skip to main content
article
Free Access

Packets found on an internet

Published:01 July 1993Publication History
Skip Abstract Section

Abstract

As part of our security measures, we spend a fair amount of time and effort looking for things that might otherwise be ignored. Apart from assorted attempted penetrations, we have also discovered many examples of anomalous behavior. These range from excessive ICMP messages to nominally-local broadcast packets that have reached us from around the world.

References

  1. [Bel89] Steven M. Bellovin. Security problems in the TCP/IP protocol suite. Computer Communications Review, 19(2):32-48, April 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [Bel92a] Steven M. Bellovin. "Helpful" self-configuring programs. RISKS Digest, 13(25), March 5 1992.Google ScholarGoogle Scholar
  3. [Bel92b] Steven M. Bellovin. There be dragons. In Proc. UNIX Security Symposium III, pages 1-16, Baltimore, September 1992.Google ScholarGoogle Scholar
  4. [Bra89] R. T. Braden, ed. Requirements for Internet hosts-communication layers., October 1989. RFC 1122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [CFSD90] J. D. Case, M. Fedor, M. L. Schoffstall, and C. Davin. Simple Network Management Protocol (SNMP), May 1990. RFC 1157.Google ScholarGoogle Scholar
  6. [Che90] W. R. Cheswick. The design of a secure internet gateway. In Proc. Summer USENIX Conference , Anaheim, June 1990.Google ScholarGoogle Scholar
  7. [Che92] W. R. Cheswick. An evening with Berferd, in which a cracker is lured, endured, and studied. In Proc. Winter USENIX Conference, San Francisco, January 1992.Google ScholarGoogle Scholar
  8. [KL86] Brian Kantor and Phil Lapsley. Network News Transfer Protocol, February 1986. RFC 977.Google ScholarGoogle Scholar
  9. [Moc87] P. V. Mockapetris. Domain Names - Concepts and Facilities, November 1987. RFC 1034. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [Plu82] D. C. Plummer. Ethernet Address Resolution Protocol, November 1982. RFC 826. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [Pos81] Jon B. Postel. Internet Control Message Protocol, September 1981. RFC 792.Google ScholarGoogle Scholar
  12. [PPTT90] Rob Pike, Dave Presotto, Ken Thompson, and Howard Trickey. Plan 9 from Bell Labs. In Proceedings of the Summer 1990 UKUUG Conference, pages 1-9, London, July 1990. UKUUG.Google ScholarGoogle Scholar
  13. [RP90] Joyce K. Reynolds and Jon B. Postel. Assigned numbers, March 1990. RFC 1060.Google ScholarGoogle Scholar
  14. [Sun88] Sun Microsystems, Inc. RPC: Remote Procedure Call Protocol Specification Version 2, June 1988. RFC 1057. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [Sun90] Sun Microsystems, Inc., Mountain View, CA. Network Interfaces Programmer's Guide, March 1990. SunOS 4.1.Google ScholarGoogle Scholar

Index Terms

  1. Packets found on an internet

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGCOMM Computer Communication Review
            ACM SIGCOMM Computer Communication Review  Volume 23, Issue 3
            July 1993
            85 pages
            ISSN:0146-4833
            DOI:10.1145/174194
            • Editor:
            • David Oran
            Issue’s Table of Contents

            Copyright © 1993 Author

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 July 1993

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader