Dataset Viewer
Auto-converted to Parquet Duplicate
log
stringlengths
191
6.55k
Label
stringclasses
12 values
response
stringclasses
12 values
event_type: flow, proto: TCP, flow_pkts_toserver: 8, flow_pkts_toclient: 0, flow_bytes_toserver: 480, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout, tcp_tcp_flags: 00, tcp_tcp_flags_ts: 00, tcp_tcp_flags_tc: 00
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, flow_pkts_toserver: 9, flow_pkts_toclient: 0, flow_bytes_toserver: 540, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout, tcp_tcp_flags: 00, tcp_tcp_flags_ts: 00, tcp_tcp_flags_tc: 00
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 1260, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 38, flow_pkts_toclient: 42, flow_bytes_toserver: 3820, flow_bytes_toclient: 4272, flow_age: 83, flow_state: established, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 246, flow_bytes_toclient: 346, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 100, event_type: dns, proto: UDP, dns_type: query, dns_id: 47486, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 101, event_type: dns, proto: UDP, dns_type: query, dns_id: 47486, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 104, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47486, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 105, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47486, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 246, flow_bytes_toclient: 346, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 102, event_type: dns, proto: UDP, dns_type: query, dns_id: 18043, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 103, event_type: dns, proto: UDP, dns_type: query, dns_id: 18043, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 106, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18043, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 107, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18043, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 108, event_type: dns, proto: UDP, dns_type: query, dns_id: 61030, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 109, event_type: dns, proto: UDP, dns_type: query, dns_id: 61030, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 112, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61030, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 113, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61030, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 110, event_type: dns, proto: UDP, dns_type: query, dns_id: 61304, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 111, event_type: dns, proto: UDP, dns_type: query, dns_id: 61304, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 114, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61304, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 115, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61304, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 412, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 498, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3730, flow_bytes_toclient: 3648, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 14, flow_pkts_toclient: 13, flow_bytes_toserver: 4946, flow_bytes_toclient: 6450, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 412, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 226, flow_bytes_toclient: 326, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 273, event_type: dns, proto: UDP, dns_type: query, dns_id: 54564, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 274, event_type: dns, proto: UDP, dns_type: query, dns_id: 54564, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 275, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54564, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 276, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54564, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3704, flow_bytes_toclient: 3636, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 10, flow_pkts_toclient: 8, flow_bytes_toserver: 1226, flow_bytes_toclient: 3544, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 946, flow_bytes_toclient: 894, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 188, event_type: krb5, proto: TCP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/Testbed1.ca, krb5_encryption: <none>, krb5_weak_encryption: False
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: dcerpc, flow_pkts_toserver: 26, flow_pkts_toclient: 14, flow_bytes_toserver: 3176, flow_bytes_toclient: 2576, flow_age: 56, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 134, event_type: dcerpc, proto: TCP, dcerpc_request: BIND, dcerpc_interfaces_0_uuid: e1af8308-5d1f-11c9-91a4-08002b14a0fa, dcerpc_interfaces_0_version: 3.0, dcerpc_interfaces_0_ack_result: 2, dcerpc_interfaces_1_uuid: e1af8308-5d1f-11c9-91a4-08002b14a0fa, dcerpc_interfaces_1_version: 3.0, dcerpc_interfaces_1_ack_result: 0, dcerpc_interfaces_2_uuid: e1af8308-5d1f-11c9-91a4-08002b14a0fa, dcerpc_interfaces_2_version: 3.0, dcerpc_interfaces_2_ack_result: 3, dcerpc_response: BINDACK, dcerpc_call_id: 2, dcerpc_rpc_version: 5.0 ; pcap_cnt: 281, event_type: dcerpc, proto: TCP, dcerpc_request: REQUEST, dcerpc_req_opnum: 3, dcerpc_req_frag_cnt: 1, dcerpc_req_stub_data_size: 144, dcerpc_response: RESPONSE, dcerpc_res_frag_cnt: 1, dcerpc_res_stub_data_size: 252, dcerpc_call_id: 2, dcerpc_rpc_version: 5.0 ; pcap_cnt: 958, event_type: dcerpc, proto: TCP, dcerpc_request: REQUEST, dcerpc_req_opnum: 3, dcerpc_req_frag_cnt: 1, dcerpc_req_stub_data_size: 144, dcerpc_response: RESPONSE, dcerpc_res_frag_cnt: 1, dcerpc_res_stub_data_size: 156, dcerpc_call_id: 3, dcerpc_rpc_version: 5.0 ; pcap_cnt: 1454, event_type: dcerpc, proto: TCP, dcerpc_request: REQUEST, dcerpc_req_opnum: 3, dcerpc_req_frag_cnt: 1, dcerpc_req_stub_data_size: 144, dcerpc_response: RESPONSE, dcerpc_res_frag_cnt: 1, dcerpc_res_stub_data_size: 156, dcerpc_call_id: 4, dcerpc_rpc_version: 5.0 ; pcap_cnt: 1851, event_type: dcerpc, proto: TCP, dcerpc_request: REQUEST, dcerpc_req_opnum: 3, dcerpc_req_frag_cnt: 1, dcerpc_req_stub_data_size: 144, dcerpc_response: RESPONSE, dcerpc_res_frag_cnt: 1, dcerpc_res_stub_data_size: 156, dcerpc_call_id: 5, dcerpc_rpc_version: 5.0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 3274, flow_bytes_toclient: 3300, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 242, event_type: krb5, proto: TCP, krb5_msg_type: KRB_TGS_REP, krb5_cname: MITACS-PC6$, krb5_realm: TESTBED1.CA, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: aes256-cts-hmac-sha1-96, krb5_weak_encryption: False
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 95, flow_bytes_toclient: 152, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 344, event_type: dns, proto: UDP, dns_type: query, dns_id: 57666, dns_rrname: 252.0.0.224.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 345, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57666, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 252.0.0.224.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: 224.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 374, dns_authorities_0_soa_mname: sns.dns.icann.org, dns_authorities_0_soa_rname: noc.dns.icann.org, dns_authorities_0_soa_serial: 2017042814, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 1512, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 1530, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 2376, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 2376, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 3, flow_pkts_toclient: 3, flow_bytes_toserver: 276, flow_bytes_toclient: 210, flow_age: 3, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 2376, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 2376, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 324, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 592, event_type: dns, proto: UDP, dns_type: query, dns_id: 5585, dns_rrname: 9.10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 593, event_type: dns, proto: UDP, dns_type: query, dns_id: 5585, dns_rrname: 9.10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_tx_id: 1 ; pcap_cnt: 594, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5585, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: 9.10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_rcode: NOERROR, dns_authorities_0_rrname: 10.168.192.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 16, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 595, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5585, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: 9.10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_rcode: NOERROR, dns_authorities_0_rrname: 10.168.192.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 16, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 336, flow_bytes_toclient: 336, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 596, event_type: dns, proto: UDP, dns_type: query, dns_id: 50984, dns_rrname: 10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 597, event_type: dns, proto: UDP, dns_type: query, dns_id: 50984, dns_rrname: 10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_tx_id: 1
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 296, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 584, event_type: dns, proto: UDP, dns_type: query, dns_id: 54914, dns_rrname: mitacs-pc6.Testbed1.ca, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 585, event_type: dns, proto: UDP, dns_type: query, dns_id: 54914, dns_rrname: mitacs-pc6.Testbed1.ca, dns_rrtype: SOA, dns_tx_id: 1 ; pcap_cnt: 586, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54914, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: mitacs-pc6.Testbed1.ca, dns_rrtype: SOA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 587, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54914, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: mitacs-pc6.Testbed1.ca, dns_rrtype: SOA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 290, flow_bytes_toclient: 290, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 588, event_type: dns, proto: UDP, dns_type: query, dns_id: 62012, dns_rrname: Testbed1.ca, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 589, event_type: dns, proto: UDP, dns_type: query, dns_id: 62012, dns_rrname: Testbed1.ca, dns_rrtype: SOA, dns_tx_id: 1
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 920, flow_bytes_toclient: 836, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 613, event_type: krb5, proto: TCP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/TESTBED1, krb5_encryption: <none>, krb5_weak_encryption: False
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 10, flow_pkts_toclient: 8, flow_bytes_toserver: 1200, flow_bytes_toclient: 3422, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 3210, flow_bytes_toclient: 3260, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 648, event_type: krb5, proto: TCP, krb5_msg_type: KRB_TGS_REP, krb5_cname: cic1, krb5_realm: TESTBED1.CA, krb5_sname: host/mitacs-pc6.testbed1.ca, krb5_encryption: aes256-cts-hmac-sha1-96, krb5_weak_encryption: False
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 128, flow_pkts_toclient: 0, flow_bytes_toserver: 29724, flow_bytes_toclient: 0, flow_age: 10, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: ntp, flow_pkts_toserver: 32, flow_pkts_toclient: 32, flow_bytes_toserver: 2880, flow_bytes_toclient: 2880, flow_age: 1154, flow_state: established, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 9, flow_pkts_toclient: 10, flow_bytes_toserver: 5464, flow_bytes_toclient: 858, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1088, event_type: krb5, proto: TCP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_TGS_REQ, krb5_error_code: KDC_ERR_BADOPTION, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: mitacs-pc6$@TESTBED1.CA, krb5_encryption: <none>, krb5_weak_encryption: False
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 3276, flow_bytes_toclient: 3316, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1069, event_type: krb5, proto: TCP, krb5_msg_type: KRB_TGS_REP, krb5_cname: MITACS-PC6$, krb5_realm: TESTBED1.CA, krb5_sname: mitacs-pc6$@TESTBED1.CA, krb5_encryption: aes256-cts-hmac-sha1-96, krb5_weak_encryption: False
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 14, flow_pkts_toclient: 14, flow_bytes_toserver: 4908, flow_bytes_toclient: 1836, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3682, flow_bytes_toclient: 3600, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 207, flow_pkts_toclient: 0, flow_bytes_toserver: 19044, flow_bytes_toclient: 0, flow_age: 13, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 586, flow_bytes_toclient: 421, flow_age: 60, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: ET.INFO.WindowsUpdate, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 991, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: ET.INFO.WindowsUpdate, http_hostname: ctldl.windowsupdate.com, http_url: /msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a95239a69dade2d1, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/vnd.ms-cab-compressed, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 304, http_length: 0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 15, flow_bytes_toserver: 6540, flow_bytes_toclient: 10090, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1a, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3730, flow_bytes_toclient: 3648, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 10, flow_pkts_toclient: 8, flow_bytes_toserver: 1224, flow_bytes_toclient: 3544, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 946, flow_bytes_toclient: 894, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 861, event_type: krb5, proto: TCP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: <none>, krb5_weak_encryption: False
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: failed, app_proto_tc: dcerpc, flow_pkts_toserver: 42, flow_pkts_toclient: 36, flow_bytes_toserver: 14564, flow_bytes_toclient: 8184, flow_age: 66, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 911, event_type: anomaly, proto: TCP, anomaly_type: applayer, anomaly_event: APPLAYER_WRONG_DIRECTION_FIRST_DATA, anomaly_layer: proto_detect
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 19, flow_pkts_toclient: 0, flow_bytes_toserver: 1653, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 1188, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 100, flow_bytes_toclient: 209, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 933, event_type: dns, proto: UDP, dns_type: query, dns_id: 42312, dns_rrname: ctldl.windowsupdate.nsatc.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 943, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42312, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ctldl.windowsupdate.nsatc.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ctldl.windowsupdate.nsatc.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: ctldl.windowsupdate.com.edgesuite.net, dns_answers_1_rrname: ctldl.windowsupdate.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 16660, dns_answers_1_rdata: a1621.g.akamai.net, dns_answers_2_rrname: a1621.g.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 1, dns_answers_2_rdata: 208.185.118.105, dns_answers_3_rrname: a1621.g.akamai.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 1, dns_answers_3_rdata: 208.185.118.89, dns_grouped_CNAME_0: ctldl.windowsupdate.com.edgesuite.net, dns_grouped_CNAME_1: a1621.g.akamai.net, dns_grouped_A_0: 208.185.118.105, dns_grouped_A_1: 208.185.118.89
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3704, flow_bytes_toclient: 3636, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 3274, flow_bytes_toclient: 3300, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1162, event_type: krb5, proto: TCP, krb5_msg_type: KRB_TGS_REP, krb5_cname: MITACS-PC6$, krb5_realm: TESTBED1.CA, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: aes256-cts-hmac-sha1-96, krb5_weak_encryption: False
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 101, flow_bytes_toclient: 163, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1108, event_type: dns, proto: UDP, dns_type: query, dns_id: 1001, dns_rrname: www.msftncsi.com.edgesuite.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1119, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 1001, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.msftncsi.com.edgesuite.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.msftncsi.com.edgesuite.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 1, dns_answers_0_rdata: a1961.g2.akamai.net, dns_answers_1_rrname: a1961.g2.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 69.31.33.224, dns_answers_2_rrname: a1961.g2.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 1, dns_answers_2_rdata: 69.31.33.218, dns_grouped_A_0: 69.31.33.224, dns_grouped_A_1: 69.31.33.218, dns_grouped_CNAME_0: a1961.g2.akamai.net
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 101, flow_bytes_toclient: 163, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1296, event_type: dns, proto: UDP, dns_type: query, dns_id: 16586, dns_rrname: www.msftncsi.com.edgesuite.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1297, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 16586, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.msftncsi.com.edgesuite.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.msftncsi.com.edgesuite.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 14, dns_answers_0_rdata: a1961.g2.akamai.net, dns_answers_1_rrname: a1961.g2.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 69.31.33.224, dns_answers_2_rrname: a1961.g2.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 1, dns_answers_2_rdata: 69.31.33.218, dns_grouped_A_0: 69.31.33.224, dns_grouped_A_1: 69.31.33.218, dns_grouped_CNAME_0: a1961.g2.akamai.net
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 397, flow_bytes_toclient: 479, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1307, event_type: http, proto: TCP, tx_id: 0, http_hostname: www.msftncsi.com, http_url: /ncsi.txt, http_http_user_agent: Microsoft NCSI, http_http_content_type: text/plain, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 14 ; pcap_cnt: 1312, event_type: fileinfo, proto: TCP, http_hostname: www.msftncsi.com, http_url: /ncsi.txt, http_http_user_agent: Microsoft NCSI, http_http_content_type: text/plain, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 14, app_proto: http, fileinfo_filename: /ncsi.txt, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 14, fileinfo_tx_id: 0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 306, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1309, event_type: dns, proto: UDP, dns_type: query, dns_id: 6350, dns_rrname: ipv6.msftncsi.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1310, event_type: dns, proto: UDP, dns_type: query, dns_id: 6350, dns_rrname: ipv6.msftncsi.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 1314, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 6350, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ipv6.msftncsi.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ipv6.msftncsi.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 939, dns_answers_0_rdata: ipv6.msftncsi.com.edgesuite.net, dns_answers_1_rrname: ipv6.msftncsi.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 10944, dns_answers_1_rdata: a978.i6g1.akamai.net, dns_grouped_CNAME_0: ipv6.msftncsi.com.edgesuite.net, dns_grouped_CNAME_1: a978.i6g1.akamai.net ; pcap_cnt: 1315, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 6350, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ipv6.msftncsi.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ipv6.msftncsi.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 939, dns_answers_0_rdata: ipv6.msftncsi.com.edgesuite.net, dns_answers_1_rrname: ipv6.msftncsi.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 10944, dns_answers_1_rdata: a978.i6g1.akamai.net, dns_grouped_CNAME_0: ipv6.msftncsi.com.edgesuite.net, dns_grouped_CNAME_1: a978.i6g1.akamai.net
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 91, flow_bytes_toclient: 155, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1311, event_type: dns, proto: UDP, dns_type: query, dns_id: 50259, dns_rrname: a978.i6g1.akamai.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1313, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50259, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a978.i6g1.akamai.net, dns_rrtype: A, dns_rcode: NOERROR, dns_authorities_0_rrname: i6g1.akamai.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 824, dns_authorities_0_soa_mname: n0i6g1.akamai.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499082722, dns_authorities_0_soa_refresh: 1000, dns_authorities_0_soa_retry: 1000, dns_authorities_0_soa_expire: 1000, dns_authorities_0_soa_minimum: 1800
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3654, flow_bytes_toclient: 3572, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 26, flow_pkts_toclient: 22, flow_bytes_toserver: 3422, flow_bytes_toclient: 3462, flow_age: 13, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 412, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1693, event_type: dns, proto: UDP, dns_type: query, dns_id: 59961, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 1694, event_type: dns, proto: UDP, dns_type: query, dns_id: 59961, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 1695, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59961, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 1696, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59961, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: smb, flow_pkts_toserver: 22, flow_pkts_toclient: 14, flow_bytes_toserver: 2788, flow_bytes_toclient: 2564, flow_age: 13, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1627, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: 2.10, smb_command: SMB2_COMMAND_NEGOTIATE_PROTOCOL, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: 2.02, smb_client_dialects_1: 2.10, smb_client_guid: a191b8df-5fe6-11e7-2eab-acb86c1f1d6f, smb_server_guid: 2688b669-c1d2-4c42-a4ae-0bbdfadcb374, smb_max_read_size: 8388608, smb_max_write_size: 8388608 ; pcap_cnt: 1631, event_type: smb, proto: TCP, smb_id: 2, smb_dialect: 2.10, smb_command: SMB2_COMMAND_SESSION_SETUP, smb_status: STATUS_MORE_PROCESSING_REQUIRED, smb_status_code: 0xc0000016, smb_session_id: 48391396524153, smb_tree_id: 0 ; pcap_cnt: 1635, event_type: smb, proto: TCP, smb_id: 3, smb_dialect: 2.10, smb_command: SMB2_COMMAND_SESSION_SETUP, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 48391396524153, smb_tree_id: 0, smb_ntlmssp_domain: , smb_ntlmssp_user: , smb_ntlmssp_host: MITACS-PC6 ; pcap_cnt: 1705, event_type: smb, proto: TCP, smb_id: 4, smb_dialect: 2.10, smb_command: SMB2_COMMAND_TREE_CONNECT, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 48391396524153, smb_tree_id: 1, smb_named_pipe: \\DC\IPC$, smb_share_type: PIPE ; pcap_cnt: 1893, event_type: smb, proto: TCP, smb_id: 5, smb_dialect: 2.10, smb_command: SMB2_COMMAND_TREE_DISCONNECT, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 48391396524153, smb_tree_id: 1 ; pcap_cnt: 1893, event_type: smb, proto: TCP, smb_id: 6, smb_dialect: 2.10, smb_command: SMB2_COMMAND_SESSION_LOGOFF, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 48391396524153, smb_tree_id: 0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 14, flow_pkts_toclient: 14, flow_bytes_toserver: 4880, flow_bytes_toclient: 1836, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 412, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1577, event_type: dns, proto: UDP, dns_type: query, dns_id: 36733, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 1578, event_type: dns, proto: UDP, dns_type: query, dns_id: 36733, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 1579, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36733, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 1580, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36733, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 16, flow_pkts_toclient: 14, flow_bytes_toserver: 5738, flow_bytes_toclient: 4786, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 0, flow_bytes_toserver: 444, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 11, flow_pkts_toclient: 0, flow_bytes_toserver: 1166, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 198, flow_pkts_toclient: 0, flow_bytes_toserver: 25916, flow_bytes_toclient: 0, flow_age: 8, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 216, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1978, event_type: dns, proto: UDP, dns_type: query, dns_id: 23274, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1980, event_type: dns, proto: UDP, dns_type: query, dns_id: 23274, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 1992, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23274, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 67, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 67, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164 ; pcap_cnt: 1993, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23274, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 67, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 67, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 274, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1979, event_type: dns, proto: UDP, dns_type: query, dns_id: 30554, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 1981, event_type: dns, proto: UDP, dns_type: query, dns_id: 30554, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 1983, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 30554, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 142, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 1984, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 30554, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 142, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 87, flow_bytes_toclient: 119, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1982, event_type: dns, proto: UDP, dns_type: query, dns_id: 2501, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1991, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2501, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 67, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 67, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1985, event_type: dns, proto: UDP, dns_type: query, dns_id: 57840, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 1986, event_type: dns, proto: UDP, dns_type: query, dns_id: 57840, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 1 ; pcap_cnt: 1989, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57840, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400 ; pcap_cnt: 1990, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57840, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 76, flow_bytes_toclient: 151, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1987, event_type: dns, proto: UDP, dns_type: query, dns_id: 188, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 1988, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 188, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 66001, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2005, event_type: dns, proto: UDP, dns_type: query, dns_id: 29264, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 2006, event_type: dns, proto: UDP, dns_type: query, dns_id: 29264, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 1 ; pcap_cnt: 2007, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29264, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 59, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400 ; pcap_cnt: 2008, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29264, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 59, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 216, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2021, event_type: dns, proto: UDP, dns_type: query, dns_id: 63071, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2022, event_type: dns, proto: UDP, dns_type: query, dns_id: 63071, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2025, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 63071, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 66, dns_answers_0_rdata: 162.213.33.164, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 66, dns_answers_1_rdata: 162.213.33.133, dns_grouped_A_0: 162.213.33.164, dns_grouped_A_1: 162.213.33.133 ; pcap_cnt: 2026, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 63071, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 66, dns_answers_0_rdata: 162.213.33.164, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 66, dns_answers_1_rdata: 162.213.33.133, dns_grouped_A_0: 162.213.33.164, dns_grouped_A_1: 162.213.33.133
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 274, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2023, event_type: dns, proto: UDP, dns_type: query, dns_id: 60746, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2024, event_type: dns, proto: UDP, dns_type: query, dns_id: 60746, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2027, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60746, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 141, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 2028, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60746, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 141, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 274, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2277, event_type: dns, proto: UDP, dns_type: query, dns_id: 23021, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2278, event_type: dns, proto: UDP, dns_type: query, dns_id: 23021, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2281, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23021, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 140, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 2282, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23021, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 140, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 216, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2275, event_type: dns, proto: UDP, dns_type: query, dns_id: 59986, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2276, event_type: dns, proto: UDP, dns_type: query, dns_id: 59986, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2279, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59986, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 65, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 65, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164 ; pcap_cnt: 2280, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59986, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 65, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 65, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 6, flow_pkts_toclient: 6, flow_bytes_toserver: 552, flow_bytes_toclient: 720, flow_age: 3, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 1848, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 1892, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 92, flow_bytes_toclient: 156, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2392, event_type: dns, proto: UDP, dns_type: query, dns_id: 36247, dns_rrname: crl.www.ms.akadns.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2405, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36247, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: crl.www.ms.akadns.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: crl.www.ms.akadns.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 1, dns_answers_0_rdata: a1363.dscg.akamai.net, dns_answers_1_rrname: a1363.dscg.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 18, dns_answers_1_rdata: 184.26.44.97, dns_answers_2_rrname: a1363.dscg.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 18, dns_answers_2_rdata: 184.26.44.98, dns_grouped_A_0: 184.26.44.97, dns_grouped_A_1: 184.26.44.98, dns_grouped_CNAME_0: a1363.dscg.akamai.net
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 7, flow_pkts_toclient: 5, flow_bytes_toserver: 937, flow_bytes_toclient: 3066, flow_age: 120, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2418, event_type: http, proto: TCP, tx_id: 0, http_hostname: crl.microsoft.com, http_url: /pki/crl/products/tspca.crl, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/pkix-crl, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 521 ; pcap_cnt: 2419, event_type: fileinfo, proto: TCP, http_hostname: crl.microsoft.com, http_url: /pki/crl/products/tspca.crl, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/pkix-crl, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 521, app_proto: http, fileinfo_filename: /pki/crl/products/tspca.crl, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 521, fileinfo_tx_id: 0 ; pcap_cnt: 2464, event_type: http, proto: TCP, tx_id: 1, http_hostname: crl.microsoft.com, http_url: /pki/crl/products/WinPCA.crl, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/pkix-crl, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 530 ; pcap_cnt: 2465, event_type: fileinfo, proto: TCP, http_hostname: crl.microsoft.com, http_url: /pki/crl/products/WinPCA.crl, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/pkix-crl, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 530, app_proto: http, fileinfo_filename: /pki/crl/products/WinPCA.crl, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 530, fileinfo_tx_id: 1
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 2904, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 2904, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2724, event_type: dns, proto: UDP, dns_type: query, dns_id: 27938, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2725, event_type: dns, proto: UDP, dns_type: query, dns_id: 27938, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2726, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 27938, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2727, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 27938, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2720, event_type: dns, proto: UDP, dns_type: query, dns_id: 45047, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2721, event_type: dns, proto: UDP, dns_type: query, dns_id: 45047, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2722, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45047, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 2723, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45047, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: krb5, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 432, flow_bytes_toclient: 442, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2718, event_type: krb5, proto: UDP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: <none>, krb5_weak_encryption: False ; pcap_cnt: 2719, event_type: krb5, proto: UDP, krb5_msg_type: KRB_ERROR, krb5_failed_request: MessageType(0), krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: <none>, krb5_weak_encryption: False
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2710, event_type: dns, proto: UDP, dns_type: query, dns_id: 50837, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2711, event_type: dns, proto: UDP, dns_type: query, dns_id: 50837, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2714, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50837, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 2715, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50837, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2708, event_type: dns, proto: UDP, dns_type: query, dns_id: 57063, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2709, event_type: dns, proto: UDP, dns_type: query, dns_id: 57063, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2712, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57063, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 2713, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57063, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2704, event_type: dns, proto: UDP, dns_type: query, dns_id: 2095, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2705, event_type: dns, proto: UDP, dns_type: query, dns_id: 2095, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2706, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2095, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2707, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2095, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2700, event_type: dns, proto: UDP, dns_type: query, dns_id: 33845, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2701, event_type: dns, proto: UDP, dns_type: query, dns_id: 33845, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2702, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33845, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2703, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33845, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 1320, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 20, flow_pkts_toclient: 13, flow_bytes_toserver: 4748, flow_bytes_toclient: 7516, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2607, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: tls, anomaly_type: applayer, anomaly_event: INVALID_RECORD_TYPE, anomaly_layer: proto_parser
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2595, event_type: dns, proto: UDP, dns_type: query, dns_id: 25293, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2596, event_type: dns, proto: UDP, dns_type: query, dns_id: 25293, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2597, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25293, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2598, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25293, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 226, flow_bytes_toclient: 326, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2591, event_type: dns, proto: UDP, dns_type: query, dns_id: 23376, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2592, event_type: dns, proto: UDP, dns_type: query, dns_id: 23376, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2593, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23376, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2594, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23376, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 12, flow_pkts_toclient: 8, flow_bytes_toserver: 980, flow_bytes_toclient: 858, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2567, event_type: dns, proto: UDP, dns_type: query, dns_id: 32747, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2568, event_type: dns, proto: UDP, dns_type: query, dns_id: 32747, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2569, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32747, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2570, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32747, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 1320, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
19