Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/node/50970' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/node/50970' in /dati/webiit-old/includes/database.pgsql.inc on line 159 How long does it take before a new Internet node is contacted for the very first time? | IIT - CNR - Istituto di Informatica e Telematica
IIT Home Page CNR Home Page

How long does it take before a new Internet node is contacted for the very first time?

When connecting to the Internet a new device (e.g. a computer, a server, a consumer IoT device, etc.) that publicly exposes - i.e. uses a public IPv4 address - any service on any given TCP port (e.g. TELNET on port TCP/23, etc.), the new connected node could be remotely contacted by other network nodes that, both legitimately and maliciously, could attempt to remotely connect to the exposed service. To know if a remote connection attempt comes from a legitimate or a malicious node, it is possible to use a honeypot: a network node that acts as the new device, but actually works as a malicious nodes bait. The latter allows making the assumption that all the attempts, incoming to the honeypot, comes from malicious nodes. In this case, how long does it take before a malicious node attempts to remotely connect to the honeypot, for the very first time since it has been connected to the Internet? This article gives an answer to the latter question, describing both network and software environments used to get the appropriate measurements discussed within this document.


2018

Autori IIT:

Tipo: Rapporto Tecnico
Area di disciplina: Computer Science & Engineering
IIT TR-03/2018

File: IIT-03-2018.pdf

Attività: Rete telematica del CNR di Pisa