[nsp-sec] TCP-23 Increase
Jason Chambers
jchambers at ucla.edu
Mon Jun 30 16:09:13 EDT 2008
Matthew.Swaar at us-cert.gov wrote:
> I'm working on comparing Ips across multiple days, see if it's a
> relatively static handful doing this. The traffic appears to be mostly
> 60bpp SYN scanning, with some SYN-RST thrown in.
>
> Anyone have a theory about what prompted this?
>
>
Similar observation from here; an increase started on the 25th.
212.106.54.173 was the only host found on more than day exceeding 20k
destinations.
No idea on the reason. Maybe we should make friends with the PNL folks
or figure out how to build a shared "NUANCE" [1]. I saw it at last
year's VizSec but haven't gotten anywhere close to replicating it.
--Jason
Unique destinations per day:
date | dst_port | dst_host_count
---------------------+----------+----------------
2008-06-29 00:00:00 | 23 | 99663
2008-06-28 00:00:00 | 23 | 106823
2008-06-27 00:00:00 | 23 | 96185
2008-06-26 00:00:00 | 23 | 58626
2008-06-25 00:00:00 | 23 | 104375
2008-06-24 00:00:00 | 23 | 13476
2008-06-22 00:00:00 | 23 | 12021
2008-06-20 00:00:00 | 23 | 13864
2008-06-19 00:00:00 | 23 | 11178
2008-06-18 00:00:00 | 23 | 53817
[1] http://www.vizsec.org/workshop2007/presentations/pike-context.pdf
Bill Pike, Chad Scherrer and Sean Zabriskie.
Putting Security in Context: Visual Correlation of Network Activity with
Real-World Information *
Abstract: To effectively identify and respond to cyber threats, computer
security analysts must understand the scale, motivation, methods,
source, and target of an attack. Central to developing this situational
awareness is the analyst's world knowledge that puts these attributes in
context. What known exploits or new vulnerabilities might an anomalous
traffic pattern suggest? What organizational, social, or geopolitical
events help forecast or explain attacks and anomalies? Few
visualization tools support creating, maintaining, and applying this
knowledge of the threat landscape. Through a series of formative
workshops with practicing security analysts, we have developed a
visualization approach inspired by the human process of
contextualization; this system, called NUANCE, creates evolving
behavioral models of network actors at organizational and regional
levels, continuously monitors external textual information sources for
themes that indicate security threats, and automatically determines if
behavior indicative of those threats is present on a network.
More information about the nsp-security
mailing list