In the packets per hour versus time plots the X-axis represents time measured in
hours from the start of the dataset The Y-axis denotes the total packets received on
the subnet per one-hour time interval. The horizontal line in the plot denotes the
average packets per hour received on the subnet, measured over the course of the
whole dataset. The Y-axis scale was fixed at 300,000 packets per hour for all class B
subnet plots, and 14,000 packets per hour for al but one class C subnet plot. Figure
A l-I in Appendix A is an example of this plot.
2.
Bytes per hour versus time
The bytes per hour versus time plot is similar to the packet per hour versus time plot,
except the data here is in terms of bytes. The Y-axis scale was fixed at 15,000,000
bytes per hour for all class B subnet plots, and 700,000 bytes per hour for all but one
class C subnet plot. Figure A1-2 in Appendix A is an example of this plot.
3.
Destination IP address index versus time for class C subnets
In this plot, the X-axis shows time measured in hours. The Y-axis shows the decimal
value of the rightmost IP address octet. In other words, all IP addresses in the class C
subnet, 256 IP addresses, are represented on the Y-axis. Every point in the plot
represents a packet sent at a specific time to a specific IP address. Solid horizontal
25
lines form when one machine constantly received packets for a period of time.
Vertical lines represent a range of IP addresses that received packets in a very small
time interval. Although one can see horizontal and vertical lines in the plot, in reality
the plot is solely composed of points. These points are close enough together that
they form solid lines. All of the packets destined to the class C subnet were plotted.
Figure B 1-3 in Appendix B is an example of this plot. Although there are vertical
bars that have the same thickness, such as the ones at +25 and +31, the amount of
traffic within each bar cannot be assumed to be similar, as there can be a quick
succession of packets which show up as a single point.
4. Destination IP address index versus time for class B subnets
This plot is similar to the destinationIP address index versus time for class C subnets
plot, except that the Y-axis shows the decimal value of the two rightmost IP address
octets. Every single IP address in the class B subnet, 65,536 IP addresses, is
represented on the Y-axis. Since this plot contains a much greater range of IP
addresses, there are diagonal lines, in addition to horizontal and vertical lines. The
diagonal lines are similar to the vertical lines, denoting a range of IP addresses that
received packets over the course of time. Another difference in this plot arises from
the increased magnitude of packets destined to class B subnets. Although every
packet was represented with a point in the class C plots, attempting to plot all the
packets received by a class B subnet would yield an unreadable solid box in the plot
window. To develop a readable plot for the class B subnet, every
10
0
th
point (the
title of the plot contains the phrase 'skip=100' to represent this) is plotted While
making the plot readable, plotting every
10
0
th
point can lead to loss of significant
events in the plot, such as scans. To provide some degree of confidence that there
was no major loss of data, the same subnet was plotted various times, shifting the
first point used each time. A shift in the first point causes a shift in all the points
used that follow. I was able to confirm that the multiple plots of the same subnet
were similar by visually observing that the same horizontal, vertical, and diagonal
lines were visible in each plot. Figure A1-3 in Appendix A is an example of this plot.
5.
Destination port versus time
In the destinationport versus time plot, the X-axis represents time, in hours. The Yaxis is a log scale of the port numbers a packet can be destined for, between I and
65,535. Each point is plotted as a unique color and symbol depending on the packet
type. The packet types shown in this plot are UDP packets and TCP (SYN,
26
SYN/ACK, ACK, RST, RST/ACK, and OTHER) packets. ICMP packets are not
shown, as these packets are not destined to ports. The destinationport versus time
plot allows one to discern which services are receiving packets and if multiple
services are being attacked at the same time with similar duration and intensity.
Figure A 1-4 in Appendix A is an example of this plot. The points are plotted in
descending order of packet type as based on the list in the legend. This means that
packet types at the bottom of the list, such as RST/ACKs, will obscure packet types
preceding them, such as UDP.
6. Total packets to each IP address for class C subnets
In this plot, the X-axis represents each of the individual 256 IP addresses that
compose the class C subnet. The Y-axis shows the total number of packets received
over the course of the 93 hours in the dataset. This plot allows one to observe any
bias towards a single IP address or a cluster of IP addresses, in terms of packet
destination. Figure B 1-5 in Appendix B is an example of this plot. This plot shows a
bias towards the lower half of the IP range, and that certain IP addresses such as
xx.55.145.202 received eight times as many packets as the average. Figure B2-5 in
Appendix B is another example of this plot where xx. 128.8.14 received so many
packets that the quantities received by the other IP addresses do not show up because
of the magnitude of the Y-axis scale.
7.
Total packets in each class C subnet for class B subnets
This plot is similar to the totalpackets to each IP addressfbrclass C subnets plot
except that the X-axis represents each of the 256 class C subnets that compose the
class B subnets. For example, on the xx.1.0.0/16 class B subnet plot, the Y-value
corresponding to 98 on the X-axis would represent the total packets received by the
class C subnet represented by xx. 1.98.0/24. Figure Al-5 in Appendix A is an
example of this plot.
8.
Snort alerts versus time
In the Snort alerts versus time plot, the X-axis represents time measured in hours.
The Y-axis on this plot lists each of the Snort alerts seen over the course of the 93
hours, in ascending order, by alert count, where the alert count is shown in
parenthesis. Each point on the plot marks a time when a single alert was triggered.
Since some of the high-count alerts would show up as solid bars, the point is colorcoded to signify the number of alerts seen in that one-hour period. Note that the plot
will show a unique point for every single alert, so in a one-hour period, all the points
27
will be the same color, and the number of alerts in that whole one-hour period is
equivalent to the associated color in the legend. Figure B 1-6 in Appendix B is an
example of this plot.
28
Chapter 5
Characteristics of Unwanted Traffic
This chapter discusses the characteristics of the unwanted traffic arriving on the class A
network. The first section explains the general results observed across the whole class A
network. Sections 5.2 and 5.3 delve into the phenomena observed within the class B and C
subnets. Section 5.4 describes high volume traffic patterns targeted to specific IP addresses.
5.1 General Results
The 123 class B subnets in the dataset received 842 million packets over the course of 93
hours. The composition of the traffic seen in the dataset is shown in Table 1. TCP SYNs, UDP,
and ICMP Echo Request packets (comprising 90% of the ICMP packets), are considered types of
primary UT and made up 82% of the traffic, while the backscatter
Packet Type
is composed of the remaining 18% of the traffic.
The traffic breakdown differs significantly from both
Moore's and Pang's results, and hint at how much the distribution
of traffic across protocols can differ. Moore's work, which looked
at backscatter traffic in 2001, found a two-to-one ratio of ICMP
destination unreachable packets to TCP RST/ACKs and TCP
TCP SYN
% of
Total
Packets
59
TCP SYN/ACK
9
TCP RST/ACK
8
I
TCP OTHER
20
UDP
ICMP
3
Table 1 - Breakdown of packet
types in the dataset.
SYN/ACKs put together, whereas our dataset had a radically
smaller ratio of nearly one-to-fifty. Pang's 2004 study found 11% of the packets in a class A
network to be UDP and 88% of the packets to be TCP SYNs. Their class A network received
traffic at a rate of 147 packets per destination IP address per day. In our class A network 20% of
the packets were UDP and 59% of the packets were TCP SYNs. The traffic rate was 27 packets
per destination IP address per day.
29
..................
.....................
...................
On average, each class B subnet received 6.8 million packets, with 5.2 million packets on
the low end, 9.8 million packets on the high end, and two outliers with 12.0 million packets.
Figure 1 shows the amount of TCP, UDP, and ICMP packets received by each class B subnet.
The amount of ICMP and UDP traffic received at each class B subnet was consistent; however,
the amount of TCP traffic varied significantly between the lower and upper half of the class A
network. The amount of TCP traffic decreased by approximately 20%, or 1.2 million packets,
between the lower half of the class A network (from xx.0.0.0/16 to xx.127.0.0/16, there were 55
class B subnets analyzed) and the upper half of the class A network (from xx.128.0.0/16 to
xx.255.0.0/16, there were 68 class B subnets analyzed). This decrease was caused by the
unexpected distribution of backscatter traffic.
Total TCP, UDP, and
ICMP packets in each class B subnet
12 -
TCP
OUDP
10
A lCMP
6
-2
0
0
0
32
64
96
128
160
192
224
Class B subnet index
Figure 1 - The total amount of TCP, UDP, and TCMP packets received by each class B subnet.
5.1.1 The Nature of Backscatter
As explained in section 2.3, backscatter traffic is response traffic received from machines
replying to spoofed source addresses. It is typically assumed that the source address for the
packet causing backscatter is randomly spoofed, and chosen uniformly from the IPv4 address
space. Assuming uniformity in spoofed addresses allows one to calculate the amount of
backscatter on the Internet, based on the backscatter seen at a network telescope. Two wellknown exceptions to the randomness and uniformity of spoofed source addresses are reflector
attacks and broken pseudo-random number generators (PRNGs).
30
.
....
....
.....
-.......................
........
................
-...............
.........
Reflector attacks are distributed denial-of-service (DDOS) attacks in which backscatter
arrives from multiple machines to a single fixed spoofed source address [11]. The backscatter
from this type of attack is meant to disrupt a single machine. This type of attack is recognizable
since only a few hosts in a class A network would receive a large amount of backscatter traffic.
PRNGs are used to generate random numbers for IP addresses. A correctly implemented
PRNG would generate a uniform distribution of random numbers. Broken PRNGs generate
uneven distribution of random numbers. When a broken PRNG generates spoofed source or
destination IP addresses, packets will arrive to certain addresses at a higher frequency than other
addresses, and some addresses might never be generated.
Closer examination of the TCP traffic, as shown in Figure 2, illustrates that the drop in
traffic was due to a decrease in TCP SYN/ACK and RST/ACK packets. The decrease in these
two backscatter packet types at different regions of the class A network indicates that the spoofed
addresses for backscatter was not selected uniformly from the IPv4 address space. The other
types of TCP packets, which contributed to backscatter but comprised less than 1% of the TCP
packets, are shown in Figure 3. It is interesting to note, in Figure 3, that the amount of TCP
ACKs dropped precipitously in the upper half of the class A network.
Total TCP type packets in each class B subnet
SYN
6-
ASYN/ACK
5
RST/ACK
3
-2
1-1
0
0
32
64
96
128
160
192
224
Class B subnet index
Figure 2 - The three significant TCP packet types received on each class B subnet.
31
. ....
.....
..
.........
.....
..................
......
. .................
Total TCP type packets in each class B subnet
0.16
+ ACK
0.14
>
0 0.12
RST
A OTHER
E 0.10
S0.06
.
00
0.0
0 .02
0.00
0.
32
64
96
128
160
192
224
Class B subnet index
Figure 3 - The remaining TCP packet types received on each class B subnet.
The differences in backscatter between the two halves of the class A network suggest that
the backscatter addresses within the class A network were not chosen uniformly. Figure 4, which
shows the total amount of backscatter received on each of the class B subnets, reveals that even
within the two halves of the class A network, backscatter was not destined uniformly. There were
several 'fixed' quantities of backscatter received at different class B subnets throughout both
halves of the class A network Though not literally fixed, the amounts of backscatter received fall
into identified clusters with very small standard deviations. From the 123 class B subnets
analyzed, there were six clusters of total backscatter, shown in Figure 5 (ignoring 2 outliers at 6
million). Figure 5 was created by plotting the total backscatter on each of the class B subnets,
where the subnets are sorted by ascending backscatter quantities. Similarly, the total primary
traffic was sorted for all the class B subnets and plotted in Figure 5. Note that the X-axis values
do not pertain to any specific class B subnet as the primary and backscatter packet totals were
sorted independently and plotted on the same graph for easier comparison. The six clusters of
backscatter in Figure 5 form at 620,000, 1.1 million, 1.6 million, 1.9 million, 2.4 million, and 2.9
million packets. These clusters represent a set of impulses in backscatter, concentrated at six
values. Primary traffic, on the other hand, has a continuous nearly straight-line curve, which
indicates the class B subnets received a uniform distribution of packets between 4.5 and 6
million.
32
Total backscatter in each class B subnet
U)
C:
0
CL
L)
CD)
0.
0
96
64
32
160
128
224
192
Class B subnet index
Figure 4 - Backscatter received on each class B subnet.
Primary and backscatter traffic continuity
Uh
0
8-
+ Primary
7-
X Backscatter
6
5
4-
CU)
0L
0
3
2
1
0
0
20
40
80
60
100
120
Unordered class B index
Figure 5 - Primary and backscatter traffic amounts destined to the class B subnets. Both plots sorted
independently to illustrate differences in uniformity.
The two main contributors of backscatter were TCP SYN/ACK and TCP RST/ACK
packets. SYN/ACK and RST/ACK each accounted for approximately half of the backscatter.
SYN/ACKs are sent when a TCP connection attempt is successful. RST/ACKs are sent when the
TCP connection is unsuccessful due to an active computer not receiving packets on a specified
port. In effect, these two packet types compliment each other, and you would not expect to
receive one if you have received the other. However, in the dataset, there was an extremely high
33
correlation, shown in Figure 6, between the number of SYN/ACK packets and the number of
RST/ACK packets each class B subnet received. The first three clusters on the left half of Figure
6 correspond to the upper half of the class A subnet and have a ratio of between one and two
RST/ACK packets for every one SYN/ACK. The second three clusters, on the right half of
Figure 6, correspond to the lower half of the class A subnet and have a ratio of between one and
two SYN/ACK packets for every two RST/ACKs. Similarly, there is a very strong correlation
between the number of SYN/ACK packets and the number or ACK packets, shown in Figure 7.
Total number of SYN/ACK packets versus RST/ACK packets for all 123 class B subnets
1.5
1.25
1
C.)
0 2 0.75
0
0.5
E
0.25
z
0
0
0.25
0.5
0.75
1
1.25
1.5
Number of SYN/ACK packets (in millions)
Figure 6 - The amount of RST/ACKs compared to SYN/ACKs that each class B subnetreceive d (two
high volume outliers not plotted). The number of class B subnet points in each cluster from left to
right is 40, 18, 8, 36, 11, and 8.
34
Total number of SYN/ACK packets versus ACK packets for all 123 class B subnets
15000
12500
0
10000
<7500
0
E
z
-05000
2500
0NE
0
0.25
0.5
0.75
1
1.25
1.5
Number of SYN/ACK packets (in millions)
Figure 7 - The amount of ACKs compared to SYN/ACKs that each class B subnet receive d (two high
volume outliers not plotted).
While the non-uniformity of backscatter was unexpected, there were other expected
characteristics of backscatter confirmed in the dataset. One characteristic found in backscatter
was that the more backscatter a subnet received, the more destination ports there were that
received traffic. Since backscatter is a reply to a packet attempting to connect to a service on a
fixed port, the destination port is typically a random high number application port. Figure 8
shows how the number of destination ports accounting for the top 90% of traffic increases as a
class B subnet receives more backscatter. This behavior would be missed if one plots the
backscatter amount against the number of unique destination ports in all the traffic received on a
subnet, because each port is eventually expected to receive a random packet. On the same figure,
for a consistent amount of backscatter, the number of unique destination ports in the top 90%
increased as the total primary traffic decreased. This was caused by the relative increase in
backscatter as primary traffic decreased (i.e. the ratio of backscatter to primary traffic increased).
35
.........................
Primary and backscatter traffic versus destination ports
+ Primary
x Backscatter
CD
C
0
C
.
0.
0
5000
15000
10000
20000
NOmber of unique destination ports in the top 90%
Figure 8 - Primary and backscatter amounts for each class B subnet as a function of destination ports.
Another observed characteristic of backscatter was that as the amount of backscatter
decreases, the number of IP sources contributing to the top 50% of traffic increased (Figure 9).
Since backscatter is the response traffic from specific sources, more backscatter translates to these
specific sources contributing a greater percentage of the traffic. The amount of primary traffic
remained independent of the number of unique IP sources.
Primary and backscatter traffic versus unique
IP sources
8
+ Primary
7
U)
C
x Backscatter
6
5
C
CL
0
4
3
2
1
0
0
1000
Number of unique
4000
3000
2000
IP sources in the top
5000
50%
Figure 9 - Primary and backscatter amounts for each class B subnet as a function of IP sources.
36
5.1.2 Snort alerts
Overall, Snort generated few abrts. This was mainly because most of the packets in the
dataset, which included TCP SYNs, SYN/ACKs, and RST/ACKS contained no data. Much of
the malicious TCP traffic, which would have otherwise generated Snort alerts, was never sent to
the network telescope because machines could not establish a TCP connection to the IP addresses
in the class A network. The few alert types that Snort generated in high quantities were MS-SQL
worm propagation attempts, ICMP ping nmaps, and ICMP destination unreachable. Figure 10
shows an example of a typical alert plot for the class B subnets; MS-SQL worm and ICMP ping
nmap accounted for at least 90% of the alerts visible across all but one of the class B subnet alert
plots. The high volume ICMP destination unreachable alert only occurs in one of the analyzed
class B subnets, and is discussed in section 5.2.5.
The 'MS-SQL worm propagation attempt' alert is generated by Snort when the Slammer
worm packet is detected. The Slammer worm, originally released in January 2003, is a single
packet UDP (port 1434) worm that attempts to compromise a Microsoft SQL server [12]. Since
the Slammer worm, which propagates without verifying that the target IP address is active, is
contained within a single UDP packet, it is easily identified by Snort. The MS-SQL worm alerts
were diurnal with double peak rates of -2600 alerts/hour at around +4 and +10 hours.
The 'ICMP ping nmap' alert is generated when an ICMP ping packet that is likely caused
by the nmap tool, is detected. ICMP pings are used to detect whether there is a computer
operating at a specified IP address. ICMP pings generated by nmap are used to scan a subnet for
active hosts and can be a precursor to future attacks targeted at the active hosts found by the tool.
The ICMP ping nmap alerts were diurnal, with a peak rate of -1700 alerts/hour at +18 hours.
37
.
.
.. ........
-.............................
.........................
.........
Snort alerts versus time in xx101.0.0
S
I
I
I
I
I
I
alerts/hour
0 >0
*
>186
X
X
X
>373
*
X
X
X
*
>560
X
X
X
X
code
*>747
X
XX
X
X
ever
*
>934
X
XX
X
X
*
>1120
X
X
NK X > * >1307
X
X X
X
X
SNUP Age ntX (22
*
>1494
X X
X
XX
KSo Bourge queunnh (go
*
>1681
X >Xx
X X8KX
XX
XX X
X ><
X >X )X
X
TCP header len > pkt {RB
*
>1868
X)w
XW( X X<
X
wXXK
X )XXX
ICMP DUnreach Net (30 X
>2054
XX X
X XX Xx
AXX )K
XXOX
IP reserved bit get (49
>2241
|K
X<
X
X
Mc
X
MsWr trap tVp (45
a
>2428
X X XXK X )M X X X XK &(
XX XXK
X
ORTWCAN>4004 p kta (S:X X
0
>2616
X XX
X X
X
X
X
)
TC data offset < 5 (4
>)Mx XX X X XAIK
X&( >X XX
X >[<X X(
9NMP request La p (1o0:O9
X >0<
X W
Part
68 to <1 24 (178
>
AME
>X< X>OK X
1CMP redirect hoat (sm.:
X
X
X X >X X X X W<X XX A)AKM
08( X XXXX
TCP port D(Mno: X XX >0
X
X
X
X
FCMP large pack ot (no,: X
X
X X
X X
s: X XXX(4
X XX X
vDr lcn >
Icur re4imret net
rim
(1:
(X:
X
X
=tAN
TML Undt 4=0 aeda
SYN pkt w/ data (5
lnk. datagrm do code (
(B X
bare byte uni
(9
ICMP Lretri
IU DunrechI Get (16
Truna TCP opti ong (1
VMyl
IX3P
DUnre.
1drB-nQL Wormn
0
12
24
60
48
36
Time (in hours)
72
84
Figure 10 - Snort alerts in 101B.
5.2 Class B Results
There is a wide variety of phenomena to be observed within the class B subnets. As
stated earlier, the lowest volume on a class B subnet was 5.2 million packets and the highest
volume, ignoring the two outliers, was 9.8 million packets. Tables and plots for high volume
class B subnets are presented in sections A.1, A.2, A.5, A.6, and A.9 of appendix A. Tables and
plots for mid volume class B subnets are presented in sections A.3, A.4, A.7, A.8, and A. 10 of
appendix A. Tables and plots for mid volume class B subnets are presented in section A. 11 of
appendix A. While 30 class B subnets were chosen from the highest, middle, and lowest total
packet count, there was no clear characteristic separating the three categories. Instead, the
phenomena observed, including non-uniformity in traffic distribution, banded traffic, multi-port
attacks, and sweeps, seemed to have been targeted at random class B subnets. In this section,
each class B subnet is referred to by the class B subnet index followed by the letter B (ex. 244B
refers to xx.244.0.0/16). The results concerning TCP traffic are discussed in sections 5.2.1 to
38
5.2.4, followed by the ICMP traffic results in sections 5.2.5 and 5.2.6, and the UDP traffic results
in sections 5.2.7 and 5.2.8.
5.2.1 Non-Uniform Backscatter
The two subnets that received the most amount of traffic, 204B and 244B, exhibited nonuniform backscatter. Each subnet received 12 million packets, 20% more than the third highest
volume subnet. The cause of this was a dramatic increase in backscatter. 204B received more
than 2 million TCP SYN/ACKs and 244B received more than 3.5 million TCP RST/ACKs, 700
thousand and 2.2 million more packets, respectively, than the third highest SYN/ACK and
RST/ACK volume in a single subnet. This backscatter had an unusual distribution; it was
specifically targeted at the first 40 class C subnets within either class B subnets. Figure
11 shows
a high amount of TCP traffic, which appear as 'bars' at the bottom of the plot, destined for the
first 10,000 IP addresses within 204B. These destination IP bars correspond to the packets of
SYN/ACKs and RST/ACKS destined for the ports between 8,000 and 40,000 in Figure 12. The
connection between these two figures is easier to notice by observing the gap between +84 and
+90 hours; there is a single vertical line in the middle of the gap in both figures. Figure 13 shows
how the first 40 class C subnets received roughly five times the amount of traffic compared to the
other class C subnets.
39
........
-.....---....... .........-----...... ..................
in xx.204.0.0/i6 (skp=100)'
Destination IP address index versus tie
packet type
M$
57,343-|f:
-
0
m
*
TCP
UDP
ICMP
040,959
32,767
24,57516,383
8,191
0
64
72
60
46
36
Time (in hours)
24
12
0
Figure 11 - Traffic destined to 204B, where TCP traffic is non-uniform.
Destination port versus time (skip=100)
packet type-count
0
UDP
1=115
0
SYN
*
SYN/ACK
2,278,700
+
ACK
IJ513
10000
4.
4,42E =1
RST
1000
RsT/ACK
5,587,517
TP OTHER
2,247
100
0 000
W0Ol
Do
O
00 OM
0
o
00
00
oi O
WD
0Q00
0
d a o0
o od
V
00 WOOD
0 +
00,00
0 aLUm
CO
W
(P
0Q
10
1
0
|4
1
1
0
12
24
60
48
36
Time (in hours)
72
54
Figure 12 - Destination ports for 204B, where high ports receive a distinct pattern of traffic.
40
Total packets in each class C subnet in xx.204.0.0/16
500,000*
I
I
64
96
128
160
Class C subnet index
I
I
I
437.500375,000.4
312,500-
a.)
a. 250,000
0
E-1 187,500-
125,00062,500-
0
i
0
32
192
224
Figure 13 - A non-uniform distribution of packets received by each class C subnet in 204B.
Both 204B and 244B received at least 20% of their traffic from two sources,
61.177.64.171 and 61.152.91.151.
These two IP addresses belong to class B networks owned by
a Chinese telecom. Using Google to search for more information on the 61.177.64.171 IP
address, cached results revealed forum posts, where people mentioned this IP address, dating
back to within two weeks of the traffic dataset. These posts referred to links of peer-to-peer
(P2P) torrent files for illegal movie and software downloads found at 61.177.64.171, a torrent
server. It is difficult to explain the pattern of spoofed addresses used in the traffic directed
towards the torrent servers, but this serves as an example of unusual UT that would be difficult to
emulate.
5.2.2 Non-Uniform Primary Traffic
Similar to the non-uniform backscatter traffic, a few subnets received a non-uniform
distribution of primary traffic across the class C subnets within. The clearest example of this was
observed on 192B, shown in Figure 14. TCP SYNs to port 135 caused the increase in traffic,
starting at the 18th class C subnet, and gradually decreasing again. This port received 2.7 million
41
packets of approximately 48 bytes (1.8 million was the second highest amount of TCP port 135
packets destined to one class B subnet). Unlike the non-uniform backscatter traffic, no single
source contributed more than 1.2% of the traffic on this subnet, the likely reason being that the
source IP addresses were spoofed.
Total packets in each class C subnet in xx.192.0.0/16
600,000
-
437.500
-
375,000
-
312,500-
~250,000 0
E-, 157,500-
125,000
-
62,500
-
0
I
0
32
64
96
128
160
192
224
Class C subnet index
Figure 14 - A non-uniform distribution of packets received by each class C subnet in 192B.
5.2.3 Banded Traffic
One peculiar phenomenon that only appeared on one of the analyzed class B subnets,
49B, was horizontal and vertical bands of TCP traffic, shown in Figure 15. The three vertical
bands indicate increased packet activity destined to all IP addresses within the class B subnet.
Each vertical band lasted approximately 6 hours. The horizontal band lasted throughout the 93hour dataset and affected 12 class C subnets within 49B. 49B received 20% of its traffic from a
single source sending TCP SYN packets to port 445. There were 3.7 million TCP SYN port 445
packets sent to this subnet (1.8 million more than any other subnet). The bands are not simple
sweeps across an IP range, as these would appear as thin lines. Instead, the bands indicate that
42
... .....
......................................
. ..........
.............
for all IP addresses in the range, each IP address constantly received a TCP SYN port 445 packet
for 6 hours.
Destination IP address index versus time in xx.49.0.0/16 (skip=100)
packet type
m TCP
- 0
UDP
0 ICMP
57.343
Id 49,151
40,959
.
32,767
24,575
16,383
8,191
0
0
12
24
60
48
36
Time (in hours)
72
84
Figure 15 - Vertical bands of traffic in the 49B destination IP address plot.
43
............
................................................
5.2.4 Multi-port TCP attacks
Many class B subnets received short bursts of TCP packets destined to multiple ports.
Figure 16 shows an example of this behavior, seen on 243B. Between +68 and +76 hours, 243B
received TCP SYN packets destined to ports 901, 3410, 12345, and 27374. Each port received
between 1% and 2% of the total traffic. While it can be assumed that the short multi-port TCP
attacks were caused by a single event, the same cannot be said for the multiple TCP ports that
received traffic throughout the whole 93 hours. These ports (ex. 80, 135, 139, 445, 1023, 1025,
3127, 5554, and 9898) do not share unusual temporal characteristics like the four TCP ports hit
simultaneously for a short duration, and may have been caused by different events.
Destination port versus time (skip=100)
packet type-coant
UDP
[0
a 1,5o
o
SYN
A
SYN/ACK
4A91=
10000
1,480
4A.
0
NET
1000
S
0
2ST/ACK
0
TCP
4-a
100
a
00
)
oODao
[,-Y
OED
OED
(13
OuMMOE) 00 00 oWc
Co
01
0
0
CCI
cxno
0000
I
M
M MMO
OGMD 0 OOI@o amO
cO c
0
0
o
oo 00
O
TH|
C
00
0 0
CP
103
1
0
12
24
60
48
36
Time (in hours)
72
54
Figure 16 - Four ports on 243B received packets at the same time and with the same duration.
44
......................
"'""""""""""""'..................
-
mmumm.....
5.2.5 High Volume 1CMP Destination Unreachable
On the 1 B subnet, there was a high volume of ICMP destination unreachable packets.
This subnet stood out as having more than twice as many ICMP packets compared with the other
class B subnets. The majority of these ICMP packets were destined to a single IP address,
xx. 1.128.12. This was the only class B subnet where the MS-SQL worm and the ICMP ping
nmap alerts were not the top two alerts. The bottom of Figure 17 shows how the ICMP
destination unreachable packet volume peaks at +18, +42, and +90 hours.
Snort alerts versus time in xx.L.0
I
I
I
I
I
I
elerts/hour
0
>0
X
(13
(13
(5'
X
(6,
(0
(7
(121
SCAN nmap
ICMP DUnreaeh Boat (17
SUMP AgentX (17
ICMP Source Quench (12
TCP header ln > pkt (35
MOBxmtream (37
(38'
iCMP IMrtriever
ICMP DUnreach Not (48f
IF re..rvad hit .et (48,
SNPM request tep (6f
mKA
I
I
I
Unk. datagrm dcodes
Inv hardware type
SYN pkt w/ data
Kxper. TVr option.
Truno. TK7 option.
bare bytA unload
X
X
X
X
XXX X
XX
X
X
XX
X
*
0
X
*
*
*
*
*
*
X
X
>W
Xi3
xxX
XX XX
X
X
X
X
XW
X
*
*
XX
X
XX)C<
X2UC
X
X >X
XEMiG
XJm X )
X
X
X
X
)= X)
SNMP traup top (4
X
X+Xa"
>OXMK
XOW
pkt. (75 KM ( X>OXOO<XX )"K10<X
*
X>WK
XXKX
X XXX)QD0<X
XX X
)XWXX
XXXXX
TV? data offet < 5 (84 X
*
Port 53 to <1014 (100
Tcr part o(14
OOOXM)OXXX<:
xx x >O
>Mx0x0
<I XX< XxW xXx
Hf~mra add. overflow (169
X
X
host (195
ICU? redireat
x
ANCIV
xM
X
X
x
X
(31A
1CMW Jar..paket
x
x
>OK M<
XXX Xx
SAN FIN (400 Xx< K
XX
X
>XKX
X
x
SX XXXX
A0( X
MX X
X X ),W(K
>K
X
X >O X
X
PrMSCAN>4098
UIDP
>223
>447
>671
>895
>1119
>1343
>1567
>1790
>2014
>2238
>2462
>2686
>2910
>3134
len > paTload (443
SNMW public access (15167
NUAP (142M=.
WS-SQL Warm (1 as
IMP PING
ma
ICMP DUnuach (266a8
-
0
(
12
24
Figure 17 - Snort alerts for IB, where
60
36
48
Time (in hours)
72
84
ICMP destination unreachable is the highest volume alert.
45
.
........
....
5.2.6 ICMP Echo Request Sweep
Sweeps of any ICMP type were rarely seen in the analyzed class B subnets. However, on
the 81 B subnet, there was a visible ICMP echo request sweep across the whole subnet (Figure
18). The sweep started from +72 hours at the 0 IP address index and continues until +84 hours,
where it reaches the 65,535 IP address index (note: the TCP and UDP packets have been filtered
from the original plot, since the ICMP sweep cannot be seen when the plot is not in color).
Figure A3-3 in appendix A shows the same plot as Figure 18, but without the TCP and UDP
packet types filtered out from the plot. There were over 400,000 ICMP echo request packets,
approximately 6% of the traffic, directed to this subnet. Because most of the other class B
subnets received no more than 200,000 ICMP echo request packets, this sweep is likely
composed of the additional 200,000 packets. Neither 79B nor 83B, the two spatially closest class
B subnets analyzed, exhibited any ICMP sweep activity.
Destination IP address index versus time in xx.81.0.0/16 (skip=100)
57,343
I
iI
65,535
I
I
I
__1____1_1_1
I
packet type
-
U
ICMP
I
1
40,959
-
32,767
-
24,575
-
16,383
-
/
1J2
I
/
8,191
-
0
12
24
60
48
36
Time (in hours)
72
54
Figure 18 - An ICMP sweep going across 81B starting at +72 hours and ending at +84 hours.
46
......
................
..
..........
........
......
5.2.7 Class B UDP Sweep
The 168B subnet received the most amount of UDP traffic, 3.6 million packets. 40% of
the UDP traffic was 78-byte port 137 packets targeted to all machines. Port 137 UDP traffic is
typically associated with NetBIOS name queries. No other class B subnet had nearly as many
UDP sweeps visible in the destination IP address index versus time plot type, shown in Figure
19. The source IP addresses of the UDP sweeps were likely spoofed as no source contributed
more than 2% of the traffic.
Destination IP address index versus time in xx.168.0.0/16 (skip=100)
65,635
57.343
I
I
I
I
I
I
-
I
I
packet type
M TCP
UDP
-4,'hi
-lnt1-
49,151 -6
-
~i~I~L
i
4.-
40,969
I
1
~
qa
~4 )I
WA
.4,
q
I'
P2
24,575
'.4
*-
i-i
A 1 ,)
T) 32,767
Gt
ICMP
g4
0
Jet! n
16,383
40
io
. -1
.
.4
F
, !*
8,191
0
0
12
24
60
36
48
Time (in hours)
72
54
Figure 19 - Traffic destined to 168B, where vertical UDP sweeps visually outnumber the TCP sweeps.
47
5.2.8 Select Target High Volume UDP Traffic
The 128B subnet received the second highest total UDP packets, 2.4 million packets
(third highest was 1.7 million UDP packets). All of the UDP traffic was destined to a single IP
address xx.128.8.14. xx.128.8.14 received 840,000 160-byte packets to UDP port 1037. The fact
that UDP packets are primary traffic, and that no source contributed more than 2.6% of the
traffic, indicate that this activity was a DDOS attack.
5.3 Class C Results
The class C subnets plots allow us to discern the traffic behavior that composes a class B
subnet. The low packet count class C subnets received around 10,000 packets. Tables and plots
for these subnets are presented in sections B.6, B.7, and B.8 of appendix B. The mid packet
count class C subnets (i.e. ranking 15,000 out of a sorted list of -30,000 class C subnet packet
counts) had around 20,000 packets. Tables and plots for mid volume class C subnets are
presented in sections B. 1 and B.4 of appendix B. Both the low and mid packet count subnets had
a fairly even distribution of traffic, with 90% of the traffic going to an average of 216 IP
addresses amongst the 256 IP addresses within each subnet. The high packet count class C
subnets received over 500,000 packets and displayed phenomena targeted at specific IP
addresses. Each of the 30 high volume class C subnets had at least 90% of the traffic destined to
a single IP address within the class C subnet. Tables and plots for high volume class C subnets
are presented in sections B.2, B.3, B.5, and B.9 of appendix B.
In this section, each class C subnet is referred to by the second and third IP address octet
followed by the letter C (ex. 255.145C refers to xx.255.145.0/24). Only low and mid packet
count class C subnets are discussed in this section, as they have characteristics pertaining to the
subnet as a whole. Section 5.3.1 discusses an observed phenomenon where packet noise was
contained in specific IP address ranges. Phenomena found in the high volume class C subnets,
which in fact pertain to specific destination IP addresses within the subnet, are discussed in
section 5.4.
48
. ...
...............................
......................
5.3.1 Packet Noise
In the low and mid volume class C plots, there is behavior that helps explain the
differences in total backscatter between the lower and upper half of the class A network. Figure
20 is a plot of the backscatter in the low and mid volume class C subnets analyzed. The class C
index is computed by multiplying the second lIP octet (from the left) by 256 and adding that to the
third IP octet (ex. the class C index for X.Y.Z.0/24 is 256*Y+Z). Figure 20 shows that the low
and mid volume class C subnets pertaining to the class B network below 128 received on average
5,000 more backscatter packets than those above that range. This is not surprising as the
difference of 5,000 for each class C subnet, matches the 1.2 million packet difference (5,000*256
is approximately 1.3 million) between the class B subnets, explained in section 5.1. It turns out
that the packets destined to each of the class C subnets below the 128-class B octet is not
distributed evenly. The lower half of the IP range within each class C subnet received
approximately 20% more traffic than the upper half.
Total backscatter in each class C subnet analyzed
8,000
7,000
6,000
5,000
4,000
3,000
2,000
1,000
0
0
16,384
32,768
49,152
65,536
Class C index (out of 65,536 class C subnets in class A network)
Figure 20 - Total backscatter in the low and mid volume class C subnets.
Figure 21 is an example of a class C subnet, 55.145C, below the 128-class B octet. The
plot shows the total amount of traffic each of the 256 IP addresses, within the 55.145C subnet,
received. There was a 20% drop in 'noise' after the xx.55.145.128 IP address index. The
destination IP address versus time plot for 55.145C (Figure 22) reveals the cause of the drop in
noise. The lower half of the graph has 'specks' of random TCP packets distributed throughout
the whole time period. All of the class C subnets below 128 look similar in terms of the specks of
49
TCP packets seen below the 128 IP address, while those above the 128-class B octet, such as
198.188C (shown in Figure 23), were clear of those specks.
Total packets to each IP address in xx.55.145,0/24
930813
-
697Ad
651,465-
348232-
1160)
32
64
96
128
160
IF address index
192
224
Figure 21 - Total amount of traffic received by each IP address within 55.145C.
50
.............
.................
...................
Destination IF address index versus time in xx.55.146.0/24
I
255
-
223191
-i
[-
-
I I- I
;_
,1
S
A
L
-
1
packet type
"
TCP
- m
UDP
"
ICMP
- J
i:I
-~
---3: --rL-- -
0d 127-
-I
-
A
-i4
95-
-L2C-K:
63 31
-1- --.
I
- -A
f
CD159-
11
-
0
I
I
12
24
45
36
Time (in hours)
84
72
60
Figure 22 - A plot of every packet received by each IP address in 55.145C.
Destination IP address index versus time in xx.198188.0/24
255
223
I H- F
-
191CD
159-
-i
:1
Wh
iJtI --r'
1
I
J
'.
--
L
- -
II
I
1
-~ I
63
-
--
31
r
-
-
I
zI l
-
I
0
I
12
V
-
I
I
24
I
60
48
36
Time (in hours)
72
54
Figure 23 - A plot of every packet received by each IP address in 198.188C.
51
1 JDP
N
ICMP
Ft
-II
127-
packet type
TCP
-
II
- .
1**~
--
11.2I-i
* L'.!
5.4 Targeted IP Address Results
The high volume targeted IP address results are all based on the high volume class C
results. All 30 of the high volume class C subnets, which received over 500,000 packets, had at
least 91% of the packets directed to a single IP address within their class C subnet. It should be
noted that the average volume of packets received by each class C subnet across the class A
network was 27,000.
There were four phenomena observed in the 30 high volume targeted IP addresses. The
phenomena include 5 IP addresses with a diurnal packet per hour pattern, 23 IP addresses which
all had a similar temporal packet pattern, 1 IP address which received a large amount of P2P
traffic targeted at port 4662, and I IP address which received a lot of UDP port 1037 traffic
(discussed in section 5.2.8).
5.4.1 Diurnal Packet Pattern
A diurnal pattern was observed in the packet versus time plots of five class C subnets.
All of these IP addresses received between 480,000 and 700,000 packets. The diurnal pattern
targeted at the 5 IP addresses were all similar; an example of the 109.116C pattern is shown in
Figure 24. The diurnal pattern appears to be a scan for particular port vulnerabilities, since 6
ports accounted for a large percentage of the traffic. Table 2 shows that six destination ports
accounted for over 95% of the packets in these subnets.
52
. .............................................
Packets ner hour versus time
14,000
--
12,250
-
10,500
-
8,750
I
-4
7,000
0
-
f
/
,109,116.0
vrg
6,250
3,500
1,750
0
0
12
24
60
36
45
Time (in hours)
72
84
Figure 24 - Diurnal packet per hour versus time plot for 109.116C.
IP Address
TCP
x.25.161.40
x.109.116.137
x.217.229.249
x.232.94.123
x.248.246.112
21.0
21.1
21.2
21.3
21.3
20.9
21.2
21.4
21.2
21.1
1025
TCP
42
% of
TCP
19.4
18.9
19.0
19.2
19.2
Total
Traffic
per Port
80
TCP
17.0
17.9
18.0
17.8
17.8
10.8
11.5
11.8
11.6
11.5
6.6
6.7
7.0
6.9
7.3
95.7
97.3
98.4
98.0
98.2
139
TCP
445
TCP
Total %
Table 2 - The traffic breakdown, by port, for the 5 IP addresses that had a diurnal packet pattern.
5.4.2 Similar Temporal Traffic Pattern across Class B Subnets
One interesting phenomenon observed was that 23 IP addresses, which spanned distant
class B and C subnets, received a similar temporal traffic pattern This traffic pattern is divided
into two groups, where the difference between the groups was caused by a single IP source. One
53
group consisted of 10 IP addresses where the IP source, 210.245.191.90, sent 5,500 packets; the
other group consisted of the remaining 13 IP addresses where the same IP source sent 60,000
packets. The packet per hour versus time pattern of the former group is shown in Figure 25; the
pattern of the latter group is shown in Figure 26. The difference to observe between these two
figures is the increase in traffic between +22 and +38 hours, which accounts for approximately
50,000 packets. Figure 27 shows an example of the total number of packets sent by the top 18 IP
sources, to 4 of the 23 IP address destinations. The IP source on the far right of the plot can be
seen to have sent a significantly greater amount of traffic to two of the four IP destinations. In
fact, all 23 IP addresses shared the same top 18 VP sources, with the same relative amounts except
for the traffic received from IP source 210.245.191.90 (the 23 IP addresses share more than 18 IP
sources, but there was a 20% drop in total packets after the 18 th IP source). Considering that the
same IP sources are involved in the form of backscatter seen on these 23 IP addresses, a single
event is likely to have caused this phenomenon, where a distinct set of IP addresses were targeted.
Packets per hour versus time
I14,567,0
~verge
12,25010,500-8,750
P 7,000-
o 5,250
-
-
-
e4
3,6(0
1,750-
0
12
24
4
36
Time (in hours)
0
72
84
Figure 25 - Packet per hour plot for 5.67C in which 210.245.191.90 sent little traffic.
54
.......
.......................
-.................
Packets per hour versus time
14,000
-
-
-_xx.10120L0
average
12.25010,500
I
-
o 8,750A
7,000-
1,750
/
4\~
3,500 -
i
ir
r ai ii
o 5,250-
ii i
.I
e I
60
72
84
V
-
0
45
36
24
12
0
Time (in hours)
Figure 26 - Packet per hour plot for 101.204C in which 210.245.191.90 sent a high volume of traffic.
Total packets sent from top 18
IP sources to high backscatter volume IP destinations
140,000
120,000 100,000
a>
n
M xx.5.67.128
* xx.101.201.168
0 xx.206.222.64
80,000
Cn 660,000
0
-'U
CU
0 xx.253.25.8
40,000
20,000
0
N
'T
*N
0(
LO
M
')
M0
(
W
M
CD
r -(
CD
0)
M
)
CP
"t
o
0
0
)
M'
oN
T-
a)
I'
U')
0
0
-
O
Figure 27 - Packet count from the top 18 IP sources, sent to 4 IP addresses.
The only pattern distinguishing whether 210.245.191.90 sent traffic was that only those
destination IP addresses where their rightmost octet was a multiple of 16, did not receive traffic
55
..............
......................
...........
from this source, shown in Figure 28. The other octets did not seem to bias the distribution of
traffic from this IP source. The traffic from this source, 210.245.191.90, is what separates the 23
IP addresses into those that received 532,000 backscatter packets versus those that received on
average 482,000 backscatter packets. This 50,000-packet difference was solely a difference in
the volume of TCP RST/ACKs. This distinct separation of backscatter quantity may explain why
there were clusters of backscatter found in the section 5.1.1 backscatter analysis.
Total backscatter received based on rightmost
IP address octet
550,000
C,,
-
525,000
0.
aL
' 500,000
cc,
475,000
450,000
0
32
64
96
Rightmost
128
160
192
224
IP address octet
Figure 28 - Total backscatter received on the 23 IP addresses, based on the rightmost octet
These 23 IP addresses all received over 470,000 packets of backscatter. This translates to
each IP address representing approximately 10% of the backscatter observed within their class B
subnet. 2 of the 23 IP addresses analyzed actually pertained to the same class B subnet. This
suggests that the backscatter received on each of the class B subnets might have been the
aggregate of the backscatter received by 10 IP addresses within the subnets.
5.4.3 Single Target P2P Primary Traffic
One IP address, xx.218.68.212, received 486,000 packets, of which at least 92% were
TCP SYN packets to port 4662. EDonkey P2P client commonly uses this port. The attack did
not appear to start until +20 hours, shown in Figure 29; it continued throughout the rest of the
dataset period, with two large bursts of traffic lasting approximately 24 hours each. No source
contributed more than 0.1% of the packets. Unlike the P2P activity, which caused a large amount
of backscatter, discussed in section 5.2.1, this P2P activity consists of primary traffic. The likely
56
cause of the activity seen on xx.218.68.212 is that the IP address was incorrectly listed as a P2P
server.
PAekpts ner hour versus time
14,000
-
-- x 216.6 .0
--aerage
12,250 10,500 -
8,750 I
7,000
-
Q)
Ed.
0)L
5,250
3,500
1,750
0
0
12
24
60
36
48
Time (in hours)
72
Figure 29 - Packet per hour plot of P2P traffic sent to xx.218.68.212.
57
84
58
Chapter 6
Conclusion
This thesis presents the results of analyses performed on unwanted traffic received on a
class A network telescope. The results show the various types of traffic phenomena that were
observed including a variety of sweeps, diurnal and irregular traffic patterns, non-uniform traffic
distributions, and high volume attacks. These phenomena were targeted at different class B
subnets, class C subnets, and IP addresses across the whole class A network and were difficult to
predict. While one subnet would receive a certain pattern of traffic, an adjacent subnet would be
devoid of such a pattern. A large portion of the dataset could not be analyzed at the class C or
individual IP address level, and so it cannot be assumed that the list of phenomena presented is
comprehensive. In addition, many of the phenomena lasted longer than the 93-hour period of the
dataset, and so the temporal aspects of these phenomena could not be ascertained. The unusual
nature of the traffic, the inability to analyze all of the class C and individual IP address activity,
and the short duration of the dataset make it difficult to create artificial models of unwanted
traffic. Future work towards improving the understanding of UT includes automating the
statistical analysis of traffic measurements using clustering techniques, analyzing longer datasets
and classes within those datasets more efficiently, and looking at the root causes behind these
phenomena.
The results also show that the backscatter in this dataset was not uniform. When the class
B subnets were observed at the class A network level, a large disparity was seen between two
regions of the network. Assuming uniformity in backscatter, especially since uniformity can be
observed in clusters of class B subnets, can lead to gross miscalculations of backscatter
characteristics on the Internet.
59
60
I-
-,--
-
-7 -
-
-
-
- -
-
-
-
- --
-
-
References
[1]
Sally Floyd and Vern Paxson, "Difficulties in Simulating the Internet," IEEE/ACM
Transactions on Networking, Vol. 9, Issue 4, pp. 392-403, Aug. 2001.
[2]
Steven M. Bellovin, "Packets Found on an Internet," ACM SIGCOMM Computer
Communication Review, Vol. 23, Issue 3, pp. 26-31, Jul 1993.
[3]
Stuart Staniford, Vern Paxson, and Nicholas Weaver, "How to Own the Internet in Your
Spare Time," In Proceedings of the 1 Ith USENIX Security Symposium, pp. 149-167,
Aug. 2002.
[4]
Lee M. Rossey, Robert K. Cunningham, David J. Fried, Jesse C. Rabek, Richard P.
Lippmann, Joshua W. Haines, and Marc A. Zissman, "LARIAT: Lincoln Adaptable Rea
time Information Assurance Testbed," IEEE Aerospace Conference Proceedings, Mar.
2002.
[5]
CAIDA mission statement, 2005.
http://www.caida.org/projects/progplan/progplan03.xml
[6]
David Moore, "Network Telescopes: Observing Small or Distant Security Events," In
Presentation at the 1 Ith USENIX Security Symposjm, 2002.
[7]
David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage, "Network
Telescopes: Technical Report," Technical Report, Cooperative Association for Internet
Data Analysis - CAIDA, Apr. 2004.
61
-
-
-
-
..........
[8]
David Moore, Geoffrey M. Voelker, and Stefan Savage, "Inferring Internet Denial-of-
Service Activity," In Proceedings of the 10th USENIX Security Symposium, pp. 9-22,
Aug. 2001.
[9]
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, and Larry Peterson,
"Characteristics of Internet Background Radiation," In Proceedings of the 4th ACM
SIGCOMM Conference on Internet Measurement, pp. 27-40, 2004.
[10]
Martin Roesch, Snort network intrusion prevention and detection system, 2005.
http://www.snort.org/.
[11]
Rocky K. C. Chang, "Defending against Flooding-Based Distributed Denialof-Service
Attacks: A Tutorial," IEEE Communications Magazine, Vol. 40, Issue 10, pp. 42-51, Oct.
2002.
[12]
David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and
Nicholas Weaver, "The Spread of the Sapphire/Slammer Worm," Technical Report,
Cooperative Association for Internet Data Analysis - CAIDA, Jan. 2003.
[13]
CoralReef software suite, 2005. http://www.caida.org/tools/measurement/coralreef/.
[14]
Helmut Michels, Dislin plotting library, 2005. http://www.dislin.de/.
62
Appendix A:
Tables and Plots for Class B Subnets
63
64
A.1 - XX.1.0.0/16
Total
Avg Rate
Packets
9,804,326
29
Bytes
563,168,457
1,168
Table Al-1 - Packet and byte statistics for lB.
Peak Rate
1,140
54,420
%TCP
78.3
64.0
%UDP
16.2
31.4
%ICMP
5.5
4.6
ACK
10,845
RST
76,868
RST/ACK
923,111
OTHER
735
SYN/ACK
SYN
TCP TYPE
PKT COUNT
5,450,198
1,158,305
Table Al-2 - TCP packet types in lB.
100
31
574K
Scans
Packets
(Scans >
4K pkts)
1.1M (75)
400,657
Sources
Avg
Pkts
/Src
25
Avg
Bytes
/Src
1.4K
Destinations
Hosts
Avg
Pkts
/Dest
65,536
150
90
X
X
X
80,178
110
6.4K
52,261
169
9.6K
4
153
32.1K
1.8M
12,140
50
X
X
X
Table Al -3 - Statistics for all, the top 90%, and the top 50% of traffic in lB.
404
21.2K
%
Snort Alerts
Total
Unique
Ports
Total
Hosts
59,691
13,360
Avg
Bytes
/Dest
8.6K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 135
1,829,158
18.7
87,414,378
15.5
TCP - 445
1,801,637
18.4
86,758,899
15.4
UDP - 137
1,260,528
12.9
98,328,687
17.5
Table A1-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in lB.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.1.50.192
471,531
4.8
19,437,178
3.5
14,396,629
256,446
2.6
xx.1.128.12
xx.1.199.75
139,617
1.4
6,732,568
Table Al-5 - Top 3 destination IPs across all packet types by packet count, in IB.
2.6
1.2
IP Source
61.152.241.175
Packets
263,933
Packet %
2.7
Bytes
11,617,276
Byte %
2.0
194.200.29.110
61.234.250.206
255,934
236,036
2.6
2.4
14,332,304
10,243,668
2.5
1.8
Table Al-6 - Top 3 source IPs across all packet types by packet count, in 1B.
Alert Name
ICMP Destination Unreachable Communication Administratively Prohibited
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
Table Al -7 - Top 3 alerts by alert count, in lB.
65
Alert Count
256,348
157,766
142,355
Alert %
44.6
27.5
24.8
...................................
Packets per hour versus time
300,000
-
262,500
-
225,000
-
187,500
-
p., 150,000
-
S.,
0
-
A!
I-
.i.J
U
112,500
-A
75,000
-
A
A
*x
A
h
- -_
-
37,500
0
0
12
60
48
36
Time (in hours)
24
84
72
Figure Al-1 - Packets per hour versus time in lB.
Bytes per hour versus time
15,000,000
7~Yo.o
13,125,000
11,250,000
Kh
9,375,000
<U,
A
M.
7,500,000
5,625,000
A
A
A
-
3,750,000
1,875,000
0
0
12
24
50
46
36
Time (in hours)
Figure A1-2 - Bytes per hour versus time in lB.
66
72
84
aXaVe r1.0.
rae
...............
Destination IF address index versus time in xx.LG.0/16 (skip=100)
I
65,535
.-- A"
4
.T
I W:
.I
I
packet type
"
"
*
21
57,343
TCP
UJDP
ICMP
H57
0
'd 49,151
"bit
T91
P P
IZ
, ?M
II I
V
7f
o40,969
. , -
W
A5
32,767
,On"
P
AS
l
!: t
I -
I
S24,575
M 16,383
PIC
V .4
'WAN
8,191
nj
-, r4
J
1,11k
44
I
- r,NJI
0
0
24
12
36
54
72
60
4a
Time (in hours)
Figure Al-3 - Destination IP address index versus time in 1B.
Destination port versus time (skip=100)
p&cket type-count
1459.431
10000
L.
0
0
a
A
A
A
SYN/ACK
+
ACK
10,846
II
0o
A
A
,a 0
0
Q ,
RST/ACK
923111
o o
Ai,6 :
'
0
ci
T''CP OTHER
736
100
In
0
'
A
0~
0z
Go
qjo
13u 4Mao'UU&Eoun
0
CD)
0
Aci
0
(:A
0
A
0
103
0
1
SYN
5.450.198
RST
1000
a. A6 6
ID
V
o
|
0
1
12
24
36
48
Time (in hours)
Figure At-4 - Destination port versus time in lB.
67
60
72
1
4
.
...
. ...........
- ...........................................
....
packets in each class C subnet in xx.1.0.0/16
Total
500,000 -
I
I
I
I
-
437,500 375,000 JS312,500 250,DO
.
-
E-, 157,500-
125,000
-
62,500
-
1
.
0-
0
vn
I
r~2
64
I
I
I
96
i
i
12
I
2I
I 2
192
160
Class C subnet index
128
224
Figure Al-5 - Total packets in each class C subnet in lB.
Snort alerts versus time in xx.1.0.0
I
I
X
Unk. datagpm doivof (g
biv hardware type (3
SYN pkt w/ data (5
Exper. Tr optiin (5
Trun-c. Tr qptiivnm (0
bar&byte unloade (7
SCAN nmap XMAS (12
ICYAP DUnraah
Boat (17
SNIM
X
X
xXX
X
X
X
XX
63 to <1t4
(10:
TCP part 0 (1X4
NTare add, overflow (185
radIrwt host (IS
SCAM FIN
(400
len > payload (443
(15167
3MPW public acnoso
ICMP PING NMAP (14235M
MS-SQL WTn (157786
ICMP IDUrench (268864
X
X
X
X X XX
Xe
XDM
> XX
X
>)OCCOW
X
X XX
9XK
>""CX
X><XX
XX >A X
XXK X XX
>08K< 'K
X X
xXX X
X
X
)MKX
X
W
X
X
X X 1W8
)MX
X
X~x2>KXK
X
X
X
X
X
X
X
X X
X
Xx
X
X
1CM Iarp. pakaet (S1A
X
X X
RK
X
trap tep (44
P0RT5CAN>4095 pkta (75 WA
Tr data offaet < 5 (4 X
IXiP
X
X
>X
I
X
X
X XX
AgntIX (17
I
I
x
X
XX
TCP header in > pkt (S5
OOS matream (0?
WM4P Lratrivor (28'
ICMP DUnreach NEt (43 K
EP reservad bit set (48,
BNMP request top (W, X
Port
I
I
>X<
ICMP Souroe Quenoh (24
SNMI
X
X
I
I
X
X
>X X.)
XXX
X X >X
X
X
X
X
>
>0 Xx
XX
MOO< X
XM X 31
>M X >
>X)
XK
X X
X
X >0=(SH|XX))OMKOX5,KK )X
X
X
X
X
72
84
XXX XX
X>OK<
UhP
0
I
0
12
I
I
24
I
I
36
I
I
Time (in hours)
Figure Al -6 - Snort alerts versus time in lB.
68
I
I
48
60
1
1
alerts/hour
0
*
*
m
M
*
*
*
*
*
>0
>223
>447
>671
>895
*>U19
>1343
>1567
>1790
>2014
>2235
*
*
>2686
>2910
>3134
>2462
A.2 - XX.49.0.0/16
Avg Rate
Total
27
9,178,836
Packets
1,560
522,324,712
Bytes
Table A2-1 - Packet and byte statistics for 49B.
Peak Rate
2,440
107,536
%TCP
83.4
69.3
%UDP
14.1
29.1
%ICMP
2.5
1.6
ACK
8,639
RST
17,030
RST/ACK
586,557
OTHER
449
SYN/ACK
TCP TYPE
SYN
1,028,269
PKT COUNT
5,964,026
Table A2-2 - TCP packet types in 49B.
%
Destinations
Ports
Sources
Scans
Avg
Avg
Avg
Hosts
Total
Hosts
Packets
Pkts
Pkts
Bytes
(Scans >
/Src
/Src
/Dest
4K pkts)
65,536
140
24
1.4K
670K (43)
57,837 381,097
298K
154
53,822
109
6.3K
8,733
75,904
X
X
262
17,537
86
53.4K
2.9M
X
2
X
- Statistics for all, the top 90%, and the top 50% of traffic in 49B.
Snort Alerts
Unique
Total
28
100
90
X
50
X
Table A2-3
Avg
Bytes
/Dest
8.0K
8.7K
13.9K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 445
3,715,752
40.5
178,623,634
34.2
16.6
86,572,392
12.1
1,109,883
UDP- 137
8.2
42,835,582
9.7
894,402
TCP - 135
Table A2-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 49B.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.49.10.69
44,592
0.5
2,154,271
0.4
1,577,568
0.4
32,551
xx.49.251.163
1,414,612
0.3
29,114
xx.49.251.82
Table A2-5 - Top 3 destination IPs across all packet types by packet count, in 49B.
0.3
0.3
IP Source
61.180.41.196
Packets
2,052,122
Packet %
22.4
Bytes
98,501,856
Byte %
18.9
61.152.241.175
61.234.250.206
265,155
235,071
2.9
2.6
11,671,016
10,204,596
2.2
2.0
Table A2-6 - Top 3 source IPs across all packet types by packet count, in 49B.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
SNMP Public Access UDP
Table A2-7 - Top 3 alerts by alert count, in 49B.
69
Alert Count
158,173
Alert %
53.0
137,280
46.0
576
0.2
Packets per hour versus time
300,000
___xx.49.0.0
averageI
262,500
225,000
-
187,500
-
150,000
-
112,500
-
0
-4
U
75,000
37,500
A
6
-V-
0
12
0
24
45
60
36
Time (in hours)
72
84
Figure A2-1 - Packets per hour versus time in 49B.
Bytes per hour versus time
15,000,000
-2----
13.125,000
11,250,000
S9,375,000
~7,500,000
A
A
A
S5,625,000
J Y Q
VV
3,750,000
1,875,000
0
0
12
24
45
36
Time (in hours)
Figure A2-2 - Bytes per hour versus time in 49B.
70
60
72
84
av1rag
............................
....................
-
Destination IP address index versus time in xx.49.0.0/16 (skip=100)
65,535-
packet type
0 TCP
57,343-
UDP
-
a
ICMP
'49,151-
o 40,959
-
32,767
1
-24,575
12 16,3838,19100
72
60
48
36
24
12
54
Time (in hours)
Figure A2-3 - Destination IP address index versus time in 49B.
Destination port versus time (skip=100)
packet type-count
UDP
0
0
SYN
,954,06
A
SYN/ACK
1,02BPZ9
+
ACK
10000
-
1000
RST
17.030
RST/ACK
0d
0
t1,"
0
00
0
A
100
0
0
0
cSgo
do
d o 0oaoooe
am
oo
0O CL
00
0
0
0
0
w
<,
O0A
go0
0
10
1
-
A0
o
Elm CaDOmo0Goo
00
falO)00
"A
0
o
12
24
48
36
Time (in hours)
Figure A2-4 - Destination port versus time in 49B.
71
60
72
84
7CP OTHER
"9
- ..........
...........
. ............
..........................................
Total packets in each class C subnet in xx.49.0.0/16
500,000 I
437.500
-
375,O00
-
'
I
II'
64
160
128
96
Class C subnet index
JS312,500 250,000 E-
157,500-
125,000
-
62,500
-
0
32
i
i
i
i
i
i
i
0-
i
i
224
192
Figure A2-5 - Total packets in each class C subnet in 49B.
Snort alerts versus time in xx.49.0.0
aeader, length field < 8 (1
UDP port 0 (1
Unk. datagrin decode (2
SYN pkt w/ data (3
8NMP Agntl (+:
Icr Ufrtriever (4
Trunc. UPF gption. (0
bare byte unloade (7 X
ICMP DUnreach Boat (17
ICMP redirect not (0
IMF Source quench (9:
IGMP DUnreach Net (34:
7Dr hcader lan > pkt (:
PORTSCLN>4006 pkta (43:
MP requemt top (5: XX
IP remerrod bit set (89
X
7TP data offset < 5 N74
SNMF trap top (75
TC port 0 (103 XK
IMW large packet (148 X
SCAN FIX (1ia
Part 58 to <M324 (205
ICMP redireot hoot (220 X
ICMP DUareach (415
VDr an > paylad (421
SNUP publie anon (575
ICiP PING NMLP (1377I
MS-NL Worm (168172
alerts/hour
X
X
X
>183
X X
X
X
>
X
X
X
0
S>735
X
>919
X X
X
X
XXX
X
X X
X
XX
X0X<X X XX XKX
>XX)@KX >=K
X
X
>0K )M
)M X
X
WX
X X
XKX
XXXMK
X
>MC
>X
XX X
X
>
)OR
X
>(X
X AK
MX
>A<X X
X WK
X
X >R WCX
M X>X X
X >1w
X>W,
X
XX
XX
W@ X
A>W
>0W
X X
)wK
X
3KV00XXX
X
XX X
X
X
>X
X< >X
X
X
X
'w
>WX w X / M
WC X XOM X
X X X>
W
X
X
X
JMM
1K X
X X
X
X X
X
X
X
X
X
X
X
72
84
0-
12
24
60
48
36
Time (in hours)
Figure A2-6 - Snort alerts versus time in 49B.
72
>367
>551
S>1103
a
a
>1287
> 1471
>1655
>1839
>2023
>2207
>2391
>2575
A.3 - XX.81.0.0/16
Packets
Bytes
Total
6,699,348
Avg Rate
20
Peak Rate
2,970
%T CP
73.3
%UDP
20.1
%ICMP
6.6
405,173,024
1,210
131,250
56.7
38.1
5.2
RST
16,993
RST/ACK
574,614
OTHER
230
Table A3-1 - Packet and byte statistics for 81B.
SYN
SYN/ACK
TCP TYPE
PKT COUNT
3,217,758
1,041,876
Table A3-2 - TCP packet types in 81B.
ACK
8,409
|
Avg
Bytes
/Src
372,169
Sources
Avg
Pkts
/Src
18
1.1K
Destinations
Hosts
Avg
Pkts
/Dest
102
65,536
106,321
57
3.5K
51,920
116
6.9K
232K
13,910
4
893
3.8K
X
X
X
50
Table A3-3 - Statistics for all, the top 90%, and the top 50% of traffic in 81B.
241
12.8K
100
24
301K
Scans
Packets
(Scans >
4K pkts)
536K (43)
90
X
X
X
%
Snort Alerts
Total
Unique
Ports
Total
Hosts
58,006
13,695
Avg
Bytes
/Dest
6.2K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
TCP - 445
1,550,119
23.1
74,665,687
18.4
UDP-
1,115,871
16.7
87,037,938
21.5
660,758
9.9
31,727,655
7.8
137
TCP - 135
Byte %
Table A3-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 81B.
Packets
Packet %
IP Destination
1.2
xx.81.254.184
77,003
43,880
0.7
xx.81.220.175
30,681
0.5
xx.81.220.27
Table A3-5 - Top 3 destination IPs across all packet types by packet count,
Bytes
Byte %
3,721,069
0.9
2,120,147
1,478,834
in 81B.
0.5
0.4
IP Source
61.152.241.175
Packets
265,547
Packet %
4.0
Bytes
11,687,964
Byte %
2.9
61.234.250.206
213.96.162.222
235,940
194,397
3.5
2.9
10,239,928
11,663,820
2.5
2.9
Table A3-6 - Top 3 source IPs across all packet types by packet count, in 81B.
Alert Name
Attempt
MS-SQL Worm Propagation
ICMP Ping NMAP
ICMP Destination Unreachable Communication Adminstratively Prohibited
Table A3-7 - Top 3 alerts by alert count, in 81B.
73
Alert Count
158,564
Alert %
52.8
139,164
46.3
824
0.3
.........
...................
..................
.
........
Packets per hour versus time
300,000
-
_____
xx,81.O.0
&verage
-----
xx,8LO..
average
_____
262,500
-
225,000
-
o 187,500
-
P4 150,000
-
-
112,500
-
-
75,000
-
-
A (AA
I
-
-
37,500
-
0
0
72
60
46
36
Time (in hours)
24
12
84
Figure A3-1 - Packets per hour versus time in 81B.
Bytes per hour versus time
-
13,125,000
..
-
11,250,000
-
-
-
-
15,000,000
0
9,375,000
p4 7,500,000
QJ
5,625,000
pA
AA
3,750,000
1,875,000
A
A
-A
-~_
_
_
_
__
_
/\ I
A
0
0
12
24
36
48
Time (in hours)
Figure A3-2 - Bytes per hour versus time in 81B.
74
60
72
84
.
Destination IP address index versus time in xx.1.0.0/16 (skip=100)
.
65,535
~
57,343
-
49,151
-
40,959
-
32,767
-
'
. --....
.1"
-
..
packet type
*'
*
.- *
,4 .
*
TCP
UDP
ICMP
H
0
-V
172
0
-
1:
-
-m
.AP=
ANN
14.6
K.
FSO
0
24,575 - 6,m
H1-t --..
172 16,383 ID
8,191
'
-
84
72
60
48
36
Time (in hours)
24
12
0
Figure A3-3 - Destination IP address index versus time in 81B.
port
Destination
versus time (skip=100)
paket type-count
El
UDP
0
1._43=27
SYN
A
SYN/ACK
10000
-
+
0
1000
REST
A
-&A
~
A~
A
A
A
~
0
A
A
~A
-
4~A
A
A
~o
A
100 -
c
-.
-
~A,
a0EllIUD0
00 - UM.j---------M
w
OID
CQO
18
I0
o
1ODIDO
MO]
7
0l
00O 0
0
A
C0
0 EAD
.
0
=GO---
0
~A
'tI
de
't
of
o0
a
0o
0000aCM
_
A
0
10
A
A
A
'
I
0
12
24
60
48
36
Time (in hours)
Figure A3-4 - Destination port versus time in 81B.
75
72
84
574,614
T TCP OTHER
"0ID
-
0
16,993
RST/ACK
A
A
-4
1,041,576
ACK
8,400
230
..............
...................
. .......................
Total packets in each class C subnet in xx.a1.0.0/16
500,000
-
437.500
-
375,000
-
I
I
S312,500 ,
250,000-
E-, 157,500125,000
-
62,500
-
0-
224
192
160
128
96
64
32
0
Class C subnet index
Figure A3-5 - Total packets in each class C subnet in 81B.
Snort alerts versus time in xx.81.0.0
Unk. datagrm decode (1,
SYN pkt w/ data (03
Trunc. TCP options (7
bare byte unioude (9 X
3NMP AgentX (10
DDO mistream (Mr
SCAN FIN (17
IcWa Duarenah Bout (1s
ICMP Souree Quench (22
SNMP request top (2: X
?rC? header len > pkt (33
SKMP trap top (39
ICMP DUnreaoh Net (4tq
PORTSCAN>40N0 pkta (4
IFrmwered bit set (4s
ICMP lara packet (48
TCP data offset < 5 (73
Maserved Ir protacot (140
iCM? redirect heat (3a
UP1 len > payload (446
TCF port 0 (470
ICMP DUnrceach (BZ4
ICMP PING NWAP (130166
MS-8ML Worm (168564
0-
i
X
X
XX
X
xX
x
X
>W
XX
X>
X
X
X
XAX
X
X
X
X<
&<X X
X X<XW X
XX
XX
X
WX
X
)M
>00
X XO<
>X X
X
WX
Ax X X
Ix
X
X
>O< XX X
X
X
X XK X X
X
X
W
XXX
X
X0 X XXK >-XXx
K
X
X
XX
X
X
X
X
X X XX
XK X
.M
iM
k;
I
I
I
0
12
24
X
)((
X
X
>0(
X
X
X
X
X
X
X
X
X
X
X
XX
XX
))MHK
X
X~
X
X
XX
X
X
X
X
X X&X
X
X
W
X
i
I
!
I
I-
36
60
48
Ti me (in hours)
Figure A3-6 - Snort alerts versus time in 81B.
76
I
72
I
54
alerts/hour
* >0
* >186
* >372
* >558
* >744
* >930
* >1116
* >1302
* >1488
* >1874
* >1860
a
0
>2046
>2232
>2418
>2604
A.4 - XX.128.0.0/16
Total
Avg Rate
Peak Rate
Packets
7,080,623
21
3,930
Bytes
536,255,022
1,622
278,750
Table A4-1 - Packet and byte statistics for 128B.
%TCP
63.2
39.4
%UDP
33.3
58.9
%ICMP
3.5
1.7
TCP TYPE
SYN
SYN/ACK
3,620,414
289,605
PKT COUNT
Table A4-2 - TCP packet types in 128B.
RST
31,086
RST/ACK
515,151
OTHER
61
%
ACK
3,456
Destinations
Ports
Sources
Scans
Hosts
Avg
Packets
Total
Hosts
Avg
Avg
(Scans >
Pkts
Bytes
Pkts
4K pkts)
/Src
/Src
/Dest
65,536
108
18
1.4K
308K
441K (35)
54,024 384,173
4.6K
48,421
132
X
X
1,615
110,515
58
X
X
3
1,179
3.0K
282K
1,377
2.6K
- Statistics for all, the top 90%, and the top 50% of traffic in 128B.
Snort Alerts
Unique
Total
100
30
X
90
50
X
Table A4-3
Avg
Bytes
/Dest
8.2K
10.1K
206K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 445
1,664,061
23.5
80,138,061
14.9
UDP-
137
1,098,741
15.5
85,862,957
16.0
TCP- 135
832,482
11.8
39,879,165
7.4
Table A4-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 128B.
IP Destination
xx.128.8.14
Packets
Packet %
Bytes
Byte %
830,425
11.7
132,503,739
24.7
xx.128.247.192
469,569
6.6
19,373,962
3.6
7,773,099
60,694
0.9
xx.128.110.120
Table A4-5 - Top 3 destination IPs across all packet types by packet count, in 128B.
1.5
IP Source
212.64.161.175
Packets
181,920
Packet %
2.6
Bytes
23,308,759
Byte %
4.4
213.146.105.136
61.152.108.4
118,420
108,174
1.7
1.5
5,684,160
4,328,724
1.1
0.8
Table A4-6 - Top 3 source IPs across all packet types by packet count, in 128B.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
SNMP Public Access UDP
Table A4-7 - Top 3 alerts by alert count, in 128B.
77
Alert Count
158,105
Alert %
51.3
136,317
44.2
7,718
2.5
.........
......
.................
Packets per hour versus time
300,000
___xx.i26io.0
vrg
262,500
-
225,000
-
t__
-
66
0
P1
157,500
150,000
-
112,500
-
/
-
A
A VU
75,000
A A
M
p
37,500
0
0
12
48
36
24
60
72
84
Time (in hours)
Figure A4-1 - Packets per hour versus time in 128B.
Bytes per hour versus time
15,000,000
-
13.125,000
-
11,250,000
-
9,375,000
-
0
7,500,000
- ----
-
A
P4
5,625,000
A/A
_
A
A A4
A
1
\A
I!
3,750,000
1,875,000
0
0
12
24
60
45
36
Time (in hours)
Figure A4-2 - Bytes per hour versus time in 128B.
78
72
54
xx.128.0.0
average
, 'L=-
-- -
--- -
- ---
- -
.-....................
.....
..........................
.....
- -=
- -A
Destination IP address index versus time in xx.128.0.0/16 (skip=100)
65,535
57,343
.*
.-
packet type
"
TCP
*
UDP
*
ICMP
-
49,151
W.
.~
40,969
-
4
*
-..
-
---
-
~,,
32,767
~~
,,
0
.k.-
- .)by
24 575
M
_
~
'W&
~'-
16,383
~
4
8,191
0
72
60
36
48
Time (in hours)
24
12
0
54
Figure A4-3 - Destination IP address index versus time in 128B.
Destination port versus time (skip=10O)
pwtket
typ&--eount
0
UDP
0
SYN
A
SYN/ACK
+
&CK
10000
--
A,468
1000
RST/ACK
-615.1
7
100
.
oWcooouo
OCM 0 0mr
x
-
000
O
0
0
0 0
0MBDaG
95'
0
01(E
10
1
1
0
I
I
12
I
I
24
I
I
I
I
I
II
60
48
36
Time (in hours)
Figure A4-4 - Destination port versus time in 128B.
79
72
54
TCP
at.
OTHER
.....
.....
..
..........................
Total packets in each class C subnet in xxI28.0.0/18
437.500
-
375,000
-
I
I
I
I
500,000
I
'
S312,500-
4.250,000E
187,500
-
125,000
-
62,500
-
0-
0
32
II
I
I
224
192
160
128
96
Class C subnet index
64
-
~
I
I
I
Figure A4-5 - Total packets in each class C subnet in 128B.
Snort alerts versus time in xx.128.0.0
SCAN FIN (1C;
Reserved IF protocol (2
SCAN STN FIN (2
SYN pkt w/ data (5
bar byte unicode (5
ICP Unareaah Boat (15
SNUP AgentX (Io X X X
X
ICMP Sourcs Quench (19
Tcr header ien > pkt (a8
X
X
XX
PORTSCAN>4090 pkta (33 X X X
sr trap Uop (U4
>W
ICP DUnrech Net (4: X
IF re.rved bit .et (47
X X >=K
SNMP request top (64
HWare add. averflow (54
X X"x X
TC? .ata ofshot < 5 (65,
Part 58 to d 4 (10Z
TCP port a (133:
X X
ICMP large packet (144
X
X
X
ICMP redireat host (214
lUMP DUnreach (1890
XX
.X
UDP len > payload (3M7
SWM? public access (7710
ICMP PING NMAP (136512
MS-SQL Warn (15810,
X
X
X
X X
X
W
X
>0*0
X
X
>80OU'K
XX(
X
12
X
48
Time (in hours)
80
X XWXN
X
>&=8
60
M
X
>X
XM
X
>w<
X
X
W
72
>
AM
X
X
m
.
Figure A4-6 - Snort alerts versus time in 128B.
X
XX<*K>x~x
X
36
X
XX
X
24
X N
(0X X
]SEEK<
m ew
0-i
J
X X
>"
>0(
X
<X
X X<>X
XKX
X
X XX
X
X X
X
X
X
X
XX
X
X
AX0<
X
X Xx' 0X
XX Mx
X
>W
X>00<
X<
X
X
XX
X
X
X3K X X
X X|K
i
i
X
X
w
i
a
I
.
84
X
lK
alerts/hour
* >0
* >215
* >431
* >647
* >863
* >1079
* >1294
* >1510
* >1726
* >1942
* >2158
>2373
>2589
* >2805
* >3021
A.5 - XX.168.0.0/16
Total
Avg Rate
Peak Rate
Packets
8,544,791
26
2,650
Bytes
563,926,084
1,684
117,206
Table A5-1 - Packet and byte statistics for 168B.
%TCP
55.0
39.4
%UDP
42.4
59.2
%ICMP
2.6
TCP TYPE
SYN
SYN/ACK
PKT COUNT
3,821,079
282,380
Table A5-2 - TCP packet types in 168B.
RST
17,452
RST/ACK
519,781
OTHER
Avg
Bytes
/Src
1.5K
Destinations
Avg
Pkts
/Dest
130
65,536
6.5K
100
24
304K
Scans
Packets
(Scans >
4K pkts)
521K (46)
90
X
X
X
%
Snort Alerts
Unique
Total
ACK
3,057
Ports
Total
Hosts
52,512
379,794
Sources
Avg
Pkts
/Src
23
58
80,961
95
1.4
341
Hosts
Avg
Bytes
/Dest
8.6K
53,769
143
9.3K
24.3K
1.8M
15,411
50
X
X
X
2
176
Table A5-3 - Statistics for all, the top 90%, and the top 50% of traffic in 168B.
277
15.8K
Protocol - Port/ICMP Type
UDP-
137
Packets
Packet %
Bytes
Byte %
3,437,748
40.2
268,147,878
47.6
14.4
1,688,090
19.8
81,324,677
TCP - 445
TCP- 135
787,759
9.2
38,162,440
6.8
packet
count,
in
168B.
and
UDP
traffic
by
TCP,
packet
types
across
ICMP,
Table A5-4 - Top 3
IP Destination
xx.168.88.0
xx.168.171.94
Packets
Packet %
Bytes
Byte %
471,637
5.5
19,445,706
3.5
72,452
0.9
3,498,028
0.6
xx.168.190.53
43,929
0.5
2,123,544
0.4
Table A5-5 - Top 3 destination IPs across all packet types by packet count, in 168B.
IP Source
65.93.159.190
Packets
169,930
Packet %
2.0
Bytes
13,254,540
Byte %
2.4
138.89.152.173
129.44.61.42
116,279
110,295
1.4
1.3
9,069,762
8,603,010
1.6
1.5
Table A5-6 - Top 3 source IPs across all packet types by packet count, in 168B.
Alert Count
Alert %
MS-SQL Worm Propagation Attempt
158,928
52.3
ICMP Ping NMAP
142,832
47.0
432
0.1
Alert Name
Short UDP Packet, Length Field > Payload Length
Table A5-7 - Top 3 alerts by alert count, in 168B.
81
..........
..................
Packets per hour versus time
300,000
-
X.18 .0
___
262,500
-
225,000
-
verageI
-
C.,
157,500
0
C1)
p.,
CD
150,000
13
IAA
112,500
A
[f~
J\A
-
-
[A
75,000
37,500
0
I
I
0
12
60
48
36
Time (in hours)
24
72
84
Figure A5-1 - Packets per hour versus time in 168B.
Bytes
per hour versus time
15,000,000
xz.168.0.0
- F:---average
13,125,000
-
11,250,000
0
A
9,375,000
7,500,000
-
CU
.1
5,625,000
-
-V\
3,750,000
1,875,000
0
0
12
24
36
48
Time (in hours)
Figure A5-2 - Bytes per hour versus time in 168B.
82
60
72
84
..............
Destination IP address index versus time in x168.0.0/16 (skip=100)
1. -- s
65,535
57,343
....L ...6-..
Am-A--An
.......,4-
IL
nu 49,151
-~
packet type
M
a
M
TCP
UIJDP
ICMP
mA.~rME~~
.',
a
-
V
II
3 r
rm
ti
40,969 -
.,424,575
-P
zA
- -4 -
~
32,767
n.e
L~I~
16,383
i
--
8,191
0
64
72
60
48
36
24
12
0
Time (in hours)
Figure A5-3 - Destination IP address index versus time in 168B.
Destination port versus time (skip=100)
packet type-count
0 UD)P
3,e31.gep
0
10000
-
a
-
+
SYN/ACK
252,3B0
ACK
3,057
EST
o 1000
-
T
V
100 I)
ED
a0]]
I
oJ
W
A=aw%
0
Ic
0
o ap8
0
0 C
D
'a
CU
0 MD M3
d.,fl=ff...Im.%o
0DM
^ n. A a
o
00
Co%
5
0
900
a
pow
e
10
|I
0
17,4e3
RST/ACK
-
1
SYN
3,81.O7P
I
I
12
I
24
I
36
I
I
48
I
Time (in hours)
Figure A5-4 - Destination port versus time in 168B.
83
|
60
1
|
72
1
i
84
'
I
TCP
OTHER
341
........ .. . ........
-
Total packets in each class C subnet in xx.168.0.0/16
i
i
500,000
437,500
-
375,000
-
.3312,500 ,.2
5 0 00 0
,
-
-A
E
157,500125,000
-
62,500
-
0-
160
128
96
Class C subnet index
64
32
0
224
192
Figure A5-5 - Total packets in each class C subnet in 168B.
Snort alerts versus time in xx.168.0.0
I
I
I
3CAN
ICMP
I
I
I
I
I
i
I
A
alerts/hour
E >0
>186
*
X
X
>373
*
X
X
X
X
>559
X
*
X
XK
X<
* >746
XX
X X
X
* >932
X
X
XX X >
* >1119
X X
X
* >1305
)>X X
X
X X0<
XK X
X X )t§CX
* >1492
X X>
X X
X
X
AK x> * >1678
X
X X
XX XX
MK X
>1865
U
wK X
X X
XX
>2051
X WK X >X
AK X
>2238
M)K<
X
X
XI<
XE(
* >2424
XXX
X > * >2611
X
X X)OK X
XX X
X X XX
X
X X X
datagrm deaode (1)
SEMP public access (2)
ICMP Dunreach Hast (5)
BYN pkt w/ data (8]
AP webtrands scanner (10)
bare byte unioada (141 X
X X
at! (181
snWP
X
SNMP trap top (281
?CP header lee > pkt (28)
ICMP Source quench (3SS
X
SNU request top (A)
ICUP DUnreach Net (40) X(
IP reserved b~t set (44)
?ORTSCAK>4086 pkta (AS] 9< XXX
TCP data uSed < 5 (75)
Part 5$ to <1024 1041]
X X
TCP part 0 (108)
101r arg packet (147) X
UnIL
Fw
(3o:
X X
X
X X
X
))WX8
X
redirect heat (Z18)
ICMP DUnreach (429
UD? lea > paylad (432)
IM? PING NMAP (142am,
X
X
X
X
XK X
X
X
X
X ANM X
W
X
X X8W
0
)
12
X
X
X
S
SCM
&E+
ts-SQL Worm (15=8805
X
X
24
36
48
Time (in hours)
Figure A5-6 - Snort alerts versus time in 168B.
84
60
72
84
A.6 - XX.204.0.0/16
Avg Rate
Peak Rate
Total
18,220
Packets
11,987,846
36
728,750
1,871
626,254,640
Bytes
Table A6-1 - Packet and byte statistics for 204B.
%TCP
87.1
74.1
%UDP
11.1
24.7
%ICMP
1.8
1.2
SYN
SYN/ACK
TCP TYPE
2,378,700
4,428,012
PKT COUNT
Table A6-2 - TCP packet types in 204B.
RST
15,958
RST/ACK
3,567,517
OTHER
2,247
ACK
1,513
378,074
Sources
Avg
Pkts
/Src
32
Avg
Bytes
/Src
1.7K
Destinations
Avg
Hosts
Pkts
/Dest
65,536
183
38,679
279
14.7K
45,198
239
12.2K
8.8M
7,034
31
194K
97
X
X
X
50
Table A6-3 - Statistics for all, the top 90%, and the top 50% of traffic in 204B.
852
39.0K
100
26
302K
Scans
Packets
(Scans >
4K pkts)
760K (53)
90
X
X
X
%
Snort Alerts
Unique
Total
Ports
Total
Hosts
53,030
18,470
Avg
Bytes
/Dest
9.6K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 445
1,643,270
13.7
79,141,390
12.6
55,645,126
8.9
9.7
1,159,156
TCP- 135
14.3
1,147,945
9.6
89,539,710
UDP - 137
Table A6-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 204B.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.204.171.140
64,601
0.5
3,121,276
0.5
2,634,288
0.5
54,053
xx.204.237.82
0.5
2,603,037
53,884
xx.204.47.46
Table A6-5 - Top 3 destination IPs across all packet types by packet count, in 204B.
0.4
0.4
IP Source
61.177.64.171
Packets
1,676,994
Packet %
14.0
Bytes
73,787,736
Byte %
11.8
61.152.91.151
211.204.30.94
1,096,223
520,458
9.1
4.3
43,849,916
24,981,984
7.0
4.0
Table A6-6 - Top 3 source IPs across all packet types by packet count, in 204B.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
ICMP Destination Unreachable Communication Administratively Prohibited
Table A6-7 - Top 3 alerts by alert count, in 204B.
85
Alert Count
158,308
Alert %
52.4
141,336
46.8
458
0.2
..
..
....
.......
-....................................
...................
Packets per hour versus time
300,000
-
262,500
-
225,000
-
167,500
-
150,000
-
I0
I1)
.4.'
112,500
-
Ilk
---
x.204.0.0
average
-
At
Ak
-
-
75,000
37,500
0
0
12
60
48
36
Time (in hours)
24
72
Figure A6-1 - Packets per hour versus time in 204B.
Bytes per hour versus time
15,000,000
-
-- xx.204.0.01
-
0
13.125.000
-
11,250,000
-
9,375,000
A4 7,500,000
M
-
A
I
5,625,000
3,750,000
1,875,000
0
I
I
0
12
24
60
45
36
Time (in hours)
Figure A6-2 - Bytes per hour versus time in 204B.
86
72
84
-
average
Destination IF address index versus time in xx.204.0.D/16 (skip=100)
65,535
packet type
57,343
TCP
UDP
ICMP
0
N
'
.
'd49,151
p40,969
32,767
24,575
,
12
0
36
24
48
60
64
72
Time (in hours)
Figure A6-3 - Destination IP address index versus time in 204B.
Destination Dort versus time (skip=100)
paeket
type-ount
*
SYN
*
SYN/ACK
10000
-4-,
I-
0
1000
0
3,7,7
Aar
'S
-4-,
ii
100
II.)
10
0
1
'
0
I
I
12
24
I
I
I
36
48
Time (in hours)
Figure A6-4 - Destination port versus time in 204B.
87
1
60
36
2
72
64
TCP
OTHER
2,247
..........
.....
..........................
.................
......
Total packets in each class C subnet in xx.204.0.0/16
500,000
III-
I
437.500
-
375,000
-
S312,500-
o,250,000
-
E, 157,500-
125,000-
S2500
-7
LAA
O
-L-
32
C
96
64
160
128
224
192
Class C subnet index
Figure A6-5 - Total packets in each class C subnet in 204B.
Snort alerts versus time in xx.204.0.0
S
ardware type (X
X
Reserved IP protocol (1:
bare byte unicode (10
X
X
X
SYN pkt w/ data (IX: XX
X
X
SNP AgentiX (3: <K
X
X X
>
FIN (1:
X
XX
X
X XX
ICMP DUnreach Heet (26. X
XX
X
X
SNMP trap top (28:
'CP header len > pkt (a: X X X
XX X
WKX X
X
TOCP port 4 (28:.
X X
X< X
ICMP DUnreaeh Net (A0] X
XX
X XEXOOOX
X
EP reserved bit set (4?!
>0X XX X(
W
X
PORSCAN>40s pkta (63: W X X<
X
X
>WC
Stow request top (":
X
X
IM? Source Quench L4:
X X XX
XX
X XX
TCP data aofset < 5 (87,
add. overflow (123]
Hire
ICM? large packet (153) X
X
Port OZ to <aIR4 (m:
X
X
IMP redir ect host (3WB X X
XX X
UDP len > paoed (425
ICMP Utrneach (468
IcON PING NUAP (1435W x
WS-SQL Worm (15800W*
SCA
x
xx
>X
alerts/hour
K X
X
XX
X
xK
W
>)AK X
00
X
X >X
24
36
X
X
X
X
X
XI
X
MK
XX
>
X
XX(
X
X
48
88
)X:
A W
X4=2B W
MK8(
X
3K X
X
X
Time (in hours)
Figure A6-6 - Snort alerts versus time in 204B.
X
XX >W
m
12
W
"XX *XX<
XOXX
KK
X >W<
)K
X
X >0<
m
XX
,
X
/AC<
)0OCXXX
I
i
I
i
I
p
I
I
I
Inv
60
X
X XX
m
a
72
X0
X><
KX
84
*
*
*
*
*
*
M
*
a
*
*
*
>165
>371
>557
>743
>929
>1115
>1301
>1456
>1672
>18658
>2044
>2230
>2416
>2602
...................
A.7 - XX.229.0.0/16
Total
Avg Rate
Peak Rate
Packets
6,209,234
19
1,540
76,713
Bytes
382,977,523
1,144
Table A7-1 - Packet and byte statistics for 229B.
%TCP
75.1
57.7
%UDP
21.2
40.2
%ICMP
3.7
2.1
SYN
I SYN/ACK
TCP TYPE
PKT COUNT
3,785,241
283,895
Table A7-2 - TCP packet types in 229B.
RST
17,826
RST/ACK
523,502
OTHER
43
100
23
300K
Scans
Packets
(Scans>
4K pkts)
635K (50)
Avg
Bytes
/Src
373,498
Sources
Avg
Pkts
/Src
17
1.0K
Destinations
Hosts
Avg
Pkts
/Dest
95
65,536
90
X
X
X
118,494
47
3.0K
51,528
109
6.6K
1.5K
96.6K
9,107
50
X
X
X
3
2,113
Table A7-3 - Statistics for all, the top 90%, and the top 50% of traffic in 229B.
341
17.8K
%
Snort Alerts
Unique
Total
ACK
3,102
Ports
Total
Hosts
52,384
2,275
Avg
Bytes
/Dest
5.8K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 445
1,583,517
25.5
76,278,180
19.9
23.1
88,552,308
18.3
1,135,286
UDP- 137
TCP- 135
969,172
15.6
47,099,093
12.3
ICMP,
TCP,
and
UDP
traffic
by
packet
count,
in
229B.
Table A7-4 - Top 3 packet types across
IP Destination
Packets
Packet %
Bytes
Byte %
xx.229.251.176
484,057
7.8
19,973,460
5.2
9,331,825
193,626
3.1
xx.229.80.19
xx.229.140.73
102,853
1.7
4,968,571
Table A7-5 - Top 3 destination IPs across all packet types by packet count, in 229B.
2.4
1.3
IP Source
61.109.112.63
Packets
127,344
Packet %
2.1
Bytes
6,112,512
Byte %
1.6
83.129.81.10
61.152.108.4
118,905
118,194
1.9
1.9
6,183,060
4,729,532
1.6
1.2
Table A7-6 - Top 3 source IPs across all packet types by packet count, in 229B.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
Short UDP Packet, Length Field > Payload Length
Table A7-7 - Top 3 alerts by alert count, in 229B.
89
Alert Count
158,061
Alert %
52.7
139,182
46.4
445
0.2
..................
..........
............
Packets per hour versus time
300,000
-
225,000
-
167,500
-
150,000
-
112,500
-
IU
p.,
L....
4.
1.
4.
4
L
~
I
~
T
-
262,500
I0
-4.
.7
U
p.,
AAI
75,000
average
---
xx229.0.0
average
-
IA-
-
37,500
xx.229.0.0
---
I
m
-r
-
0
0
12
24
60
36
45
Time (in hours)
72
84
Figure A7-1 - Packets per hour versus time in 229B.
Bytes per hour versus time
15,000,000
-
13,125.000
-
11,250,000
-
-
9,375,000
0
7,500,000
-
5,625,000
-
3,750,000
-
A
I
-
A!
A
\q
--
1,875,000
0
0
12
24
60
45
36
Time (in hours)
Figure A7-2 - Bytes per hour versus time in 229B.
90
72
84
A
-----.....
...
.................
...................
Destination IP address index versus time in xx.229.0.0/16 (skip=1001
65,535
-
.
.,
T. -
57,343
49,151 -
'
packet type
N TCP
U IDP
* ICMP
-X-
40,969 32,767
24,575
4)
-t
:
16 ,383
-iW
-6
0
24
12
V-P
72
60
48
36
Time (in hours)
54
Figure A7-3 - Destination IP address index versus time in 229B.
Destination port versus time (skip=100)
packet type-count
10000
S..
0
1000
j4~
A
-~
AA
0
0
%o00
000
0
oc
000
0i
0
0
OQ
10
|
l
I
I
i
1
0
12
o
SYN
3,7We,241
A
SYN/ACK
z2s,aw
+
ACK
S;A02
EST
17,8w6
TCP OTHER
43
0
0
UDP
1,317,737
RST/ACK
100
0
0
24
36
48
Time (in hours)
Figure A7-4 - Destination port versus time in 229B.
91
60
72
84
00.
--
-
-- I w
17 ....
.
.......
.........
................
................
- - -..-- . ..
Total packets in each class C subnet in xx229.0.0/16
i
500,000
I
'
- -
I
'
437,500 375,000 .0312,500 -
.250,000
0
-
157,500-
E
125,000
-
62,500
-
032
160
128
96
Class C subnet index
64
224
192
Figure A7-5 - Total packets in each class C subnet in 229B.
Snort alerts versus time in xx.229.0.0
SNMP
ICMP
x
Hart (11)
xiaeode (t11
X
X
X
X< X
W(
X
TCP port 0 (1491
Port 5S to <1024 (205)
ICILl lara, packst (21a)
ICMP radilrat hest (227
Heerved IF protoool (317:
INP DUnreadh (39)
UDP
len
>
><
X
X
X
X
X
xK
X )X
Xx >K
X
X >x
X
X
)<
X
S1w X
X MX0ox
& X
>
X
X
X
X
XX
X
X
X
X
X
XX
3xWXX
X)AC X X
XMX X
X X X X
>OX X 3
xx
W xx
X XX< X
X
>I<
MX
X
X
X
X
MS-SQL Warm (i5h0)
0)
X R
x<
X
XXX
x)X
X
X
X X
parload (445
NMAP (10132
MIK X
X
W
X<xxx
X
X XOK
data offset < 5 (o)
ICMP PING
X
X
pkte (0)0
SNMP request top (e8)
X
X
X
X
XXX<
POMNC5AN>40111
TCP
W
(2e)
SXMP trap top (32)
W resrved bit .et (47)
TCP header len > pkt (47)
><X
X
XX
X
12
24
60
36
48
Time (in hours)
Figure A7-6 - Snort alerts versus time in 229B.
92
X >
X
X
>X
X
X
X
SYN pkt w/ data (13)
ICUP Sauroa 4;uaneh (27:
IW DUnruach Net
X
X
Agentx (6)
DUareach
bare byte
I
I
I I
SCAN PIN (1)
X
72
54
alerts/hour
0 >0
M
>185
* >370
* >555
* >740
* >925
* >1110
* >1295
* >1480
* >1665
* >1850
>2035
>2220
* >2405
* >2590
A.8 - XX.243.0.0/16
Peak Rate
Total
Avg Rate
738
19
Packets
6,368,592
40,888
391,935,243
1,171
Bytes
Table A8-1 - Packet and byte statistics for 243B.
%TCP
76.8
60.0
%UDP
19.7
38.1
%ICMP
3.5
1.9
ACK
1,480
RST
15,470
RST/ACK
181,311
OTHER
21
SYN/ACK
SYN
TCP TYPE
151,263
4,491,391
PKT COUNT
Table A8-2 - TCP packet types in 243B.
%
Destinations
Scans
Ports
Sources
Avg
Hosts
Avg
Packets
Total
Hosts
Avg
(Scans >
Pkts
Bytes
Pkts
4K pkts)
/Src
/Src
/Dest
65,536
97
752K (56) 48,984 383,538
17
1.0K
301K
106
48
3.0K
53,977
X
16
120,112
X
195
16,329
1,343
2.4K
153K
3
X
X
- Statistics for all, the top 90%, and the top 50% of traffic in 243B.
Snort Alerts
Total
Unique
100
25
90
X
50
X
Table A8-3
Avg
Bytes
/Dest
6.0K
6.5K
11.1K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 445
1,647,118
25.9
79,324,868
20.2
21.5
16.9
84,054,438
1,077,621
UDP- 137
51,427,972
13.1
1,061,316
16.7
TCP- 135
Table A8-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 243B.
IP Destination
Packets
Packet %
Bytes
xx.243.174.77
93,871
1.5
4,535,629
1,322,235
27,435
0.4
xx.243.172.166
0.4
1,321,513
xx.243.246.65
27,422
Table A8-5 - Top 3 destination IPs across all packet types by packet count, in 243B.
IP Source
211.243.194.82
83.129.66.115
61.35.241.4
Byte %
1.2
0.3
0.3
Packets
Packet %
Bytes
Byte %
689,308
119,435
66,429
10.8
1.9
1.0
33,086,784
6,210,620
3,188,592
8.4
1.6
0.8
Table A8-6 - Top 3 source IPs across all packet types by packet count, in 243B.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
Short UDP Packet, Length Field > Payload Length
Table A8-7 - Top 3 alerts by alert count, in 243B.
93
Alert Count
158,555
Alert %
52.6
141,024
46.8
462
0.2
-.- .....
..
.............
........
Packets per hour versus time
300,000
7~3.o.O
-
262,500
-
225,000
-
~ag~J
167,500-
0
124
150,000
-
112,500
-
75,000
-
37,500
-
V
C.)
0-
AAl)
A~MA
q
0
ff ---
\j VT4JT- V V
60
45
36
24
12
72
84
Time (in hours)
Figure A8-1 - Packets per hour versus time in 243B.
Bytes per hour versus time
15,000,000
~
---
0
13,125,000
-
11,250,000
-
9,375,000
7,500,000
-
5,625,000
-
w
3,750,000
2
A
A,
A
-
A
/\A
jm l
-
1,875,000
0
0
12
24
60
45
36
Time (in hours)
Figure A8-2 - Bytes per hour versus time in 243B.
94
72
84
xx243.0.0
average
--
........................
Destination IF address index versus time in xx.243.0.0/16 (skip=100)
-
40,959
-
32,767
-
24,575
-
packet type
* TCP
- N
UDP
M ICMP
V
si*
b~h
-
~.. -_______________
lf~
-
4
a-fl !9 9! ~
$4
.
~
-E
aI
5'.*49,151
-4----
g 1-
I19
57,343-
M
jL...
J.~
65,535
~r~d~U ~
N
--
rd
14
-
I.
:
-
-
-
!-4
-.
-- -
-SA
16,383
-
6
-.4
f4
3J
8,191
0- r
0
-
"F
60
45
Time (in hours)
84
72
36
24
12
Figure A8-3 - Destination IP address index versus time in 243B.
Destination port versus time (skip=00j
p&Cket type-CoUnt
o UDP
7 ;_
11,1501,8
10000
jV
'Y-
11L a-
0
SYN
4,491,391
A
SYN/ACK
+
ACK
-I-,
1.
0
1000
'S
.4~4
15,470
4
0
RST/ACK
0
0
0
0
181.311
0
TCP OTHER
21
-
100
0
II)
000D0
0
001 M
00 0 K EJ
0=ICCOC00=iE 00 00 COW
0M0
0,
1113
CM 01
CCI 0
000
e-
0
JE M W
110 9IX
C13 a C
MM
OOZE>0 001M
C (W0
0 oo
00
CP
0
0
0
10-
~1
0
-
I
I
12
I
I
24
I
36
45
I
Time (in hours)
Figure A8-4 - Destination port versus time in 243B.
95
60
I
I
72
I
54
|
'
F
.
.......
--------------------------------.
.....
...................
Total packets in each class C subnet in xx.243.0.0/16
-
500,000
-
437.500
-
375,000
-
1
I
I
I
I
I
I
312,500.250,000 -
E, 157,500
-
125,000
-
62,500
-
0-
o
32
192
160
128
96
Class C subnet index
64
224
Figure A8-5 - Total packets in each class C subnet in 243B.
Snort alerts versus time in xx.243.00
i
X
datagrm decode (1)
Jnv hardware typs (9)
MF webtrend. ocanner (3)
bare byte unioade (3 X
TPrP Get (5)
>( X
SNMP AgentX ()
SYN pkt w/ data (9)
X
X
TCP part 0 (12)
X
ICMP DUnreach Bost (13)
X
X
ICMP Source Quah (22)
X
<
Xx=
-CP header l.n > pkt (3)
WR X
X
W,
ItP IlUnreach Not (33) W
X
XX X>)XOC
XX X
IP reserved bit set (S:
XX
SNMP request top (4)
X
X X X )X XX
XXx' X XX
PORTSCAN>40958 pkts (58) X > OK
X
X X X
X
)M
SMMP trap top (83)
X
EWare add. averflow (89)
Ao X<
X
X
TC? data offset < 0 (1o1
X
X
KCM large packet (8s X
CMP redirect hoAe (40)
ICMP DUnreach (97)
XX
X X
X X
UDF len > payliud (453)
ICM? PING XMAP (14104
*)M
MS-39L Worm (168564] WM+X
Unk.
X
X
<
)X
X
W
XXX<
X NW X
X
X
I
0)
elerts/hour
M >0
* >187
* >375
X
X X
X
* >562
X
) * >750
Xx
* >937
X
XX
* >1125
* >1312
* >1500
XX
X
* >1687
X
A)XC
A#< U >1875
X
I'xX
X X
>2062
X X ><
>2250
)
X
>2437
X(XX X <X X< X X X >< *
* >2625
XK YV<
X X
X
12
24
X
AM
I I
X
M]
X
36
48
Time (in hours)
96
X
>X
I
Figure A8-6 - Snort alerts versus time in 243B.
)
X
I
60
7
72
X
MK
84
li
..
..........
A.9 - XX.244.0.0/16
Avg Rate
Peak Rate
Total
12,029,925
36
12,690
Packets
508,750
Bytes
626,345,354
1,871
Table A9-1 - Packet and byte statistics for 244B.
TCP TYPE
SYN
SYN/ACK
PKT COUNT
4,590,350
2,039,287
Table A9-2 - TCP packet types in 244B.
100
24
302K
Scans
Packets
(Scans >
4K pkts)
972K (59)
90
X
X
X
%
Snort Alerts
Unique
Total
I
ACK
1,399
%TCP
87.5
74.7
%UDP
10.6
24.1
%ICMP
1.9
1.2
RST
17,314
RST/ACK
3,824,517
OTHER
2,174
397,024
Sources
Avg
Pkts
/Src
30
Avg
Bytes
/Src
1.6K
Destinations
Avg
Hosts
Pkts
/Dest
65,536
184
Avg
Bytes
/Dest
9.6K
48,597
223
11.7K
43,470
249
12.6K
907
41.6K
Ports
Total
Hosts
53,087
18,326
6,634
X
21
35
172K
7.9M
X
50
X
Table A9-3 - Statistics for all, the top 90%, and the top 50% of traffic in 244B.
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 445
1,793,459
14.9
86,361,152
13.8
13.6
9.1
85,321,392
UDP- 137
1,093,864
8.4
1,088,412
9.1
52,728,327
TCP - 135
Table A9-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 244B.
IP Destination
Packets
Packet %
0.3
xx.244.103.213
37,237
36,960
0.3
xx.244.214.245
30,026
0.3
xx.244.165.223
Table A9-5 - Top 3 destination IPs across all packet types by packet count,
Bytes
Byte %
1,808,922
0.3
1,785,738
1,454,028
in 244B.
0.3
0.2
IP Source
61.177.64.171
Packets
1,380,146
Packet %
11.5
Bytes
60,726,424
Byte %
9.7
61.152.91.151
220.78.67.194
1,223,757
495,142
10.2
4.1
48,952,460
23,766,816
7.8
3.8
Table A9-6 - Top 3 source IPs across all packet types by packet count, in 244B.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
ICMP Destination Unreachable Communication Administratively Prohibited
Table A9-7 - Top 3 alerts by alert count, in 244B.
97
Alert Count
157,742
142,389
511
Alert %
52.2
47.1
0.2
Packets per hour versus time
300,000
-
262,500
-
-
225,000
-
-
.4.,
150,000
----
xx244.0.0
average
K>bI
-
187,500
0
---
-
A
t\A
-
112,500
h
A
75,000
37,500
0
0
12
24
46
36
60
72
84
Time (in hours)
Figure A9-1 - Packets per hour versus time in 244B.
Bytes per hour versus time
15,000,000
-
13,125,000
-
11,250,000
-
---
9,375,000M.
0)
7,500,000
-
el
k--
5,625,000
(V
if
i
I
I
i i
V
-
3,750,0001,875,000
i J i i i i iA1il 1
y
UJv
-
0-
,
0
I
I
12
24
46
36
Time (in hours)
Figure A9-2 - Bytes per hour versus time in 244B.
98
60
72
84
x.244.0.0
..
.........................
Destination IP address index versus time in xx.244.0.0/16 (skip=100)
65,535
packet type
57,343 -.
-
0
m
M
TCP
UDP
ICMP
S49,151-
w 40,959 S32,76724,575 16,383-
-
8,19100
54
72
60
48
36
24
12
Time (in hours)
IP address index versus time in 244B.
Figure A9-3 - Destination
Destination port versus time (skip=10O)
p&cket type-count
*
UDP
0
SYN
4,390,350
A
SYN/ACK
+
ACK
10000
0
1000
2,o3,287
1,399
NOT
17,314
&AA
RST/ACK
0
'S
1,Z74.019
3,824,517
AA-
TCP OTHER
A
-
100
4)
CMi]n
0
00fJ0ODifl
a
0
00W
3
O
0WW0O
0DOO 0
0a]i
0
0m
01 M Co 13
OW MMn~o
Lo
i
0
oo
To 0 li
11
00
,000
WtunO
[1 0
M
M
0
00 0 0
(E'
10-
1
I
0
I
I
I
I
I
12
24
36
48
Time (in hours)
Figure A9-4 - Destination port versus time in 244B.
99
60
72
54
- -...............
-,Cm
I ~~ ~~ ~ ~~~~ ~~~~~ ~~~
....
.......
....
Total packets in each class C subnet in xx.244.00/18
500,000
437.500
-
375,000
-
250,000,)~
E-
157,500
125,000
-
62,500
-
0-
224
192
160
128
96
64
32
0
Class C subnet index
Figure A9-5 - Total packets in each class C subnet in 244B.
Snort alerts versus time in xx.244.0.0
Reserved IP protocol (11
bare byte niode (4
UDP port 0 (7)
SUN FIN (a
X X
X
Source Quench (20:
len > pkt (21:
PORTSCAN>400 pkte (59) <X X))N0(
X
M? data offset < 5 (KI)
ICMP large paokaet (lMD) X
ICMP redirect host (348) X
UDP len > payload (442)
(UN? IUiirenoh ( 6
1CM? PKNG NWAP (142189
4t
FAIK:X
lAS-SQL Wwmo (1677A
0
X>X
X
>X
>
W
m
X *
XM0w X
MK
I
24
36
x
xx
X X
X
X
X
X
X XX
E
M3
48
Time (in hours)
Figure A9-6 - Snort alerts versus time in 244B.
100
X
~
X( X<
>0 X
X
X
X X
X
XX X
X
XX
X
12
X
X
xXCK
X
X E
XX
X
X
x
0X
XX
>WX
X
X<
X
X X XK
XX
X4K
I
X
X
)W
X
xx<
XOxVcWx
I
alerts/hour
>
X
X
XX X
XX
X
X XX
X
X
X
X
X X
ICMr DUnreach foet (35:
SUMP trap top1 (52
0
i
i
I
i
X
X XX
XX
X
X
X
X
X
TCP header
SNW request top (41)
IP reservud bit met (6a'
I
X
X
WMP DUkzeach Not (42)
TCP part 0 (45)
i
X
SYN pkt w/ data (0) C
SNMP AgentZ (20)
SCM
I
,
I
i
I
i
60
M
M
I
I
72
84
>WK
M
*
*
*
*
*
*
*
a
n
IN
>0
>186
>372
>558
*>744
>930
>1116
>1302
>1458
>1674
>1860
>2046
>2232
>2418
>2604
A.10 - XX.248.0.0/16
Total
Avg Rate
Peak Rate
Packets
7,216,170
22
3,300
Bytes
435,681,460
1,301
145,000
Table AIO-1 - Packet and byte statistics for 248B.
TCP TYPE
SYN
I SYN/ACK
PKT COUNT
5,279,886
157,363
Table A10-2 - TCP packet types in 248B.
I
ACK
2,250
%TCP
79.0
63.3
%UDP
17.8
34.8
%ICMP
3.2
1.9
RST
25,100
I RST/ACK
OTHER
208
185,049
455,334
Sources
Avg
Pkts
/Src
16
Avg
Bytes
/Src
957
Destinations
Hosts
Avg
Pkts
/Dest
65,536
110
161,093
40
2.5K
51,670
126
7.5K
50
X
X
X
3
3,845
938
62.8K
7,989
Table AIO-3 - Statistics for all, the top 90%, and the top 50% of traffic in 248B.
452
23.5K
100
25
295K
Scans
Packets
(Scans >
4K pkts)
637K (51)
90
X
X
X
%
Snort Alerts
Unique
Total
Ports
Total
Hosts
49,015
16
Avg
Bytes
/Dest
6.6K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 445
1,782,117
24.7
85,820,186
19.7
13.0
16.2
56,572,837
1,168,738
TCP - 135
19.9
15.4
86,747,466
UDP - 137
1,112,147
Table A10-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 248B.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.248.246.112
692,920
9.6
33,349,840
7.7
3.9
13,671,411
283,109
80,480
1.1
3,882,780
across all packet types by packet count, in 248B.
3.1
0.9
xx.248.134.58
xx.248.18.222
Table A 10-5 - Top 3 destination
IPs
IP Source
220.87.74.65
Packets
471,795
Packet %
6.5
Bytes
24,533,340
Byte %
5.6
83.129.66.115
68.72.89.180
114,492
60,719
1.6
0.8
5,953,584
2,914,512
1.4
0.7
Table A1O-6 - Top 3 source IPs across all packet types by packet count, in 248B.
Alert Name
Attempt
MS-SQL Worm Propagation
ICMP Ping NMAP
Short UDP Packet, Length Field > Payload Len gth
Table A10-7 - Top 3 alerts by alert count, in 248B.
101
Alert Count
157,516
Alert %
53.4
135,307
45.8
446
0.2
...............
Packets
per
hour versus time
262,500 -
-
225,000
-
-
0
157,500
-
-
I-
150,000
-
300,000
/
112,500
A
75,000
At A
LI-V
I\
xx.248.0.0
---
average
-----
-
37,500
0
0
12
24
60
45
36
Time (in hours)
72
84
Figure A10-1 - Packets per hour versus time in 248B.
Bvtes ner hour versus time
15,000,000
-
13,125,000
-
11,250,000
-
9,375,000
-
7,500,000
-
5,625,000
-
3,750,000
-
4'
/\
A
,- 'I V Q V ,
At
1,875,000 0-
i
0
i
12
24
60
45
36
Time (in hours)
Figure A10-2 - Bytes per hour versus time in 248B.
102
72
84
-
verage-
. .. .....
. .....
...
........
....
. ..
............................................
Destination IP address index versus time in xx.248.0.0/16 (skip=100)
65,535
packet type
"
*
57,343
TCP
D
IJDP
ICMP
49,151
40,959
Ai
32,767
14-
0
24,575
.-I
-T
16,383
-
,-
-
--
--
1-
^
-
-
8,191
i*
0
24
12
0
60
48
36
72
54
Time (in hours)
Figure A10-3 - Destination IP address index versus time in 248B.
Destination port versus time (skip=100)
p&.ket type-count
13 UDP
CAA
10000
0
A
%_____
lll
-.
o
1.288,101
SYN
A
SYN/ACK
+
ACK
5,279,B86
2,250
EST
28,100
1000
PST/ACK
185.049
-4
TCP OTHER
208
100
0o
4
0
00
C9 0
000 000
0
10
1
I
0
I
I
12
24
I
I|
48
600
36
Time (in hours)
Figure A10-4 - Destination port versus time in 248B.
103
7
72
84
.....
.
- .....................
.........
..............
...
. .....
.............
Total packets in each class C subnet in xx.248.0.0/16
.
500,000
-
437,500
-
375,000
-
312,500
-
d.260,00
-
I
-
E, 157,500125,000
-
62,500
-
0- I
)
I
I
I
I
32
I
I
'
I
224
192
160
128
96
Class C subnet index
64
Figure A10-5 - Total packets in each class C subnet in 248B.
Snort alerts versus time in xx.245.0.0
hardware type (a:
SYN pkt w/ data (0:
X
bare byte unioade (9
ONaP AgeutK (e:
X
DUOS matream (19:
ICMP DUnreach Host (a:
SCAN FIN (27:
SHMP trap top (2
ICMP Sure Qveneh (31:
ICWP sUnramh Not (39: *K
SNMP request top (4:
TCP part 0 (AS'
TCP header lei > pkt (AS'
IP resrad bit set (AS:
FORTSCAU>AOW pkt. (W1: XM
HSare ad& averflow (SO
TCP data affet < 5 (a3:
XX
X
XW
X
XX
XX
XX
X
XX
X
XX
X)K X X
X
XX >8X
)MM
X
X)3 WK< >NM@1C
NK
X X
X
x
I
12
X
X
WX
X
X
X
XX X >
>WE
X
X XX
AK >3
>DEKX
>X X
X< X
~xXX >x
X
X
X
X)imc
>X
XK
X
X
XX XX
XKX
XX
X
W*KWX
X
___
-
)
X
K
X
w
I
X
X
>WgKX
)XX
X
XX
X
X XX
X
X X
X
W
Reserved IF protocol (57:
X X
ICMP rcdireot heat (0oa:
ICM? DXnreach (489.
X
UDF lea > payload (440:
ICP PITNG NMAP (15WO8D I ___________________
MS-ML Worm (167516 FM*
I
X
X(
K
X
X
X
)0K
X
X
>Ox
X
VWCM largn packet (a#,: X
0-
alerts/hour
X
ITv
x.~
I
I
I
I
24
36
48
Time (in hours)
Figure A1O-6 - Snort alerts versus time in 248B.
104
60
72
84
*
*
*
*
*
*
*
*
*
*
>0
>184
>369
>554
>739
>924
>1108
>1293
>1478
>1663
>1848
U
>2032
>2217
>2402
*>2587
A.11 - XX.251.0.0/16
Total
Avg Rate
Peak Rate
Packets
5,548,817
17
1,350
Bytes
352,415,753
1,052
64,653
Table A1-1 - Packet and byte statistics for 251B.
%TCP
73.0
55.1
%UDP
23.1
42.8
%ICMP
3.9
2.1
TCP TYPE
SYN
SYN/ACK
PKT COUNT
3,651,252
149,694
Table A11-2 - TCP packet types in 251B.
RST
15,063
RST/ACK
180,622
OTHER
67
ACK
1,322
383,100
Sources
Avg
Pkts
/Src
14
Avg
Bytes
/Src
920
Destinations
Avg
Pkts
/Dest
65,536
85
139,494
36
2.3K
52,630
95
6.0K
X
2
3,214
863
61.4K
12,538
50
X
X
Table Al 1-3 - Statistics for all, the top 90%, and the top 50% of traffic in 251B.
221
12.4K
100
25
297K
Scans
Packets
(Scans >
4K pkts)
591K (43)
90
X
X
X
%
Snort Alerts
Unique
Total
Ports
Total
Hosts
49,015
12
Hosts
Avg
Bytes
/Dest
5.4K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 445
1,673,220
30.2
80,599,136
22.9
UDP-
1,106,091
19.9
86,275,098
24.5
846,056
15.3
41,066,937
11.7
137
TCP- 135
Table AlI-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 251B.
IP Destination
xx.251.72.243
xx.251.5.1
xx.251.200.186
Table A1-5 - Top 3 destination IPs across all
Byte %
Packets
Packet %
Bytes
95,372
1.7
4,608,147
1.3
39,036
0.7
1,886,030
0.5
23,973
0.4
1,155,027
0.3
packet types by packet count, in 25 lB.
IP Source
217.94.211.66
Packets
114,762
Packet %
2.1
Bytes
5,508,576
Byte %
1.6
83.129.64.175
61.153.17.25
111,785
106,688
2.0
1.9
5,812,820
4,694,272
1.7
1.3
Table All-6 - Top 3 source IPs across all packet types by packet count, in 251B.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
ICMP Destination Unreachable Communication Administratively Prohibited
Table Al1-7 - Top 3 alerts by alert count, in 251B.
105
Alert Count
157,331
137,691
397
Alert %
53.0
46.4
0.1
71
.....................
..................
..
........
....
.....
..................
Packets per hour versus time
300,000
4
L......
+ -i-----
+ -1----
+ -i-----
+
±
-
xx251O.0
--
average
262,500
225,000
157,500
-
150,000
-
0
.,
A
p
IV
10
r14
112,500
75,000
-
A
A
37,500
A
-
A
A!
0
0
45
60
36
Time (in hours)
24
12
72
84
Figure A1-1 - Packets per hour versus time in 251B.
Bytes per hour versus time
15,000,000
-
4
4
~-I------
4
-I------
+ -i------
~
+ -'----
T7::TLo21.]0
13,125,000
--
11,250,000
-
9,375,000
P4 7,500,000
-
M
5,625,000
A
3,750,000
-IJ
V
A
,
A
nX\ A A.
\)/Q
-
IK
A
1,875,000
0
0
12
24
60
36
45
Time (in hours)
Figure Al1-2 - Bytes per hour versus time in 251B.
106
72
64
V-
- - - --- - - - --
0
- -
--
- - - - --
. ................
......
..........
-............
.
. ..............................
Destination IP address index versus time in xx.251.0.0/16 (skip=100
65,535 iI
I
57,343
2- ----4 -i--- !- A..
I*.,'
Avg
.~
-
*e
M 49,151
4
I
I
-- .7P I .-
I
t
- *
4r
hr.-
-4
-
32,767
-
24,575
-
-MV
40,959
packet type
M TCP
- *
UDP
* ICMP
P
J.
-Ia
'4,
-it
-4
16,383
iU
-
8,191
-. -
4~,~
0
I
I
12
0
,
4
24
-
-
-
64
72
48
60
36
Time (in hours)
Figure AI1-3 - Destination IP address index versus time in 25 1B.
Destination port versus time (skip=100)
packet type-count
10000
*-W'I~~~~
*1
A.~
.~
3~
N+ -
~i_4-'
~
-
~
U
U~AL
'4Z~
-
1000
A
0
A
0
3
1 O 1O
O oME
COO
00
D ,
0 U C 0
00 dD0CQGD
0
000
01
D 01EI3
0 031 Jf
AD40 0
00
1
C
0
K(WDO 4co n
000=x0 ODD 00Ce5 DO COO
0/
000
10
1
0
12
24
60
48
Time (in hours)
36
Figure AtI-4 - Destination port versus time in 251B.
107
A
SYN/ACK
14s694
+
ACK
1,322
18.W822
-
100
J
SYN
RST/ACK
0
M E~ L
0
16,083
S
-A
[
UIYP
1.,27%544
I~AT' 74K 0
0
*D GM
0l
4~~24!
ki
72
64
0
'W:
TCP
8?
OTHER
------- ---
....
-- -- ----..............................
xx251.0.0/16
Total packets in each class C subnet in
500,000 ,I
437,500
-
375,000
-
250,000 E157,500
-
125,00 -
62,500
-
0
64
32
0
224
192
160
128
96
Class C subnet index
Figure All-5 - Total packets in each class C subnet in 251B.
Snort alerts versus time in xx.251.0.0
.
1
e
I
I
i
i
a
alerts/hour
0 >0
X
X
aw
(
XX
X
M<
XX
XXXM<
X
>X>XX X X
X
X
> K >wK
X
X
X X
X<X
>X x
WAx
12
24
X
XX X X
X
X
X
X
XX
X
>
X
X
>XX
XX
I)
X)>X
XX
X W
>)W X
>w
W X
>W>VK
MM
X X
X
W
X
X
IOM)CNQ>
IM
_____
48
Figure Al1-6 - Snort alerts versus time in 251 B.
108
60
>549
>732
>915
>1098
>1281
>1464
>1847
>1830
>2013
>2196
>2379
>2562
>UKEK
X
Time (in hours)
*
*
>183
>366
IKX >
X
XX
36
U
X
m
-]M
0
X
X
*
*
*
*
*
*
*
*
*
X
X
X
X
X X
X
XX
XX
X
X
X
>
X
X
X
X
bare byte unioade (9 X
>0<
X
SYM pkt w/ data (10
1CMP DUnreaoh Beat (17
ICWP Scarce Queah (29
X
AM(
SWMP trap top (30 X
X
X
TCP header len > pkt (20
X>O< X
X
SCAN FIN (33 K & X
X>XX
X
IMIP DUnreach Net (S4 X
X
X
SWPW request top (A2
X X X
X
PORTCAN>4000 pkta (43 K
Reserved IP proto=l (51
X
X
IP remred bMt met (54
X <X>X X
TCP part 0 (U4
X XK
Tcr data offset < a (au
OX XMK
X
ICHr large packet (190 X
X
'X
>X<
IC redirect h
(348 @ot
XX
UDP 14M > paylcad (3495
ICIP DUnremch (397
ICMP PING NMAP (157690
M3-iQL Worm (16751
0
.
i
e
X
XK
BIMP AguntX (6
i
I
.
datagrm decode (1
2ader, length field < 8 (1
UDP port 0 (a
Unk.
72
84
Appendix B:
Tables and Plots for Class C Subnets
109
110
B.1 - XX.55.145.0/24
Avg Rate
Peak Rate
Total
254
0.07
23,037
Packets
51,283
4.6
Bytes
1,415,624
Table B1-1 - Packet and byte statistics for 55.145C.
SYN
SYN/ACK
TCP TYPE
3,588
11,869
PKT COUNT
Table B1-2 - TCP packet types in 55.145C.
%
%TCP
76.3
58.2
%UDP
20.8
40.2
%ICMP
2.9
1.6
RST
32
RST/ACK
1,845
OTHER
0
ACK
27
Destinations
Sources
Ports
Scans
Hosts
Avg
Avg
Avg
Total
Hosts
Packets
Pkts
Bytes
Pkts
(Scans >
/Dest
/Src
/Src
16 pkts)
90
256
757
12
681
1,870
7.5K (30)
963
94
220
41
2.6K
512
147
X
X
119
97
308
18.8K
38
X
4
X
- Statistics for all, the top 90%, and the top 50% of traffic in 55.145C.
Snort Alerts
Unique
Total
6
100
X
90
50
X
Table BI-3
Avg
Bytes
/Dest
5.5K
5.8K
7.1K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 135
5,078
22.0
243,752
17.2
22.8
323,388
18.0
4,146
UDP- 137
5.9
83,044
7.5
1,724
TCP - 445
Table B1-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 55.145C.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.55.145.202
871
3.8
43,144
3.1
13,592
0.9
211
xx.55.145.143
10,266
0.9
206
xx.55.145.44
Table BI-5 - Top 3 destination IPs across all packet types by packet count, in 55.145C.
2.7
2.5
IP Source
61.152.241.175
61.234.250.206
Packets
970
890
Packet %
4.2
3.9
Bytes
42,696
38,692
Byte %
3.0
2.7
211.219.84.18
722
3.1
34,656
2.5
Table B1-6 - Top 3 source IPs across all packet types by packet count, in 55.145C.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
Portscan > 16 Packets
Table BI-7 - Top 3 alerts by alert count, in 55.145C.
11
Alert Count
602
327
30
Alert %
62.5
34.0
3.1
......
.
...............
..............
.....
...................
Packets per hour versus time
14,D00
xx,55.140.0
--
..-
average
12.25010,500-~
o 8,750P 7,000V
5,2503,5001,750-
12
0
24
36
45
60
72
84
Time (in hours)
Figure B1-1 - Packets per hour versus time in 55.145C.
Bytes per hour versus time
700,000
-
'
--
612,500525,000-
: 437,500 350,000Pq
262,500 175,00087,500
0
12
24
36
46
Time (in hours)
Figure B1-2 - Bytes per hour versus time in 55.145C.
112
60
72
84
xxL.145J
- -average
-
................
..............
-.............
......................
Destination IP address index versus time in xx.55.1450/24
II
255
I
--
1-
--
223-
rL191
-
--- -
1270
-KC
95-
type
0 TCP
UDP
0 ICMP
-L
ii::
$-~
41-
-L
.1-~
I.-
1.)
63
I
-i
I
rpacket
711
-. -- a
-r
F I
!'j-1
1
z
- -1
31 -
0
I
I
I
45
36
Time (in hours)
24
12
0
60
84
72
Figure BI-3 - Destination IP address index versus time in 55.145C.
Destination port versus time
packet type-eount
y::
o UDP
4793
o
SYN
*
SYN/ACK
+
ACK
27
3,BB
AAAA
c~
oft
1000- 00 _
0
o 4=0-0 a
-
UASO
U00coo
A
A
Aorn 1
'N
tD0,4"
011
&Q0 wk
EST
32
A
-~
AA
RST/ACK
1.845
C29;
7CP OTHE!R
0
100
00 000 MO
0a 0
aoo
/
0)
0
0
0
0
a
C0oo 0A
0
0
0
0
ooODO
CI0
OL
0
GOu
0
oo
0
00 000
00
0
0
00-
10
1 -t
0
I
'
12
I
24
I
I
45
36
Time (in hours)
Figure B1-4 - Destination port versus time in 55.145C.
113
60
72
54
0:
-
............
.............................
.....
........
packets to each IP address in xx.55.145.0/24
Total
813-
.3
551
-
465 E 345
232-
A~AJkAAkAvWvc~L 4~MAJ 'J
116-
1
|
I
I
0
I
I
I
I
I
I
I
I
160
128
96
IF address index
64
32
192
224
Figure B1-5 - Total packets to each IP address in 55.145C.
Snort alerts versus time in xx.55.145.0
I
I
I
I
I
I
alerts/hour
* >0
Truno.
TCP optia 28 (1:
ICUP DUnreaah N
at (1:
1CM? DUnrmn
h (K1
PORTSCAN>I
pkta
(w
* >1
*
*
*
*
*
*
M
* >2
>3
>5
>6
>7
>8
>10
>11
*
>12
*
>16
X
X
X
X
K
X
X X X
>M><0<
XK
XX
XX>XX
X
*
ICMP PING NMAP
U1m
(n
M1-0qL Worm
0
12
I
I
I
(
24
36
48
Time (in hours)
Figure B1-6 - Snort alerts versus time in 55.145C.
114
I
60
72
84
>13
>15
>17
B.2 - XX.128.8.0/24
Total
Avg Rate
Peak Rate
Packets
858,412
2.7
1,050
Bytes
136,753,757
426
278,750
Table B2-1 - Packet and byte statistics for 128.8C.
TCP TYPE
SYN
SYN/ACK
8,175
791
PKT COUNT
Table B2-2 - TCP packet types in 128.8C.
%
%TCP
1.2
0.4
%UDP
98.6
99.5
%ICMP
0.2
0.1
RST
272
RST/ACK
967
OTHER
0
ACK
13
Snort Alerts
Unique
Total
100
7
90
X
50
X
Table B2-3
Scans
Ports
Sources
Destinations
Packets
Total
Hosts
Avg
Avg
Hosts
Avg
(Scans >
Pkts
Bytes
Pkts
16 pkts)
/Src
/Src
/Dest
2,907
4.5K (20)
985
2,437
352
56.1K
256
3.4K
X
X
1
84
9.2K
1.5M
1
840K
X
X
1
25
18.6K
3.5M
1
840K
- Statistics for all, the top 90%, and the top 50% of traffic in 128.8C.
Avg
Bytes
/Dest
534K
135M
135M
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
UDP - 1037
839,327
97.8
135,382,959
99.0
UDP- 137
5,599
0.7
436,722
0.3
TCP- 135
3,859
0.5
183,444
0.1
Table B2-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 128.8C.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.128.8.14
840,247
97.9
135,479,180
99.1
xx.128.8.82
848
0.10
41,468
19,942
350
0.04
xx.128.8.33
Table B2-5 - Top 3 destination IPs across all packet types by packet count, in 128.8C.
0.03
0.01
IP Source
192.12.94.30
Packets
58,592
Packet %
6.8
Bytes
2,368,412
Byte %
1.7
192.55.83.30
192.42.93.30
42,695
39,887
5.0
4.7
1,828,498
1,629,782
1.3
1.2
Table B2-6 - Top 3 source IPs across all packet types by packet count, in 128.8C.
Alert Name
Short UDP Packet, Length Field > Payload Length
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
Table B2-7 - Top 3 alerts by alert count, in 128.8C.
115
Alert Count
1,602
630
584
Alert %
55.1
21.7
20.1
..
..
...
. --..
...
.....
....
...
.. ....
...
.
Packets per hour versus time
45,000
-
39,375
-
33,750
-
28,125
-
22,500
-
-
16,575
-
-
11,250
-
xx.128.8.0
---
_
average
-
A
A
AA
A
-
A
5,625
0
0
12
24
60
48
36
Time (in hours)
72
84
Figure B2-1 - Packets per hour versus time in 128.8C.
Bytes per hour versus time
5,300,000
-
4,637,500 3,975,000
3,312,500
-
2,650,000
-
P4
0
K
A
1,957,500
1,325,000
-
-
A
662,500
0
0
12
24
60
45
36
Time (in hours)
Figure B2-2 - Bytes per hour versus time in 128.8C.
116
72
84
average
- -..
0 NO MEMEN
9; -
- I -
-
- ------------------------------ ------------"-LLLLL LL--- --
-
____
Destination IP address index versus time in xx.128.5.0/24
255 I
)
223 -
-4
-4-
I I
rpacket
I
I
I
I
-
1
..
191-
I *t
LZ
169
0i
LZ
0)
127-
-F
-
I s A~
-
-
41
S-
I
JiJ
;.
If
I...
31A.1
? I -*.
:f: '.I.J-4
7*,,--0 I{]
I
I
I
I
I
12
I
36
24
l
:1~
~
.~
-
-~i
I~
£~I1~-
1
1d
1
I
"A
,
-1
0
--P -I
-j -.'-..
TAU
-~.
4
*1.
83
type
N TCP
UDP
M ICMP
48
Time (in hours)
60
I
84
72
Figure B2-3 - Destination IP address index versus time in 128.8C.
Destination port versus time
packet type--count
C3
UOP
0
SYN
W75
A
SYN/ACK
+
ACK
t3
848.157
10000
A
z
<M0
0
0
0
1000
4o
CDD 0
7sn
NST
A-
RST/ACK
967
0
0
TCP OTHER
0
100
cy0 Cow CM 0UKNF
3
0A
Do a
:3D0 CD
3
0D
0
0 0
0
00 00
0
o 00 0 oXDm anmGL cNm0 CX)UI 00
0
0
El00)0
c
098 0 0 0
0 a:00
0
OD
0 in
O
aDflACEa
0
0
0
0
0
0
0
000
CODO 0 000
10
1
I
0
I
12
I
I
I
24
36
.
,
48
I
Time (in hours)
Figure B2-4 - Destination port versus time in 128.8C.
117
i
60
i
72
i
84
-
Total packets to each IP address in xx.28.8.0/24
I
I
I
850,000-
743,750-
637,500
-
531,260
-
6,425,00O
-
.
a.)
E, 318,750-
212,500
-
106,250
-
0)
224
192
160
128
96
64
32
IF address index
Figure B2-5 - Total packets to each IP address in 128.8C.
Snort alerts versus time in xx.128.8.J
SNIP
Xx
trap to
PO4TSCAN>11S
20 X
pkcto
1CM! DUrenc
ICMP
PING
MS-SQ.
I
I
I
II
I
MAP
X
><
X
XX
(07:
X<X
X XX
1K
X
X
X
X
X
X
(614
W>arm
X
CII? lon> payload 1602]
0-
I
0
12
24
I
I
I
60
45
36
Time (in hours)
Figure B2-6 - Snort alerts versus time in 128.8C.
118
I
72
I
84
alerts/hour
* >0
* >106
* >213
* >320
* >427
* >534
* >640
* >747
* >854
* >961
* >1068
>1174
>1251
* >1388
* >1496
B.3 - XX.198.188.0/24
Avg Rate
Peak Rate
Total
353
1.8
584,973
Packets
74
16,896
24,797,791
Bytes
Table B3-1 - Packet and byte statistics for 198.188C.
SYN/ACK
SYN
TCP TYPE
138,992
39,605
PKT COUNT
Table B3-2 - TCP packet types in 198.188C.
100
9
941
Scans
Packets
(Scans >
16 pkts)
6.8K (22)
90
X
X
X
%
Snort Alerts
Unique
Total
%TCP
98.0
95.9
%UDP
1.1
2.8
%ICMP
0.9
1.3
RST
208
RST/ACK
392,590
OTHER
17
ACK
1,852
8,672
Sources
Avg
Pkts
/Src
67
Avg
Bytes
/Src
2.9K
59
8.9K
368K
Ports
Total
Hosts
13,323
8,196
Destinations
Hosts
Avg
Pkts
/Dest
2.3K
256
1
2.OM
1
6
49.3K
X
2,339
X
50
X
Table B3-3 - Statistics for all, the top 90%, and the top 50% of traffic in 198.188C.
Avg
Bytes
/Dest
96.9K
537K
22M
537K
22M
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 445
16,871
2.9
812,605
3.3
1.8
450,840
1.0
5,780
UDP- 137
1.2
305,967
0.8
4,500
ICMP - Destination Unreachable
Table B3-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 198.188C.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.198.188.220
537,113
91.8
22,108,578
89.2
xx.198.188.96
16,798
2.9
811,838
3.3
xx.198.188.6
14,961
2.6
722,049
2.9
Table B3-5 - Top 3 destination IPs across all packet types by packet count, in 198.188C.
IP Source
61.152.108.4
Packets
106,312
Packet %
18.2
Bytes
4,254,316
Byte %
17.2
210.245.191.90
61.129.70.220
61,258
47,611
10.5
8.1
2,450,332
1,938,756
9.9
7.8
Table B3-6 - Top 3 source IPs across all packet types by packet count, in 198.188C.
Alert Name
Attempt
Worm
Propagation
MS-SQL
ICMP Ping NMAP
TCP Port 0 Traffic
Table B3-7 - Top 3 alerts by alert count, in 198.188C.
119
Alert Count
624
229
30
Alert %
66.3
24.3
3.2
....
...................
Packets per
hour versus time
14,000
12,250
-
10,500
-
0 8,750
-
P4 7,000
-
5,250
-
xx1-8.188.0
___average
-
3,500
1,750
0
0
12
24
36
60
48
72
84
Time (in hours)
Figure B3-1 - Packets per hour versus time in 198.188C.
Bytes per hour versus time
700,000--
612,500
-
525,000
-
437,500
-
a 350,000
-
tl
A
0262,500 -
175,000
-
87,500
-
0-
I
1
0
14
7
12
24
60
36
453
Time (in hours)
Figure B3-2 - Bytes per hour versus time in 198.188C.
120
72
84
-average
......................
..........
......
.....
Destination IP address index versus time in xx.19818B.0/24
'
255
.
223 -
,
q
127
4-)
t -
41
liii.'
Ii
-i
0.
0
I I I
12
IF
* Ii
0
TCP
m
_
UDP
ICMP
.
r
II
60
45
36
24
-
--
-
31
packet type
'I
~'
--
f
- j
4~
63
It
*IiiiI
..i~.
~
-
M
~F
I~I
95
4-..
- -
1!~
I~I~
I.'
F I
-
-4
-
.
p . -
-
-
I
191 -1-
159
f...1
.1 .
R j...-
i~
84
72
Time (in hours)
Figure B3-3 - Destination IP address index versus time in 198.188C.
Destination port versus time
pmcket type-eouat
.
10000
o
UDP
5A34
0
A
SYN
39*5
SYN/ACK
+
ACK
-
-
1aggz
1,862
1000
EST
0,
RST/ACK
392.90
-
7
100
0 00
A
10f
o
0
00
0
0
0
:1
1
0
12
24
36
48
Time (in hours)
Figure B3-4 - Destination port versus time in 198.188C.
121
60
72
54
TCP
17
OTHER
.............
Total packets to each I? address in xx.198.18.0/24
540,000 II
I
I
I
I
I
I
.
472,500 405,000
-
337,500 -
.5
. 270,000 -
E
202,500
-
135,000
-
67,500
-
II
224
A
IA
96
64
32
a
192
160
128
IP address index
I
Figure B3-5 - Total packets to each IP address in 198.188C.
Snort alerts versus time in xx.198.188.0
I
UDP
IJn >
TCP header
I
I
I
I
I
I
I
I
I
I
X
X
len > pkt (X
X
X
IP reserved bit ast (2
POR1Y.UAG
X
X X
XK
pkts (21:XXX
X
>X
XX
XX
XK X
X
ICP DUnresah (22 :
<W X
Tc? porI 0 (00
X
XX
-A-;!1
OMN~3E
X
X
XX X X
X
XX X
X
X X ><
A
XX
X
X
X X
XX X
>XX
XXI
X
ICMP FING INMAP (Mg
V,>0GAGMDK=Ao
MS-SQL Worin (6d2
0
o
I
II
12
24
36
I
B3-6 - Snort alerts versus time in 198.188C.
122
I
I
45
Time (in hours)
Figure
I
alerts/hour
payload (1
M? requet t.op (2
I
I
60
I'
72
54
*
*
>7
>9
*
*
>10
*
*
>11
>12
>13
>14
>15
B.4 - XX.209.239.0/24
Total
Avg Rate
Peak Rate
Packets
23,029
0.07
235
Bytes
1,473,260
4.7
11,280
Table B4-1 - Packet and byte statistics for 209.239C.
TCP TYPE
SYN
SYN/ACK
417
13,811
PKTCOUNT
Table B4-2 - TCP packet types in 209.239C.
100
4
1,408
Scans
Packets
(Scans >
16 pkts)
6.4K (28)
90
X
X
X
%
Snort Alerts
Unique
Total
Ports
Total
Hosts
482
10
%TCP
65.3
49.1
%UDP
30.1
48.6
%ICMP
4.6
2.3
RST
38
RST/ACK
527
OTHER
0
I
ACK
8
2,397
Sources
Avg
Pkts
/Src
10
Avg
Bytes
/Src
615
751
28
1.8K
Destinations
Hosts
Avg
Pkts
/Dest
256
90
223
50
X
X
X
2
41
285
18.2K
105
Table B4-3 - Statistics for all, the top 90%, and the top 50% of traffic, in 209.239C.
Avg
Bytes
/Dest
5.8K
93
6.0K
110
7.0K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
TCP - 135
5,959
26.0
291,360
19.8
137
5,898
25.6
460,044
31.2
TCP - 3127
3,200
13.9
153,708
10.4
UDP-
Table B4-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 209.239C.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.209.239.167
695
3.0
35,064
2.4
xx.209.239.5
xx.209.239.154
Table B4-5 - Top 3 destination
IPs
15,237
369
1.6
249
1.1
12,558
across all packet types by packet count, in 209.239C.
1.0
0.9
IP Source
221.160.90.43
Packets
734
Packet %
3.2
Bytes
35,232
Byte %
2.4
67.82.117.166
84.171.134.66
691
611
3.0
2.7
33,168
29,328
2.3
2.0
Table B4-6 - Top 3 source IPs across all packet types by packet count, in 209.239C.
Alert Name
ICMP Ping NMAP
MS-SQL Worm Propagation Attempt
Portscan > 16 Packets
Table B4-7 - Top 3 alerts by alert count, in 209.239C.
123
Alert Count
784
593
28
Alert %
55.8
42.1
2.0
.............
................
.....
.
......
......
per
Packets
14,000
hour versus time
----
xx209.239.0
-_---
average
12,25010,500-
o 8,750P, 7,000w
0 5,2503,5001,750-
0
12
24
36
45
60
72
84
Time (in hours)
Figure B4-1 - Packets per hour versus time in 209.239C.
Bytes per hour versus time
700,000-
-
-__
612,500525,000--
437,500 r.
350,000262,500 175,00087,500\-
0
12
24
NI'---36
48
Time (in hours)
Figure B4-2 - Bytes per hour versus time in 209.239C.
124
60
72
84
xx209239.0
average
Destination IP address index versus time in xx.209.239.0/24
~
255
__
223191
1-4
no
>i
I
JJ
LL1
-
I
-
t
______________
packet type
i
.-
--
0 TCP
U DP
-
ICMP
I
-
159-
-I
127-
..j.
-
S.
-'j
0
95-
M.
:41
-
63-
JL
31
--
:1
-
0
12
0
60
48
36
Time (in hours)
24
-
84
72
Figure B4-3 - Destination IP address index versus time in 209.239C.
Destination port versus time
I
I II I
I
I
I
I
I
I
Ia I
A
a00
o
00IC
we o
0
04,
0
paoktet
0
0
0
A
type-COIunt
0 UDP
6.9Z7
A e
A
0
0
SYN
13,811
A
SYN/ACK
+
ACK
aS
EST
38
i
417
> 0MAm
r.
1000
-
0
ow
A
0
0
A
AM:0A
j&
0
0
0
a 00 000M DcD
0
CAD
* CO0
0
0
0
V*Cb
AA
0
0000
A
0
RST/ACK
527
0
41
:1 9=PM~wMMwt0 naw
100
M OOM
00
O
0
00 CU
0
E
S
00
on0
0
0
MC3 MI
0
a000
o aWQ M
Ol C0aflMO 0 CM
0
£1
0
0
0l
0
0c
0
(P
0
0
0wU
110MM C~~in
0 000 =
10-
I
o
I
12
24
36
48
Time (in hours)
Figure B4-4 - Destination port versus time in 209.239C.
125
60
1
I
72
1
84
TCP OTHER
0
.........
..
..
........
..........
...
Total
780
-
665
-
570
-
packets to each IP address in xx.209.239.0/24
475 -
.
1,380 0
E- 2135 19095-
160
128
96
64
32
)
-
.
,
0-
192
224
IF address index
Figure B4-5 - Total packets to each IP address in 209.239C.
Snort alerts versus time in xx.209.2390
I
I
I
alerts/hour
UDP
len
>
payload (V
PORTSCAN>16 pkta (28'
XX
X<
X
X
X
X
X
X ><XX
X >X
X
0
*
*
*
*
*
*
*
*
*
*
>0
>1
>2
>3
>4
>6
>7
>8
>9
>10
>12
>13
>14
*
*
MS-SQL Worm (5231
ICM? PING NMA? (704
0 -r
01
*
'
i
2
I
I
24
45
36
Time (in hours)
Figure B4-6 - Snort alerts versus time in 209.239C.
126
60
I
I
72
54
>15
>16
B.5 - XX.218.68.0/24
Peak Rate
Avg Rate
Total
1.5
280
504,197
Packets
13,428
75
24,810,656
Bytes
Table B5-1 - Packet and byte statistics for 218.68C.
100
90
7
X
1,226
X
Scans
Packets
(Scans >
16 pkts)
4.9K (18)
X
50
X
X
X
Snort Alerts
Total
Unique
%UDP
1.1
2.5
%ICMP
0.1
0.1
RST
485
RST/ACK
968
OTHER
2
ACK
10
SYN
SYN/ACK
TCP TYPE
892
495,351
PKT COUNT
Table B5-2 - TCP packet types in 218.68C.
%
%TCP
98.8
97.4
36,964
21,485
Sources
Avg
Pkts
/Src
14
21
Avg
Bytes
/Src
671
5,051
50
2.5K
Ports
Total
Hosts
870
1
1
1.0K
Destinations
Hosts
Avg
Pkts
/Dest
256
2.0K
486K
1
1
486K
Avg
Bytes
/Dest
96.9K
24M
24M
Table B5-3 - Statistics for all, the top 90%, and the top 50% of traffic, in 218.68C.
Protocol - Port/TCMP Type
Packets
Packet %
Bytes
Byte %
TCP - 4662
486,016
96.4
23,589,016
95.1
UDP - 137
4,629
0.9
361,062
1.5
TCP - 445
3,693
0.7
178,218
0.7
Table B5-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 218.68C.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.218.68.212
486,226
96.4
23,599,560
95.1
2,869
0.57
138,901
xx.218.68.7
0.05
9,702
229
xx.218.68.20
Table B5-5 - Top 3 destination IPs across all packet types by packet count, in 218.68C.
0.56
0.04
IP Source
217.217.141.2
Packets
702
Packet %
0.14
Bytes
33,696
Byte %
0.14
82.235.3.100
219.54.84.76
522
488
0.10
0.10
25,056
23,424
0.10
0.09
Table B5-6 - Top 3 source IPs across all packet types by packet count, in 218.68C.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
Ports can > 16 Packets
Table B5-7 - Top 3 alerts by alert count, in 218.68C.
127
Alert Count
630
Alert %
51.4
571
46.6
18
1.5
- - -- ----
#bm
I
--
-
-
-
---
............
.............................
......
. . .....
.
.........................
Packets per hour versus time
14,000
0
-
12,250
-
-
10,500
-
-
8,750
-
-
7,000
-
-
---
_
xx28.8.0
average
CI
.i11
5,250
3,500
1,750
0
0
12
12
45
36
24
84
72
60
Time (in hours)
Figure B5-1 - Packets per hour versus time in 218.68C.
Bytes per hour versus time
'
700,000
'
'
'
'
'
'
'
'
'
'
'
'
''
- --
612.500
525,000
:0 437,500
350,000
K
P,
262,500
175,000
87,500
0
0
12
24
60
48
36
Time (in hours)
Figure B5-2 - Bytes per hour versus time in 218.68C.
128
72
84
average
--
M
..............
....
......
-
Aft
Destination IP address index versus time in xx.21B.58.0/24
I
255
223
-
191
-
I
:*.
.Ii'
.
A
iii
I
*1
I
I
159127-
I
I-
95I
- - i,
63-
-
I
Ij
1-4
0
I
I
-
.rn..
~
---
.1'
1'
packet type
0 TCP
1JDP
M ICMP
Pi
I
-< -
4
31 0 ---.
0
-n
-
--l.aA
.1
-
ai
36
24
12
I
60
45
54
72
Time (in hours)
Figure B5-3 - Destination IP address index versus time in 218.68C.
Destination port versus time
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
p&oket type-eount
0 UDP
S44
10000 -
6A-
Q
&
A~
4J
1000
-
010
A
A
-
A
SYN/ACC
+
ACK
a
EST
-
485
-
RST/ACK
988
7
100
000
C
000
0
00
mom~
0
:D
0
O'fl00
0
00
ca
0
0
M
0
0
Q>
0
000'f
0
0
0Q
0
E
:
00 0
(0)
10
-
0
-
I
12
I
I
24
I
I
36
1
1
45
Time (in hours)
Figure B5-4 - Destination port versus time in 218.68C.
129
60
72
54
'CF OTHER
2
Total packets to each IP address in xx.21i.68.0/24
490,000
-
428,750
-
367,500
-
.W 306,250
-
I
I
192
224
I
E,245,000 0
E
153,750122,500
-
61,250
-
0)
128
96
64
32
160
1
IP address index
Figure B5-5 - Total packets to each IP address in 218.68C.
Snort alerts versus time in xx.218.68.0
I
TTL limit
II
i
I
I
alerts/hour
0 >0
* >1
* >2
* >3
* >4
* >5
* >6
>7
*
* >8
>9
*
xceded (1
7IP data offset < 5 (1
X
ICMP WnDreah (2
UDP an > payloa
PORTS|CAe
a
>10
a
>12
>13
>14
X
(
X X
pkto (17
X
X
X
X XX<
X
X<
X
*
ICMP INr NMAr (70
ACWINM'AN
489MMOOa 0 -122KSIOIM
MS-SQL Worm (630
0 -
0
1
24
60
48
36
Time (in hours)
Figure B5-6 - Snort alerts versus time in 218.68C.
130
72
84
O
>11
B.6 - XX.220.236.0/24
Packets
Bytes
Total
9,223
Avg Rate
0.03
Peak Rate
454
%TCP
57.9
%UDP
36.4
%ICMP
5.7
737,756
2.8
55,350
34.5
63.2
2.3
RST
24
RST/ACK
516
OTHER
0
Table B6-1 - Packet and byte statistics for 220.236C.
TCP TYPE
SYN
SYN/ACK
PKT COUNT
4,143
470
Table B6-2 - TCP packet types in 220.236C.
%
ACK
4
Snort Alerts
Unique
Total
100
5
90
X
X
50
Table B6-3
Scans
Ports
Sources
Destinations
Avg
Hosts
Avg
Packets
Total
Hosts
Avg
(Scans >
Pkts
Bytes
Pkts
16 pkts)
/Src
/Src
/Dest
36
7
548
256
1.9K (9)
408
1345
928
37
X
36
614
14
1.1K
222
X
13.9K
106
44
2
26
182
X
X
- Statistics for all, the top 90%, and the top 50% of traffic in 220.236C.
Protocol - Port/ICMP Type
UDP-
137
Avg
Bytes
/Dest
2.9K
3.1K
3.6K
Packets
Packet %
Bytes
Byte %
2,700
29.3
210,600
28.6
14.5
2,188
23.7
106,824
TCP - 135
4.5
681
7.4
32,936
TCP - 445
Table B6-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 220.236C.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.220.236.113
112
1.2
6,750
0.9
108
1.2
4,796
xx.220.236.111
4,624
93
1.0
xx.220.236.130
Table B6-5 - Top 3 destination IPs across all packet types by packet count, in 220.236C.
0.7
0.6
IP Source
83.129.46.113
24.72.12.113
Packets
444
431
Packet %
4.8
4.7
Bytes
23,088
20,688
Byte %
3.1
2.8
66.135.248.40
242
2.6
11,616
1.6
Table B6-6 - Top 3 source IPs across all packet types by packet count, in 220.236C.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
Portscan > 16 Packets
Table B6-7 - Top 3 alerts by alert count, in 220.236C.
131
Alert Count
627
Alert %
97.6
286
30.9
9
1.0
.. .
..
...........................
. ...
.........
..
...........
.
Packets per hour versus time
14,000 -
---
-
xL.220.236.0
average
12,25010,500-
o 8,750P,
7,000-
J
5,2503,5001,750-
0
12
24
36
45
Time (in hours)
60
72
84
Figure B6-1 - Packets per hour versus time in 220.236C.
Bytes per hour versus time
700,000-
'xx220236.0
-
612,500-525,000--
p
437,500 -
) 350,000S262,500
175,00087,5001
0-
0
12
24
36
Ca
48
Time (in hours)
Figure B6-2 - Bytes per hour versus time in 220.236C.
132
60
72
84
_--
average
Destination IP address index versus time in xx.220.236 .0/24
I
255
I
-!i
packet type
-~
~-
223191
-
--
- --
-
P-
N
*
1
_*
ICMP
I-I
-
-A
fo
0
TCP
UDP
-I
95
-
tf-.~I
127-
~
- - -
-
-
-
L-
~4I
-l-
1
-
li-t
-31-
0
84
72
60
48
36
Time (in hours)
24
12
Figure B6-3 - Destination IP address index versus time in 220.236C.
Destination port versus time
i
10000
I
I
I
I
packet type-count
0 UDP
t, I A
74
X
A
AO0 0
0 04
OD
0
O~
o
~
0
0 G1
000
0
&
M
a
4A0
A
aA
A
E
'W1-
00
Ca. 6D0 -~AM
OD00
A
AA
A
SYN
4,143
A SYN/ACK
0
+
,h...
1000-
I
SA
D
-+
I
C
]
4
a
ACK
4
IMM,
0
4&
EST
0
RST/ACK
516
0IUTW
100~
EP
U
0
omoco 000 ao
on co oM =0
0
0
0 01
in.
000
inm
+
0
0
ok
00
a
oM
.
0 0
10
1 i
0
I
I
12
I
I
24
I
I
I
48
36
Time (in hours)
Figure B6-4 - Destination port versus time in 220.236C.
133
TCP
0
Conoaoom ao
0
0
7
o0I
Oeninnain
me
0I OD
cIean
I
I
I
60
72
84
OTHER
.....
...
Total packets to each IP address in xx.220.238.0/24
130
I
I
-
I
I
I
I
192
224
I
I
11397
-
45
-
32
-
Co
0
4 1
44
400
0
0
32
64
96
126
160
IP address index
Figure B6-5 - Total packets to each IP address in 220.236C.
Snort alerts versus time in xx.220.236.0
PORTSCANI>1
I
t
I
I
I
alerts/hour
* >0
* >1
* >2
* >3
* >4
* >5
* >6
* >7
* >9
* >10
(
UVr 1ie > payla4
ICMP DUnreac
I
I
I
I
X
(
pkt. (2
XX
X
X
>0(
1
X
X
*
*
ICWP PING NMAP (210
MS-SQL
Worm
0
I
0
I
I
I
I
12
24
36
48
Time (in hours)
Figure B6-6 - Snort alerts versus time in 220.236C.
134
60
72
54
>11
>12
>13
>14
>15
B.7 - XX.226.255.0/24
Packets
Bytes
Total
10,543
Avg Rate
0.04
Peak Rate
224
%TCP
46.7
%UDP
51.1
%ICMP
2.2
825,213
2.8
10,753
29.0
70.0
1.0
RST
43
RST/ACK
50
OTHER
0
Table B7-1 - Packet and byte statistics for 226.255C.
SYN
SYN/ACK
TCP TYPE
69
4,552
PKT COUNT
Table B7-2 - TCP packet types in 226.255C.
%
Snort Alerts
Unique
Total
100
4
666
90
X
X
Scans
Packets
(Scans >
16 pkts)
1.5K (3)
X
ACK
4
241
1,707
Sources
Avg
Pkts
/Src
6
8
1,009
9
Ports
Total
Hosts
Avg
Bytes
/Src
483
770
Destinations
Hosts
Avg
Pkts
/Dest
41
256
46
3.6K
123
8.0K
205
43
280
19.6K
2
19
X
X
50
X
Table B7-3 - Statistics for all, the top 90%, and the top 50% of traffic in 226.255C.
Avg
Bytes
/Dest
3.2K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
UDP- 137
3,011
28.6
234,858
28.5
14.9
122,600
24.2
2,546
TCP - 445
9.0
16.0
74,272
1,688
UDP - 38293
Table B7-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 226.255C.
IP Destination
Packets
Packet %
Bytes
Byte %
xx.226.255.212
2,174
20.6
105,566
12.8
77,153
16.4
1,729
xx.226.255.255
6,906
1.0
106
xx.226.255.217
Table B7-5 - Top 3 destination IPs across all packet types by packet count, in 226.255C.
9.4
0.8
IP Source
168.171.13.3
Packets
1,286
Packet %
12.2
Bytes
56,584
Byte %
6.9
220.117.199.6
222.121.11.249
740
573
7.0
5.4
35,520
27,504
4.3
3.3
Table B7-6 - Top 3 source IPs across all packet types by packet count, in 226.255C.
Alert Name
MS-SQL Worm Propagation Attempt
Short UDP Packet, Length Field > Payload Length
Portscan > 16 Packets
Table B7-7 - Top 3 alerts by alert count, in 226.255C.
135
Alert Count
658
4
3
Alert %
98.8
0.6
0.5
-
--
-
,- - =
-
- -- ..........
...
. .........
.......
Packets per hour versus time
---
-_---
xx226.255.0
average
12.250-
10,5000
8,750-
P, 7,000-
ri 5,2503,500-
1,7500
0
-
I01.
12
24
36
48
60
Time (in hours)
72
84
Figure B7-1 - Packets per hour versus time in 226.255C.
Bytes per hour versus time
700,000
-
xx226.2550
average
612,500525,000-
; 437,500 350,000N
a)
.0.;
COI
262,500 175,00087,500-
0
12
24
48
60
Time (in hours)
36
Figure B7-2 - Bytes per hour versus time in 226.255C.
136
72
84
Destination IP address index versus time in xx.226.255.0/24
1.[k...
1.
223-
-
-J
0
-
4
-I-
I
159I
127-
0
-A
I
I
[I.]
M TCP
-
*
UDP
ICMP
*.
I
.1
I'
-i
951
-4
.
I
j
-
-I
packet type
I.
Qi
P,
I
*
f-K
.1
-4-
-.
-
-r.
'
I
'
I
I
I
I
265
63-
-
-
-I
31II
n
24
12
0
60
45
36
84
72
Time (in hours)
Figure B7-3 - Destination IP address index versus time in 226.255C.
Destination port versus time
I I I I I,'
I
0a
00
0
'k
0
0
Q~
0'
0
10000
0
...
1000
00 0
QA
aSQ.
a
,0AD
A
0
I
A
0
_Upacket type-count
:
:
0
CM
0
0
COC
0
CDOCP0
0
AD
o
oco
EJoo
0oo
UDP
0
SYN
*
SYN/ACK
OR
+
ACK
4
0
+
£0
0
1
0
0
0
0
QL
1A,IU
11.
00
0
0
C
60
a.
0D
ow0
cm0
or ouP ooo
EST
48
A
B-
aijo
RST/ACK
50
92
-7
'CP
0
100
l
CI]0
-00
0
o
0o
0
0
0
0
0
111
n0
0
0
X
0
o
0
0
M
0
0
0
10
1
O
12
24
48
36
Time (in hours)
Figure B7-4 - Destination port versus time in 226.255C.
137
60
72
84
OTHEI|R
Total packets to each IP address in xx.226.255.0/24
'
2,200 -1
'
V
i
1.925 -I
E1,100 -
5502750
64
I
I
I
32
0
96
224
192
128
160
IF address index
Figure B7-5 - Total packets to each IP address in 226.255C.
Snort alerts versus time in xx.226.255.0
i
alerts/hour
>0
0
ICMP
DUnreabCh
X
(
*
*
*
>1
>2
>3
*
>4
*
>7
a
>15
*
PORTSCLA>1S
UP
len
>
X
X
3:
pkti
*
*
*
a
X
payload (4:
a
&
MS-SQL Wqrm (057
*
i
!
0
0
12
24
60
46
36
Time (in hours)
Figure B7-6 - Snort alerts versus time in 226.255C.
138
1
I
72
I
8I
54
>8
>8
>9
>10
>12
>13
>14
>16
B.8 - XX.239.255.0/24
Peak Rate
Avg Rate
Total
445
0.03
Packets
8,150
19,608
2.7
731,397
Bytes
Table B8-1 - Packet and byte statistics for 239.255C.
TCP TYPE
SYN
SYN/ACK
78
990
PKT COUNT
Table B8-2 - TCP packet types in 239.255C.
%
%TCP
16.5
9.1
%UDP
80.6
89.8
%ICMP
2.9
1.1
RST
31
RST/ACK
50
OTHER
ACK
8
Destinations
Sources
Scans
Ports
Hosts
Avg
Hosts
Avg
Avg
Packets
Total
Pkts
Pkts
Bytes
(Scans >
16 pkts)
/Src
/Src
/Dest
9
842
256
32
622
0 (0)
238
869
35
X
7
357
21
1.9K
211
X
55
19.1K
74
1
16
259
X
X
- Statistics for all, the top 90%, and the top 50% of traffic in 239.255C.
Snort Alerts
Total
Unique
100
4
90
X
X
50
Table B8-3
1
Avg
Bytes
/Dest
2.9K
3.2K
4.5K
Protocol - Port/ICMP Type
Packets
Packet %
Bytes
Byte %
UDP- 137
UDP - 38293
4,230
1,692
51.9
20.8
329,940
74,448
45.1
10.2
34.2
619
7.6
250,076
UDP - 1434
Table B8-4 - Top 3 packet types across ICMP, TCP, and UDP traffic by packet count, in 239.255C.
Bytes
Packets
Packet %
IP Destination
21.3
77,998
1,737
xx.239.255.255
9,532
1.9
151
xx.239.255.82
5,428
1.0
85
xx.239.255.217
Table B8-5 - Top 3 destination IPs across all packet types by packet count, in 239.255C.
Byte %
10.7
1.3
0.7
IP Source
168.171.13.3
201.252.46.157
Packets
1,290
229
Packet %
15.8
2.8
Bytes
56,760
17,862
Byte %
7.8
2.4
85.96.117.162
229
2.8
17,862
2.4
Table B8-6 - Top 3 source IPs across all packet types by packet count, in 239.255C.
Alert Name
MS-SQL Worm Propagation Attempt
Short UDP Packet, Length Field > Payload Length
ICMP Destination Unreachable Communication Administratively Prohibited
Table B8-7 - Top 3 alerts by alert count, in 239.255C.
139
Alert Count
616
4
1
Alert %
99.0
0.6
0.2
Packets per hour versus time
14,00
'
---
xx255.0
average
-
12,25010,500-
o 8,750P* 7,000-
5,2503,5001,750-
0
12
24
36
48
60
72
84
Time (in hours)
Figure B8-1 - Packets per hour versus time in 239.255C.
Bytes per hour versus time
700,000..-
_-
612,500525,000437,500 r.,
a)
~350,000-5 ,O)
a)
, 262,500 175,00087,500-
0
12
24
60
48
36
Time (in hours)
Figure B8-2 - Bytes per hour versus time in 239.255C.
140
72
84
xx239.2M.0
average
Destination IP address index versus time in xx.239.255.0/24
-
'4
I...'
-
~T
-
II
-- - .
.I -
-
]:I
I
.
-
.
127
0
-- -
...
packet type
F..
-fI-.i
'I.
I
II..
-
0 TCP
UDP
-
- ICMP
-
I -
-
I.
--
i
'~1:1
*
-*1
95I
-1.
-
6331
I.
I
-
I-
i
-l I .1
-I-
-
I:.
.1 * I.
.*~
159 -
I
g
- --
- . I'
**.I
-
I
I
I
I
I:
223 0 191
I
I
255
*.
I'
I.
* I.
-
.1
I' * I
0
60
48
36
Time (in hours)
24
12
72
64
I
I
Figure B8-3 - Destination IP address index versus time in 239.255C.
Destination port versus time
I
I
I
I
I
AOAOO % a 50ib
Q
"
10000
0
000
oOxWoi+0
A
4A
&
O O OA
0
alO
U1MxCbOwM
A
m
Cam
u'
0 0 0 aaell]
.o
o
4
000
CO-
a
0
0
A
0
A
C
M &
0000o
0
eDcHO e] 0
oCE00(mo
100
V
0
3
0 0 0
cm
00
Uo Ie 0
c0
0
::DCOc
ht
G
01
0
Q
Q
0
0
atJ
z
A
0
000
0
00
0 l
0
10-
1
0
12
24
_
_
_
_
_
46
36
Time (in hours)
Figure B8-4 - Destination port versus time in 239.255C.
141
60
72
SYN
SYN/ACK
75
ACK
FST
31
=0
w
[C
noiinM=ODOnMG3neo0
Oat] [pU(Laoainx
0
+
0
0|
Cd
_
packet type-count
o UDP
A
0 0 awofmEMCmm 0A
0 AO (11)
9h
0 0
(M
0
__
0
CA
A
cA
I
00 'O
0
64
RST/ACK
60
T lCP OTHER
Total
packets to each IP address in xx.239.255.0/24
I
1,800 I
I
I
I
I
I
I
I
'
I
'
I
1,575
1,350
.3
1,125
m,
900
E-
675
450
225 -I
I
-~
'
0
T3 -
'
'I
32
96
64
160
128
192
224
IF address index
Figure B8-5 - Total packets to each IP address in 239.255C.
Snort alerts versus time in xx.239.255.0
I
|I.i
I
alerts/hour
0
ICMP DUnreach
SCAN
>1
>2
>3
>4
>5
>6
M >7
>9
*
* >10
>11
U
>12
X
(1
>0
*
*
*
*
*
*
FIN (1)
>13
UDP
lan
M-5,QL Worm
* >14
* >15
X
> payload (4:
(015.
0
1~~
0
12
24
I
I
I
I
I
45
36
Time (in hours)
Figure B8-6 - Snort alerts versus time in 239.255C.
142
60
72
54
B.9 - XX.248.246.0/24
Total
707,941
Peak Rate
181
8,688
103
34,403,749
Bytes
Table B9-1 - Packet and byte statistics for 248.246C.
Packets
Avg Rate
2.1
TCP TYPE
SYN
SYN/ACK
524
PKT COUNT
692,595
Table B9-2 - TCP packet types in 248.246C.
100
10
1,078
Scans
Packets
(Scans >
16 pkts)
5.7K (41)
90
X
X
X
%
Snort Alerts
Total
Unique
ACK
582
Ports
Total
Hosts
433
51,238
Sources
Avg
Pkts
/Src
14
5
27,819
23
%TCP
99.2
98.2
%UDP
0.7
1.7
%ICMP
0.1
0.1
RST
7,183
RST/ACK
812
OTHER
119
Avg
Bytes
/Src
671
Destinations
Hosts
Avg
Pkts
/Dest
256
2.8K
1.1K
1
1
85
4.1K
3
4,177
X
X
X
50
Table B9-3 - Statistics for all, the top 90%, and the top 50% of traffic in 248.246C.
Avg
Bytes
/Dest
134K
693K
33M
693K
33M
Bytes
Byte %
Packets
Packet %
Protocol - Port/ICMP Type
21.1
7,257,139
21.3
150,797
TCP - 1025
20.9
21.1
7,181,840
149,216
TCP - 42
6,548,915
19.0
19.2
135,969
TCP- 80
in
248.246C.
traffic
by
packet
count,
across
ICMP,
TCP,
and
UDP
B9-4
Top
3
packet
types
Table
IP Destination
Packets
Packet %
Bytes
Byte %
xx.248.246.112
692,920
97.9
33,349,840
96.9
9,534
0.03
202
xx.248.246.249
6,952
139
0.02
xx.248.246.94
Table B9-5 - Top 3 destination IPs across all packet types by packet count, in 248.246C.
0.03
0.02
IP Source
207.157.30.46
Packets
2,621
Packet %
0.4
Bytes
125,736
Byte %
0.4
193.170.238.69
193.224.106.40
2,413
2,311
0.3
0.3
115,824
110,928
0.3
0.3
Table B9-6 - Top 3 source IPs across all packet types by packet count, in 248.246C.
Alert Name
MS-SQL Worm Propagation Attempt
ICMP Ping NMAP
Portscan > 16 Packets
Table B9-7 - Top 3 alerts by alert count, in 248.246C.
143
Alert Count
609
391
41
Alert %
56.5
36.3
3.8
Packets ner hour versus time
14,000
-
x7248246.0
--
verage
--
12,250 10,500
-
0
8,750 -
P.,
7,000-
1'
I
VA____
V
__
6,250r.,
3,5001,7500
I
0
i
12
I
I
24
j
I
36
45
I
60
i
72
I
84
Time (in hours)
Figure B9-1 - Packets per hour versus time in 248.246C.
Bvtes ner hour versus time
700,000
-
612,500
-
525,000 ; 437,500
/
350,000
-
/
I
262,500
175,000
87,500
0
0
12
24
36
45
Time (in hours)
Figure B9-2 - Bytes per hour versus time in 248.246C.
144
60
72
84
--
xx248246.0
average
Destination IP address index versus time in xx.248.246.0/24
255
f-I i
ii
f:7t7.1
-i iI
223 -
U-it
21
S63-
**
-I -
-r- .
U
I
II
----Ii
r-I
fl
I*'*If
31-
1n1111
.1
*i1
packet type
I' IL
I I
*
TCP
-
UDP
*
ICMP
IITIf iii
ill
*j~ii
'I
I!
'1
jt
.1! I ii*
+ 1~..
~.i
*1~
..
I'l
IILi
A
~1~~~~
24
12
0
iI,..*~I.
I ill
-
4-II
0
- -- '--- d
-
r
$
ri-
127-
-- .1-
-1
1 - -.
191 -
-4.
=
45
36
64
72
60
Time (in hours)
Figure B9-3 - Destination IP address index versus time in 248.246C.
Destination port versus time
packet type-couLt
UDP
o
SYN
A
SYN/ACK
+
ACK
10000
d
4
o
p
AQ- 0 0
A
0
0&cqa
aon 0 4N
00 10
Q0A
1ST
7.183
-,-
RST/ACK
812E
01
0
0
TCP OTHER
11
100
0
0)
0
10
1
I
0
12
I
I
24
I
I
36
I
I
I
45
60
Time (in hours)
Figure B9-4 - Destination port versus time in 248.246C.
145
I
I
72
I
I
54
Total
JS
packets to each IP address in xx.24B.246.0/24
I
700,000
-
612.500
-
525,000
-
437,500
-
II
I
I
I
I
I
I
a,350,000E, 262,500 -
175,000
-
87,500 -
-
'
0
0
I
I
I
I
1
1 I
1
224
192
160
128
96
IF address index
64
32
Figure B9-5 - Total packets to each IP address in 248.246C.
Snort alerts versus time in xx.248.246.0
Eburve Quguch
X
i
X
SYN pkt w/ data (2
TCP pot 0 (3
TCP
header Ia
(:,
PING NMAP
X
>8
*
*
>11
>12
>13
>14
X
X<
X
X X XXOX X
X<
XX
XxW X<XX<X)X
X
XXK
X
X X
(30:
US-SQL Worm (0
0
I
0
*
*
X
> pkl (2
POMR1ANA pkto (AO
ICMP
X
X
ICMF DUnrewsh (:
ICE data abu.t <
alerts/hour
0 >0
M >1
M >2
>3
*
>4
*
* >5
>6
*
* >7
X
UDP len > payload (I
IC7
I
I
I
I
II
I
I
12
24
36
I
I
I
45
I
60
I
I
72
I
1
84
Time (in hours)
Figure B9-6 - Snort alerts versus time in 248.246C.
146
q~9
1
>9