Abstract
In early 2004, 5 sets of honeypots were deployed sequentially togather data on threats that exist on a normal DSL internet connection. Other than the main finding that normal DSL users are susceptible to random online attack, the research has also observed several kinds of abnormalities and interesting network traffic such as port zero TCP traffic and Net BIOS 5MB spam pop-up advertisement network traffic. Traffic to or from port zero is not valid under normal circumstances as there is no such port zero. As these packets are high possibly crafted, it is an indicator of unauthorised network use, reconnaissance activities or system compromise. Some of the honeypots also experienced pop-up messages with advertisements. The pop-up advertisement messages were the results of spamming activities that exploit Net BIOS messaging protocol. This paper analysed both the TCP port zero traffic and Net BIOS 5MB spam advertisement pop up network traffic which were experienced by the honeypot deployed.
Metadata
Item Type: | Article |
---|---|
Creators: | Creators Email / ID Num. Mohd Tamil, Emran emran@um.edu.my Othman, Abdul Hamid UNSPECIFIED |
Subjects: | T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Computer networks. General works. Traffic monitoring T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Computer networks. General works. Traffic monitoring > Computer network protocols > TCP/IP (Computer network protocol) |
Divisions: | Universiti Teknologi MARA, Pahang > Jengka Campus |
Journal or Publication Title: | Jurnal Gading UiTM Pahang |
UiTM Journal Collections: | Others > GADING |
ISSN: | 0128-5599 |
Volume: | 10 |
Number: | 1 |
Page Range: | pp. 15-27 |
Keywords: | High interaction honeypot, Honeynet, Port zero, Net BIOS spam SMB exploit, Reconnaissance |
Date: | 2006 |
URI: | https://ir.uitm.edu.my/id/eprint/35555 |