User login

Search Publications

Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports

23

Nov

2016

This study aims to identify and quantify applications that are making use of port numbers that are typically associated with other major Internet applications (i.e. port 53, 80, 123, 443, 8000 and 8080) to bypass port-based traffic controls such as firewalls. We use lightweight packet inspection to examine each flow observed using these ports on our campus network over the course of a week in September 2015 and identify applications that are producing network traffic that does not match the expected application for each port. We find that there are numerous programs that co-opt the port numbers of major Internet applications on our campus, many of which are Chinese in origin and are not recognized by existing traffic classification tools. As a result of our investigation, new rules for identifying over 20 new applications have been made available to the research community.

Author(s): 
Shane Alcock
Jean-Pierre Möller
Richard Nelson
AttachmentSize
imc27-alcock.pdf133.83 KB
Groups: