DSL-IP Probes Curiousity..

I am just curious about this.
I see a rather unusual # of SNMP queiries
and port scans from DSL
IP blocks in the US...

How many of you really go after the script kiddies
doing this?

I know 1, 2 or even 3 a day is not a concern for me,
but when I get 3 a day from the same source IP allocation,
I start wondering...

Will anyone answer this? I know you may not be
able to comment due to legal concerns.. But I am curious..


I know people like to use sensational terms like "pre-attack
reconnaissance" and "DOS attacks." There is a constant background
hum on today's Internet, some of it is malicious, some of it is
badly managed systems. Between automated web spiders, academics doing
network discovery, automated worms, and badly designed "plug-n-play"
software, your IDS system should be seeing stuff all the time.

The Pentagon used to report amazing numbers for "network attacks,"
anything from a single ping up to a full scale network compromise, but I
haven't found recent numbers for 2002 or later.

FedCIRC put out these numbers for 2002.

Count Type
125 Root compromise
111 User compromise
46 Web Site Defacement
488,000 Reconnaissance Activity
36 Denial of Service
265 Malicious Code
22 DNS Attack
39 Misuse of Resources
1,268 Unknown

What does unknown mean? And how can you count it if its unknown? Not being
silly, genuinely curious.

:Will anyone answer this? I know you may not be
:able to comment due to legal concerns.. But I am curious..

I can answer, I just can't tell you who I do it for. :wink: (the point
of the nickname, but I digress)

Short answer is: the larger the victim network, the less
likely a portscans will be followed up due to the increased
probability of being part of some worms random propagation
pattern, or the introduction of factors caused by the size
of the network.

What I have been trying to get done is a way of sorting
incoming attacks by netblock, so that cases can be built against
those netblocks (eventually ASNs ideally) . We can go to the ISP
with the alerts originating from them over a period of time, and
show that someone is making a concerted effort to violate our
network policies, and be able to provide them with ample evidence
instead of the cheesy dumps of isolated portscan alerts from IDS's
that they usually get.

Interestingly, the IDS alert sorting interfaces that I have seen
(cisco, iss, snort, acid, intellitactics etc.) do not seem to be
CIDR aware, or aware in a meaningful way which would facillitate
the kind of follow-up I just described.

They sort by lots of internal flags (src, dst, severity, type)
but they do not allow the aggregation of sources to enable the
co-ordination of a response with the offending network. It's like
they designed the software without understanding the value of the
information it was generating. The one blind spot in the query
types you can do on them is the one thing that would make them
generate valuable information. It's kind of a joke really.

(If any of those vendors are listening, I just gave you a million
dollar improvement to your product. Contact me off list on where to send
that bottle of Macallan, or for a good charity to donate to.)

So, as for your question, the answer is: maybe.