Purpose – This study seeks to investigate modern internet back-bone traffic in order to study occurrences of malicious activities and potential security problems within internet packet headers. Design/methodology/approach – Contemporary and highly aggregated back-bone data have been analyzed regarding consistency of network and transport layer headers (i.e. IP, TCP, UDP and ICMP). Possible security implications of each anomaly observed are discussed. Findings – A systematic listing of packet header anomalies, together with their frequencies as seen “in the wild”, is provided. Inconsistencies in protocol headers have been found within almost every aspect analyzed, including incorrect or incomplete series of IP fragments, IP address anomali...
We contribute to an improved understanding of Internet traffic characteristics by measuring and anal...
Contemporary backbone-traffic is analyzed with respect to behaviour differences between inbound and ...
Contemporary backbone-traffic is analyzed with respect to behaviour differences between inbound and ...
Purpose – This study seeks to investigate modern internet back-bone traffic in order to study occurr...
The dominating Internet protocols, IP and TCP, allow some flexibility in implementation, including a...
The dominating Internet protocols, IP and TCP, allow some flexibility in implementation, including a...
With the growing threat of abuse of network resources, it becomes increasingly important to be able ...
The paper proposes how to detect network traffic anomalies through packet header data. In this the s...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modell...
Currently, we are witnessing a significant rise in various types of malware, which has an impact not...
Understanding, measuring, and debugging IP networks, particularly across administrative domains, is ...
We contribute to an improved understanding of Internet traffic characteristics by measuring and anal...
We contribute to an improved understanding of Internet traffic characteristics by measuring and anal...
Contemporary backbone-traffic is analyzed with respect to behaviour differences between inbound and ...
Contemporary backbone-traffic is analyzed with respect to behaviour differences between inbound and ...
Purpose – This study seeks to investigate modern internet back-bone traffic in order to study occurr...
The dominating Internet protocols, IP and TCP, allow some flexibility in implementation, including a...
The dominating Internet protocols, IP and TCP, allow some flexibility in implementation, including a...
With the growing threat of abuse of network resources, it becomes increasingly important to be able ...
The paper proposes how to detect network traffic anomalies through packet header data. In this the s...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modell...
Currently, we are witnessing a significant rise in various types of malware, which has an impact not...
Understanding, measuring, and debugging IP networks, particularly across administrative domains, is ...
We contribute to an improved understanding of Internet traffic characteristics by measuring and anal...
We contribute to an improved understanding of Internet traffic characteristics by measuring and anal...
Contemporary backbone-traffic is analyzed with respect to behaviour differences between inbound and ...
Contemporary backbone-traffic is analyzed with respect to behaviour differences between inbound and ...