English
 
Help Privacy Policy Disclaimer
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT

Released

Conference Paper

Reserved: Dissecting Internet Traffic on Port 0

MPS-Authors
/persons/resource/persons243011

Maghsoudlou,  Aniss
Internet Architecture, MPI for Informatics, Max Planck Society;

/persons/resource/persons243019

Gasser,  Oliver
Internet Architecture, MPI for Informatics, Max Planck Society;

/persons/resource/persons211491

Feldmann,  Anja
Internet Architecture, MPI for Informatics, Max Planck Society;

External Resource
No external resources are shared
Fulltext (restricted access)
There are currently no full texts shared for your IP range.
Fulltext (public)

arXiv:2004.03653.pdf
(Preprint), 204KB

Supplementary Material (public)
There is no public supplementary material available
Citation

Maghsoudlou, A., Gasser, O., & Feldmann, A. (2020). Reserved: Dissecting Internet Traffic on Port 0. In Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020. Retrieved from http://arxiv.org/abs/2004.03653.


Cite as: https://hdl.handle.net/21.11116/0000-0006-0D13-7
Abstract
Transport protocols use port numbers to allow connection multiplexing on
Internet hosts. TCP as well as UDP, the two most widely used transport
protocols, have limitations on what constitutes a valid and invalid port
number. One example of an invalid port number for these protocols is port 0. In
this work, we present preliminary results from analyzing port 0 traffic at a
large European IXP. In one week of traffic we find 74GB port 0 traffic. The
vast majority of this traffic has both source and destination ports set to 0,
suggesting scanning or reconnaissance as its root cause. Our analysis also
shows that more than half of all port 0 traffic is targeted to just 18 ASes,
whereas more than half of all traffic is originated by about 100 ASes,
suggesting a more diverse set of source ASes.