{"id":796,"date":"2011-03-23T16:57:51","date_gmt":"2011-03-23T23:57:51","guid":{"rendered":"http:\/\/blog.caida.org\/best_available_data\/?p=796"},"modified":"2014-09-12T14:26:39","modified_gmt":"2014-09-12T21:26:39","slug":"unsolicited-internet-traffic-from-libya","status":"publish","type":"post","link":"https:\/\/blog.caida.org\/best_available_data\/2011\/03\/23\/unsolicited-internet-traffic-from-libya\/","title":{"rendered":"Unsolicited Internet Traffic from Libya"},"content":{"rendered":"<p>Amidst the recent political unrest in the Middle East,  researchers have observed significant changes in Internet traffic and  connectivity.  In this article we tap into a previously unused source of  data: unsolicited Internet traffic arriving from Libya. The traffic  data we captured shows distinct changes in unsolicited traffic patterns  since 17 February 2011.<\/p>\n<div id=\"parent-fieldname-text\">\n<p>Most of the information already published about Internet connectivity in the Middle East has been based on four types of data:<\/p>\n<p><!--more--><\/p>\n<ol>\n<li><a href=\"http:\/\/www.renesys.com\/blog\/2011\/02\/libyan-disconnect-1.shtml\">BGP<\/a><\/li>\n<li><a href=\"http:\/\/monkey.org\/%7Elabovit\/blog\/viewpage.php?page=libya_firewall_cracks\">Netflow data in the core<\/a><a href=\"http:\/\/monkey.org\/%7Elabovit\/blog\/viewpage.php?page=libya_firewall_cracks\"><br \/>\n<\/a><\/li>\n<li><a href=\"http:\/\/www.renesys.com\/blog\/2011\/01\/egypt-leaves-the-internet.shtml\">Traceroute\/ping latencies<br \/>\n<\/a><\/li>\n<li><a href=\"http:\/\/www.google.com\/transparencyreport\/traffic\/?r=LY&amp;l=WEBSEARCH&amp;csd=1296630346788&amp;ced=1300195800000\">Search and other queries to Google<\/a><\/li>\n<\/ol>\n<p>In this article we discuss another type of Internet measurement data  that can be useful in monitoring macroscopically visible Internet  events:\u00a0 unsolicited packets destined to unused address space. Similar  to the notion of <a href=\"http:\/\/en.wikipedia.org\/wiki\/Cosmic_microwave_background_radiation\">Cosmic Microwave Background Radiation<\/a>,  this Internet &#8220;background noise&#8221; of unsolicited packets consists of  packets sent by misconfigured hosts, hosts that are scanning the  network, or victims of DoS attacks with spoofed source addresses.<\/p>\n<p>On 21 November 2008, the amount of unsolicited traffic at the UCSD network telescope (described below) grew dramatically with <a href=\"http:\/\/www.caida.org\/research\/security\/ms08-067\/conficker.xml\">the advent of the Conficker worm<\/a>, which widely infected Windows hosts and actively scanned for hosts to infect on TCP port 445. From that point on about <a href=\"http:\/\/www.caida.org\/data\/realtime\/telescope\/?monitor=telescope_attack&amp;row=timescales&amp;col=sources&amp;sources=app&amp;graphs_%20sing=ts_perc&amp;counters_sing=packets&amp;timescales=17520\">60-80% of unsolicited Internet traffic is via TCP port 445<\/a>. Sufficiently <a href=\"http:\/\/www.confickerworkinggroup.org\/wiki\/pmwiki.php\/ANY\/InfectionTracking\">pervasive worms such as Conficker<\/a> allow informed estimates of aggregate infection rates &#8212; in this case  of a vulnerable (ie. unpatched) Windows population &#8212; by monitoring  traffic to unassigned IP address space.<\/p>\n<p>The Conficker worm scans whenever a host is online, although its rate  of scanning is higher when it detects no user activity on a machine  (see <a href=\"http:\/\/www.symantec.com\/connect\/blogs\/downadup-attempts-smart-network-scanning\">this report<\/a> by Symantec). So the amount of unsolicited traffic originating from  Conficker&#8217;s network scanning allows us to see hosts that are online, but  where the user is not actively generating Internet traffic.<\/p>\n<p>The <a href=\"http:\/\/www.caida.org\/data\/passive\/network_telescope.xml\">UCSD network telescope<\/a> captures traffic destined to the unassigned address space in a \/8  network, with relatively few blocks in this \/8 where end hosts are  active. Filtering this data for source addresses from a specific region  provides an indication of host activity for that region. We used the <a href=\"http:\/\/www.maxmind.com\/app\/geoip_country\">MaxMind GeoIP Lite<\/a> database, January 2011 edition, to map IP addresses to geographic  regions, and recorded the per-second packet rate (averaged over 60  seconds) from address ranges that geolocated to Libya. Figure 1 shows  five weeks of these packet-per-second averages, and Figures 2, 3 and 4  show the same data zoomed in to interesting 2-day, 3-day and 7-day  intervals, respectively.<\/p>\n<div id=\"attachment_809\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopepps.png\"><img aria-describedby=\"caption-attachment-809\" loading=\"lazy\" src=\"http:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopepps-300x180.png\" alt=\"Unsolicited internet traffic from Libya\" title=\"Unsolicited internet traffic from Libya\" width=\"300\" height=\"180\" class=\"size-medium wp-image-809\" srcset=\"https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopepps-300x180.png 300w, https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopepps-1024x614.png 1024w, https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopepps.png 1120w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-809\" class=\"wp-caption-text\">Figure 1. Five weeks of observed unsolicited Internet traffic from IP address blocks that geolocated to Libya according to MaxMind GeoIP Lite database, January 2011 edition.<\/p><\/div>\n<p><em><\/em>Figure 1 shows unsolicited one-way traffic for five weeks, including  some &#8220;silent&#8221; gaps with absolutely no traffic, and other intervals with  larger and more typical levels. During these five weeks there was an  interval of about one-and-a-half days where the data collection server  didn&#8217;t collect data, indicated in light red with label &#8216;no data&#8217;, and  for a period of about a day where traffic levels were almost always  higher then 8 packets per second (pps), indicated in light blue with  label &#8216;denial-of-service&#8217;. Figure 1 also shows a number of intervals  with next to no traffic, notably in the 18 &#8211; 21 February period and  between 3 and 8 March. This is shown in more detail in Figure 3 and  Figure 4 below. After 8 March the amount of unsolicited traffic is  slowly picking up again, but not to the levels from before 3 March.<\/p>\n<div id=\"attachment_811\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsddos.png\"><img aria-describedby=\"caption-attachment-811\" loading=\"lazy\" src=\"http:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsddos-300x180.png\" alt=\"Unsolicited internet traffic from Libya - DDoS\" title=\"Unsolicited internet traffic from Libya - DDoS\" width=\"300\" height=\"180\" class=\"size-medium wp-image-811\" srcset=\"https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsddos-300x180.png 300w, https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsddos-1024x614.png 1024w, https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsddos.png 1120w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-811\" class=\"wp-caption-text\">Figure 2. Two days of observed unsolicited Internet traffic from IP address blocks that geolocated to Libya according to MaxMind GeoIP Lite database, January 2011 edition.<\/p><\/div>\n<p>Figure 2 shows a 2-day period that includes an interval of higher  packet rates, labeled &#8220;denial-of-service&#8221; in Figure 1, on a different  y-scale. Where outside of this period the packet rate usually is below 5  pps, during this period the packet rates received go up to 367 pps at  the highest peak. While the unsolicited traffic outside this interval is  dominated by traffic to TCP\/445, the higher-packet rates interval is  dominated by SYN\/ACK packets from TCP\/80 from a single source IP address  to seemingly random destinations in the UCSD network telescope. This is  typical &#8220;<a href=\"http:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack#Backscatter\">backscatter<\/a>&#8221;  of a denial-of-service attack, in this case of a single webserver we  geolocated to Libya. There are intervals where packet rates stay around  50, 100, 150 and 200 pps, which could point at an attacker stepping  their attack up and down. Note that we only saw a small fraction of the  return traffic from this attack, but it looks like this attack was very  modest by current standards (see for instance <a href=\"http:\/\/news.cnet.com\/8301-27080_3-20039385-245.html\">this news report on a tens of millons of pps attack on WordPress<\/a>).<\/p>\n<div id=\"attachment_815\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsshortoutages.png\"><img aria-describedby=\"caption-attachment-815\" loading=\"lazy\" src=\"http:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsshortoutages-300x180.png\" alt=\"Unsolicited internet traffic from Libya - short outages\" title=\"Unsolicited internet traffic from Libya - short outages\" width=\"300\" height=\"180\" class=\"size-medium wp-image-815\" srcset=\"https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsshortoutages-300x180.png 300w, https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsshortoutages-1024x614.png 1024w, https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppsshortoutages.png 1120w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-815\" class=\"wp-caption-text\">Figure 3. Unsolicited Internet traffic during 18 - 21 February 2011 from IP address blocks that geolocated to Libya according to MaxMind GeoIP Lite database, January 2011 edition.<\/p><\/div>\n<p>Figure 3 shows two distinct overnight outages consistent with Arbor Networks&#8217;s <a href=\"http:\/\/monkey.org\/%7Elabovit\/blog\/\/viewpage.php?page=libya_firewall_cracks\">netflow measurements<\/a> during the same period (18 &#8211; 21 February 2011). Interestingly in both  cases, a small trickle of traffic begins right before the outage ends.\u00a0  Occasional traffic is often observed during these outages, which could  be an artifact of <a href=\"http:\/\/rbeverly.net\/research\/papers\/spoofer-imc09.html\">traffic with spoofed IP addresses<\/a> or inaccuracy in the geolocation database we used for prefix selection.<\/p>\n<div id=\"attachment_813\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppslongoutage.png\"><img aria-describedby=\"caption-attachment-813\" loading=\"lazy\" src=\"http:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppslongoutage-300x180.png\" alt=\"Unsolicited internet traffic from Libya - long outage\" title=\"Unsolicited internet traffic from Libya - long outage\" width=\"300\" height=\"180\" class=\"size-medium wp-image-813\" srcset=\"https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppslongoutage-300x180.png 300w, https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppslongoutage-1024x614.png 1024w, https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2011\/03\/libyatelescopeppslongoutage.png 1120w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-813\" class=\"wp-caption-text\">Figure 4. Unsolicited Internet traffic during 1 - 8 March 2011 from IP address blocks that geolocated to Libya according to MaxMind GeoIP Lite database, January 2011 edition.<\/p><\/div>\n<p>Figure 4 reveals a longer outage visible from approximately 3 March  18:00 UTC to 7 March 11:00 UTC. The traffic levels after this outage  were significantly lower then before. Figure 1 shows a slow subsequent  increase after this outage to roughly 20% of pre-outage traffic levels.  In <a href=\"http:\/\/www.google.com\/transparencyreport\/traffic\/?r=LY&amp;l=WEBSEARCH&amp;csd=1298540411009&amp;ced=1300195800000\">Google&#8217;s transparency index<\/a> search queries are less then 5% of pre-outage levels, so it seems that  the few hosts we observe sending out unsolicited traffic after this  outage do significantly fewer search queries to Google than the  population of hosts before the outage. It is unclear if this is due to  stricter filtering of traffic to Google, and potentially other websites.  A tiny spike in traffic around 12 March 19:58 UTC to pre-outage levels  is visible in Figure 1, and also visible in Google&#8217;s data, which could  be interpreted as a temporary glitch of an Internet filter.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p><strong><\/strong>Ironically, the insidious pervasive reach of malware like the  Conficker worm enables observation and detection of macroscopic changes  in Internet behaviour.<\/p>\n<p>In this case we saw several anomalies in the amount of unsolicited  traffic out of networks we geolocated to Libya over the last couple of  weeks.<\/p>\n<p>CAIDA is coordinating further analysis of this data by a team of  vetted researchers. Please comment below if you have any questions.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Amidst the recent political unrest in the Middle East, researchers have observed significant changes in Internet traffic and connectivity. In this article we tap into a previously unused source of data: unsolicited Internet traffic arriving from Libya. The traffic data we captured shows distinct changes in unsolicited traffic patterns since 17 February 2011. Most of [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,6,16,31,10,8,13,9],"tags":[],"coauthors":[32],"_links":{"self":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/796"}],"collection":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/comments?post=796"}],"version-history":[{"count":17,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/796\/revisions"}],"predecessor-version":[{"id":2854,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/796\/revisions\/2854"}],"wp:attachment":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/media?parent=796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/categories?post=796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/tags?post=796"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/coauthors?post=796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}