JSERNET UDP53 Port Traffic Analysis

As the well known port for DNS service, the 53 port won't be shielded by most of firewalls or network services. This defect can be used to send packets through firewalls without being detected. For comprehensive understanding of this phenomenon, a program was designed to inspect UDP flows going through the port 53. With the help of this program, we conducted traffic analysis on the 53 port of JSERNET and obtained the proportions of DNS flow and non-DNS flow, which were used to describe the real components of such flows.

[1]  A. Mena,et al.  An empirical study of real audio traffic , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[2]  Tian Jie A Solution for Packet Validity Check Against DNS Cache Poisoning , 2010 .

[3]  Wang Yao Detection and Defence of DNS Spoofing Attack , 2006 .

[4]  Zhang Yi-bin Comparative analysis on TCP and UDP network traffic , 2010 .

[5]  Bruce M. Maggs,et al.  An analysis of live streaming workloads on the internet , 2004, IMC '04.