A high-performance network intrusion detection system
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
When the CRC and TCP checksum disagree
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
The Eifel algorithm: making TCP robust against spurious retransmissions
ACM SIGCOMM Computer Communication Review
Statistical analysis of malformed packets and their origins in the modern internet
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Statistical analysis of malformed packets and their origins in the modern internet
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
An analysis of longitudinal TCP passive measurements
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Hi-index | 0.00 |
In this work, we collect and analyze all of the IP and TCP headers of packets seen on a network that either violate existing standards or should not appear in modern internets. Our goal is to determine the reason that these packets appear on the network and evaluate what proportion of such packets could cause actual damage. Thus, we examine and divide the unusual packets obtained during our experiments into several categories based on their type and possible cause and show the results.