English
 
User Manual Privacy Policy Disclaimer Contact us
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT

Released

Conference Paper

Reserved: Dissecting Internet Traffic on Port 0

MPS-Authors
/persons/resource/persons243011

Maghsoudlou,  Aniss
Internet Architecture, MPI for Informatics, Max Planck Society;

/persons/resource/persons243019

Gasser,  Oliver
Internet Architecture, MPI for Informatics, Max Planck Society;

/persons/resource/persons211491

Feldmann,  Anja
Internet Architecture, MPI for Informatics, Max Planck Society;

External Ressource
No external resources are shared
Fulltext (public)

arXiv:2004.03653.pdf
(Preprint), 204KB

Supplementary Material (public)
There is no public supplementary material available
Citation

Maghsoudlou, A., Gasser, O., & Feldmann, A. (2020). Reserved: Dissecting Internet Traffic on Port 0. In Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020. Retrieved from http://arxiv.org/abs/2004.03653.


Cite as: http://hdl.handle.net/21.11116/0000-0006-0D13-7
Abstract
Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes.