log
stringlengths 191
6.55k
| Label
stringclasses 12
values | response
stringclasses 12
values |
|---|---|---|
event_type: flow, proto: TCP, flow_pkts_toserver: 8, flow_pkts_toclient: 0, flow_bytes_toserver: 480, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout, tcp_tcp_flags: 00, tcp_tcp_flags_ts: 00, tcp_tcp_flags_tc: 00
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, flow_pkts_toserver: 9, flow_pkts_toclient: 0, flow_bytes_toserver: 540, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout, tcp_tcp_flags: 00, tcp_tcp_flags_ts: 00, tcp_tcp_flags_tc: 00
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 1260, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 38, flow_pkts_toclient: 42, flow_bytes_toserver: 3820, flow_bytes_toclient: 4272, flow_age: 83, flow_state: established, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 246, flow_bytes_toclient: 346, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 100, event_type: dns, proto: UDP, dns_type: query, dns_id: 47486, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 101, event_type: dns, proto: UDP, dns_type: query, dns_id: 47486, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 104, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47486, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 105, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47486, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 246, flow_bytes_toclient: 346, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 102, event_type: dns, proto: UDP, dns_type: query, dns_id: 18043, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 103, event_type: dns, proto: UDP, dns_type: query, dns_id: 18043, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 106, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18043, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 107, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18043, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 108, event_type: dns, proto: UDP, dns_type: query, dns_id: 61030, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 109, event_type: dns, proto: UDP, dns_type: query, dns_id: 61030, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 112, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61030, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 113, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61030, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 110, event_type: dns, proto: UDP, dns_type: query, dns_id: 61304, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 111, event_type: dns, proto: UDP, dns_type: query, dns_id: 61304, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 114, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61304, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 115, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61304, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 412, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 498, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3730, flow_bytes_toclient: 3648, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 14, flow_pkts_toclient: 13, flow_bytes_toserver: 4946, flow_bytes_toclient: 6450, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 412, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 226, flow_bytes_toclient: 326, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 273, event_type: dns, proto: UDP, dns_type: query, dns_id: 54564, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 274, event_type: dns, proto: UDP, dns_type: query, dns_id: 54564, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 275, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54564, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 276, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54564, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3704, flow_bytes_toclient: 3636, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 10, flow_pkts_toclient: 8, flow_bytes_toserver: 1226, flow_bytes_toclient: 3544, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 946, flow_bytes_toclient: 894, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 188, event_type: krb5, proto: TCP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/Testbed1.ca, krb5_encryption: <none>, krb5_weak_encryption: False
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: dcerpc, flow_pkts_toserver: 26, flow_pkts_toclient: 14, flow_bytes_toserver: 3176, flow_bytes_toclient: 2576, flow_age: 56, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 134, event_type: dcerpc, proto: TCP, dcerpc_request: BIND, dcerpc_interfaces_0_uuid: e1af8308-5d1f-11c9-91a4-08002b14a0fa, dcerpc_interfaces_0_version: 3.0, dcerpc_interfaces_0_ack_result: 2, dcerpc_interfaces_1_uuid: e1af8308-5d1f-11c9-91a4-08002b14a0fa, dcerpc_interfaces_1_version: 3.0, dcerpc_interfaces_1_ack_result: 0, dcerpc_interfaces_2_uuid: e1af8308-5d1f-11c9-91a4-08002b14a0fa, dcerpc_interfaces_2_version: 3.0, dcerpc_interfaces_2_ack_result: 3, dcerpc_response: BINDACK, dcerpc_call_id: 2, dcerpc_rpc_version: 5.0 ; pcap_cnt: 281, event_type: dcerpc, proto: TCP, dcerpc_request: REQUEST, dcerpc_req_opnum: 3, dcerpc_req_frag_cnt: 1, dcerpc_req_stub_data_size: 144, dcerpc_response: RESPONSE, dcerpc_res_frag_cnt: 1, dcerpc_res_stub_data_size: 252, dcerpc_call_id: 2, dcerpc_rpc_version: 5.0 ; pcap_cnt: 958, event_type: dcerpc, proto: TCP, dcerpc_request: REQUEST, dcerpc_req_opnum: 3, dcerpc_req_frag_cnt: 1, dcerpc_req_stub_data_size: 144, dcerpc_response: RESPONSE, dcerpc_res_frag_cnt: 1, dcerpc_res_stub_data_size: 156, dcerpc_call_id: 3, dcerpc_rpc_version: 5.0 ; pcap_cnt: 1454, event_type: dcerpc, proto: TCP, dcerpc_request: REQUEST, dcerpc_req_opnum: 3, dcerpc_req_frag_cnt: 1, dcerpc_req_stub_data_size: 144, dcerpc_response: RESPONSE, dcerpc_res_frag_cnt: 1, dcerpc_res_stub_data_size: 156, dcerpc_call_id: 4, dcerpc_rpc_version: 5.0 ; pcap_cnt: 1851, event_type: dcerpc, proto: TCP, dcerpc_request: REQUEST, dcerpc_req_opnum: 3, dcerpc_req_frag_cnt: 1, dcerpc_req_stub_data_size: 144, dcerpc_response: RESPONSE, dcerpc_res_frag_cnt: 1, dcerpc_res_stub_data_size: 156, dcerpc_call_id: 5, dcerpc_rpc_version: 5.0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 3274, flow_bytes_toclient: 3300, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 242, event_type: krb5, proto: TCP, krb5_msg_type: KRB_TGS_REP, krb5_cname: MITACS-PC6$, krb5_realm: TESTBED1.CA, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: aes256-cts-hmac-sha1-96, krb5_weak_encryption: False
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 95, flow_bytes_toclient: 152, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 344, event_type: dns, proto: UDP, dns_type: query, dns_id: 57666, dns_rrname: 252.0.0.224.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 345, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57666, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 252.0.0.224.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: 224.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 374, dns_authorities_0_soa_mname: sns.dns.icann.org, dns_authorities_0_soa_rname: noc.dns.icann.org, dns_authorities_0_soa_serial: 2017042814, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 1512, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 1530, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 2376, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 2376, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 3, flow_pkts_toclient: 3, flow_bytes_toserver: 276, flow_bytes_toclient: 210, flow_age: 3, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 2376, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 2376, flow_bytes_toclient: 0, flow_age: 1, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 324, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 592, event_type: dns, proto: UDP, dns_type: query, dns_id: 5585, dns_rrname: 9.10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 593, event_type: dns, proto: UDP, dns_type: query, dns_id: 5585, dns_rrname: 9.10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_tx_id: 1 ; pcap_cnt: 594, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5585, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: 9.10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_rcode: NOERROR, dns_authorities_0_rrname: 10.168.192.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 16, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 595, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5585, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: 9.10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_rcode: NOERROR, dns_authorities_0_rrname: 10.168.192.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 16, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 336, flow_bytes_toclient: 336, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 596, event_type: dns, proto: UDP, dns_type: query, dns_id: 50984, dns_rrname: 10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 597, event_type: dns, proto: UDP, dns_type: query, dns_id: 50984, dns_rrname: 10.168.192.in-addr.arpa, dns_rrtype: SOA, dns_tx_id: 1
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 296, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 584, event_type: dns, proto: UDP, dns_type: query, dns_id: 54914, dns_rrname: mitacs-pc6.Testbed1.ca, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 585, event_type: dns, proto: UDP, dns_type: query, dns_id: 54914, dns_rrname: mitacs-pc6.Testbed1.ca, dns_rrtype: SOA, dns_tx_id: 1 ; pcap_cnt: 586, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54914, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: mitacs-pc6.Testbed1.ca, dns_rrtype: SOA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 587, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54914, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: mitacs-pc6.Testbed1.ca, dns_rrtype: SOA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 290, flow_bytes_toclient: 290, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 588, event_type: dns, proto: UDP, dns_type: query, dns_id: 62012, dns_rrname: Testbed1.ca, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 589, event_type: dns, proto: UDP, dns_type: query, dns_id: 62012, dns_rrname: Testbed1.ca, dns_rrtype: SOA, dns_tx_id: 1
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 920, flow_bytes_toclient: 836, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 613, event_type: krb5, proto: TCP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/TESTBED1, krb5_encryption: <none>, krb5_weak_encryption: False
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 10, flow_pkts_toclient: 8, flow_bytes_toserver: 1200, flow_bytes_toclient: 3422, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 3210, flow_bytes_toclient: 3260, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 648, event_type: krb5, proto: TCP, krb5_msg_type: KRB_TGS_REP, krb5_cname: cic1, krb5_realm: TESTBED1.CA, krb5_sname: host/mitacs-pc6.testbed1.ca, krb5_encryption: aes256-cts-hmac-sha1-96, krb5_weak_encryption: False
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 128, flow_pkts_toclient: 0, flow_bytes_toserver: 29724, flow_bytes_toclient: 0, flow_age: 10, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: ntp, flow_pkts_toserver: 32, flow_pkts_toclient: 32, flow_bytes_toserver: 2880, flow_bytes_toclient: 2880, flow_age: 1154, flow_state: established, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 9, flow_pkts_toclient: 10, flow_bytes_toserver: 5464, flow_bytes_toclient: 858, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1088, event_type: krb5, proto: TCP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_TGS_REQ, krb5_error_code: KDC_ERR_BADOPTION, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: mitacs-pc6$@TESTBED1.CA, krb5_encryption: <none>, krb5_weak_encryption: False
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 3276, flow_bytes_toclient: 3316, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1069, event_type: krb5, proto: TCP, krb5_msg_type: KRB_TGS_REP, krb5_cname: MITACS-PC6$, krb5_realm: TESTBED1.CA, krb5_sname: mitacs-pc6$@TESTBED1.CA, krb5_encryption: aes256-cts-hmac-sha1-96, krb5_weak_encryption: False
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 14, flow_pkts_toclient: 14, flow_bytes_toserver: 4908, flow_bytes_toclient: 1836, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3682, flow_bytes_toclient: 3600, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 207, flow_pkts_toclient: 0, flow_bytes_toserver: 19044, flow_bytes_toclient: 0, flow_age: 13, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 586, flow_bytes_toclient: 421, flow_age: 60, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: ET.INFO.WindowsUpdate, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 991, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: ET.INFO.WindowsUpdate, http_hostname: ctldl.windowsupdate.com, http_url: /msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a95239a69dade2d1, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/vnd.ms-cab-compressed, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 304, http_length: 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 15, flow_bytes_toserver: 6540, flow_bytes_toclient: 10090, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1a, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3730, flow_bytes_toclient: 3648, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 10, flow_pkts_toclient: 8, flow_bytes_toserver: 1224, flow_bytes_toclient: 3544, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 946, flow_bytes_toclient: 894, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 861, event_type: krb5, proto: TCP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: <none>, krb5_weak_encryption: False
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: failed, app_proto_tc: dcerpc, flow_pkts_toserver: 42, flow_pkts_toclient: 36, flow_bytes_toserver: 14564, flow_bytes_toclient: 8184, flow_age: 66, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 911, event_type: anomaly, proto: TCP, anomaly_type: applayer, anomaly_event: APPLAYER_WRONG_DIRECTION_FIRST_DATA, anomaly_layer: proto_detect
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 19, flow_pkts_toclient: 0, flow_bytes_toserver: 1653, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 18, flow_pkts_toclient: 0, flow_bytes_toserver: 1188, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 100, flow_bytes_toclient: 209, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 933, event_type: dns, proto: UDP, dns_type: query, dns_id: 42312, dns_rrname: ctldl.windowsupdate.nsatc.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 943, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42312, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ctldl.windowsupdate.nsatc.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ctldl.windowsupdate.nsatc.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: ctldl.windowsupdate.com.edgesuite.net, dns_answers_1_rrname: ctldl.windowsupdate.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 16660, dns_answers_1_rdata: a1621.g.akamai.net, dns_answers_2_rrname: a1621.g.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 1, dns_answers_2_rdata: 208.185.118.105, dns_answers_3_rrname: a1621.g.akamai.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 1, dns_answers_3_rdata: 208.185.118.89, dns_grouped_CNAME_0: ctldl.windowsupdate.com.edgesuite.net, dns_grouped_CNAME_1: a1621.g.akamai.net, dns_grouped_A_0: 208.185.118.105, dns_grouped_A_1: 208.185.118.89
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3704, flow_bytes_toclient: 3636, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 3274, flow_bytes_toclient: 3300, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1162, event_type: krb5, proto: TCP, krb5_msg_type: KRB_TGS_REP, krb5_cname: MITACS-PC6$, krb5_realm: TESTBED1.CA, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: aes256-cts-hmac-sha1-96, krb5_weak_encryption: False
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 101, flow_bytes_toclient: 163, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1108, event_type: dns, proto: UDP, dns_type: query, dns_id: 1001, dns_rrname: www.msftncsi.com.edgesuite.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1119, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 1001, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.msftncsi.com.edgesuite.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.msftncsi.com.edgesuite.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 1, dns_answers_0_rdata: a1961.g2.akamai.net, dns_answers_1_rrname: a1961.g2.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 69.31.33.224, dns_answers_2_rrname: a1961.g2.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 1, dns_answers_2_rdata: 69.31.33.218, dns_grouped_A_0: 69.31.33.224, dns_grouped_A_1: 69.31.33.218, dns_grouped_CNAME_0: a1961.g2.akamai.net
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 101, flow_bytes_toclient: 163, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1296, event_type: dns, proto: UDP, dns_type: query, dns_id: 16586, dns_rrname: www.msftncsi.com.edgesuite.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1297, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 16586, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.msftncsi.com.edgesuite.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.msftncsi.com.edgesuite.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 14, dns_answers_0_rdata: a1961.g2.akamai.net, dns_answers_1_rrname: a1961.g2.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 69.31.33.224, dns_answers_2_rrname: a1961.g2.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 1, dns_answers_2_rdata: 69.31.33.218, dns_grouped_A_0: 69.31.33.224, dns_grouped_A_1: 69.31.33.218, dns_grouped_CNAME_0: a1961.g2.akamai.net
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 397, flow_bytes_toclient: 479, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1307, event_type: http, proto: TCP, tx_id: 0, http_hostname: www.msftncsi.com, http_url: /ncsi.txt, http_http_user_agent: Microsoft NCSI, http_http_content_type: text/plain, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 14 ; pcap_cnt: 1312, event_type: fileinfo, proto: TCP, http_hostname: www.msftncsi.com, http_url: /ncsi.txt, http_http_user_agent: Microsoft NCSI, http_http_content_type: text/plain, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 14, app_proto: http, fileinfo_filename: /ncsi.txt, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 14, fileinfo_tx_id: 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 306, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1309, event_type: dns, proto: UDP, dns_type: query, dns_id: 6350, dns_rrname: ipv6.msftncsi.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1310, event_type: dns, proto: UDP, dns_type: query, dns_id: 6350, dns_rrname: ipv6.msftncsi.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 1314, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 6350, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ipv6.msftncsi.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ipv6.msftncsi.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 939, dns_answers_0_rdata: ipv6.msftncsi.com.edgesuite.net, dns_answers_1_rrname: ipv6.msftncsi.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 10944, dns_answers_1_rdata: a978.i6g1.akamai.net, dns_grouped_CNAME_0: ipv6.msftncsi.com.edgesuite.net, dns_grouped_CNAME_1: a978.i6g1.akamai.net ; pcap_cnt: 1315, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 6350, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ipv6.msftncsi.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ipv6.msftncsi.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 939, dns_answers_0_rdata: ipv6.msftncsi.com.edgesuite.net, dns_answers_1_rrname: ipv6.msftncsi.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 10944, dns_answers_1_rdata: a978.i6g1.akamai.net, dns_grouped_CNAME_0: ipv6.msftncsi.com.edgesuite.net, dns_grouped_CNAME_1: a978.i6g1.akamai.net
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 91, flow_bytes_toclient: 155, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1311, event_type: dns, proto: UDP, dns_type: query, dns_id: 50259, dns_rrname: a978.i6g1.akamai.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1313, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50259, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a978.i6g1.akamai.net, dns_rrtype: A, dns_rcode: NOERROR, dns_authorities_0_rrname: i6g1.akamai.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 824, dns_authorities_0_soa_mname: n0i6g1.akamai.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499082722, dns_authorities_0_soa_refresh: 1000, dns_authorities_0_soa_retry: 1000, dns_authorities_0_soa_expire: 1000, dns_authorities_0_soa_minimum: 1800
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 3654, flow_bytes_toclient: 3572, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 26, flow_pkts_toclient: 22, flow_bytes_toserver: 3422, flow_bytes_toclient: 3462, flow_age: 13, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 412, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1693, event_type: dns, proto: UDP, dns_type: query, dns_id: 59961, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 1694, event_type: dns, proto: UDP, dns_type: query, dns_id: 59961, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 1695, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59961, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 1696, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59961, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: smb, flow_pkts_toserver: 22, flow_pkts_toclient: 14, flow_bytes_toserver: 2788, flow_bytes_toclient: 2564, flow_age: 13, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 1627, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: 2.10, smb_command: SMB2_COMMAND_NEGOTIATE_PROTOCOL, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: 2.02, smb_client_dialects_1: 2.10, smb_client_guid: a191b8df-5fe6-11e7-2eab-acb86c1f1d6f, smb_server_guid: 2688b669-c1d2-4c42-a4ae-0bbdfadcb374, smb_max_read_size: 8388608, smb_max_write_size: 8388608 ; pcap_cnt: 1631, event_type: smb, proto: TCP, smb_id: 2, smb_dialect: 2.10, smb_command: SMB2_COMMAND_SESSION_SETUP, smb_status: STATUS_MORE_PROCESSING_REQUIRED, smb_status_code: 0xc0000016, smb_session_id: 48391396524153, smb_tree_id: 0 ; pcap_cnt: 1635, event_type: smb, proto: TCP, smb_id: 3, smb_dialect: 2.10, smb_command: SMB2_COMMAND_SESSION_SETUP, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 48391396524153, smb_tree_id: 0, smb_ntlmssp_domain: , smb_ntlmssp_user: , smb_ntlmssp_host: MITACS-PC6 ; pcap_cnt: 1705, event_type: smb, proto: TCP, smb_id: 4, smb_dialect: 2.10, smb_command: SMB2_COMMAND_TREE_CONNECT, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 48391396524153, smb_tree_id: 1, smb_named_pipe: \\DC\IPC$, smb_share_type: PIPE ; pcap_cnt: 1893, event_type: smb, proto: TCP, smb_id: 5, smb_dialect: 2.10, smb_command: SMB2_COMMAND_TREE_DISCONNECT, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 48391396524153, smb_tree_id: 1 ; pcap_cnt: 1893, event_type: smb, proto: TCP, smb_id: 6, smb_dialect: 2.10, smb_command: SMB2_COMMAND_SESSION_LOGOFF, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 48391396524153, smb_tree_id: 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 14, flow_pkts_toclient: 14, flow_bytes_toserver: 4880, flow_bytes_toclient: 1836, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 412, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1577, event_type: dns, proto: UDP, dns_type: query, dns_id: 36733, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 1578, event_type: dns, proto: UDP, dns_type: query, dns_id: 36733, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 1579, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36733, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 1580, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36733, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.pdc._msdcs.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 16, flow_pkts_toclient: 14, flow_bytes_toserver: 5738, flow_bytes_toclient: 4786, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 2, flow_pkts_toclient: 0, flow_bytes_toserver: 444, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 11, flow_pkts_toclient: 0, flow_bytes_toserver: 1166, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 198, flow_pkts_toclient: 0, flow_bytes_toserver: 25916, flow_bytes_toclient: 0, flow_age: 8, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 216, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1978, event_type: dns, proto: UDP, dns_type: query, dns_id: 23274, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1980, event_type: dns, proto: UDP, dns_type: query, dns_id: 23274, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 1992, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23274, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 67, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 67, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164 ; pcap_cnt: 1993, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23274, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 67, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 67, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 274, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1979, event_type: dns, proto: UDP, dns_type: query, dns_id: 30554, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 1981, event_type: dns, proto: UDP, dns_type: query, dns_id: 30554, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 1983, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 30554, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 142, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 1984, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 30554, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 142, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 87, flow_bytes_toclient: 119, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1982, event_type: dns, proto: UDP, dns_type: query, dns_id: 2501, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 1991, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2501, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 67, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 67, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1985, event_type: dns, proto: UDP, dns_type: query, dns_id: 57840, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 1986, event_type: dns, proto: UDP, dns_type: query, dns_id: 57840, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 1 ; pcap_cnt: 1989, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57840, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400 ; pcap_cnt: 1990, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57840, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 76, flow_bytes_toclient: 151, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1987, event_type: dns, proto: UDP, dns_type: query, dns_id: 188, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 1988, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 188, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 66001, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2005, event_type: dns, proto: UDP, dns_type: query, dns_id: 29264, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 2006, event_type: dns, proto: UDP, dns_type: query, dns_id: 29264, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 1 ; pcap_cnt: 2007, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29264, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 59, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400 ; pcap_cnt: 2008, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29264, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 59, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 216, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2021, event_type: dns, proto: UDP, dns_type: query, dns_id: 63071, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2022, event_type: dns, proto: UDP, dns_type: query, dns_id: 63071, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2025, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 63071, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 66, dns_answers_0_rdata: 162.213.33.164, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 66, dns_answers_1_rdata: 162.213.33.133, dns_grouped_A_0: 162.213.33.164, dns_grouped_A_1: 162.213.33.133 ; pcap_cnt: 2026, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 63071, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 66, dns_answers_0_rdata: 162.213.33.164, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 66, dns_answers_1_rdata: 162.213.33.133, dns_grouped_A_0: 162.213.33.164, dns_grouped_A_1: 162.213.33.133
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 274, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2023, event_type: dns, proto: UDP, dns_type: query, dns_id: 60746, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2024, event_type: dns, proto: UDP, dns_type: query, dns_id: 60746, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2027, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60746, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 141, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 2028, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60746, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 141, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 274, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2277, event_type: dns, proto: UDP, dns_type: query, dns_id: 23021, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2278, event_type: dns, proto: UDP, dns_type: query, dns_id: 23021, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2281, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23021, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 140, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 2282, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23021, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubuntu.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 140, dns_authorities_0_soa_mname: ns1.canonical.com, dns_authorities_0_soa_rname: hostmaster.canonical.com, dns_authorities_0_soa_serial: 2017062801, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 216, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2275, event_type: dns, proto: UDP, dns_type: query, dns_id: 59986, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2276, event_type: dns, proto: UDP, dns_type: query, dns_id: 59986, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2279, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59986, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 65, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 65, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164 ; pcap_cnt: 2280, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59986, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 65, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 65, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 6, flow_pkts_toclient: 6, flow_bytes_toserver: 552, flow_bytes_toclient: 720, flow_age: 3, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 1848, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 1892, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 92, flow_bytes_toclient: 156, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2392, event_type: dns, proto: UDP, dns_type: query, dns_id: 36247, dns_rrname: crl.www.ms.akadns.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2405, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36247, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: crl.www.ms.akadns.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: crl.www.ms.akadns.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 1, dns_answers_0_rdata: a1363.dscg.akamai.net, dns_answers_1_rrname: a1363.dscg.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 18, dns_answers_1_rdata: 184.26.44.97, dns_answers_2_rrname: a1363.dscg.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 18, dns_answers_2_rdata: 184.26.44.98, dns_grouped_A_0: 184.26.44.97, dns_grouped_A_1: 184.26.44.98, dns_grouped_CNAME_0: a1363.dscg.akamai.net
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 7, flow_pkts_toclient: 5, flow_bytes_toserver: 937, flow_bytes_toclient: 3066, flow_age: 120, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2418, event_type: http, proto: TCP, tx_id: 0, http_hostname: crl.microsoft.com, http_url: /pki/crl/products/tspca.crl, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/pkix-crl, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 521 ; pcap_cnt: 2419, event_type: fileinfo, proto: TCP, http_hostname: crl.microsoft.com, http_url: /pki/crl/products/tspca.crl, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/pkix-crl, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 521, app_proto: http, fileinfo_filename: /pki/crl/products/tspca.crl, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 521, fileinfo_tx_id: 0 ; pcap_cnt: 2464, event_type: http, proto: TCP, tx_id: 1, http_hostname: crl.microsoft.com, http_url: /pki/crl/products/WinPCA.crl, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/pkix-crl, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 530 ; pcap_cnt: 2465, event_type: fileinfo, proto: TCP, http_hostname: crl.microsoft.com, http_url: /pki/crl/products/WinPCA.crl, http_http_user_agent: Microsoft-CryptoAPI/6.1, http_http_content_type: application/pkix-crl, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 530, app_proto: http, fileinfo_filename: /pki/crl/products/WinPCA.crl, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 530, fileinfo_tx_id: 1
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 2904, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 2904, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2724, event_type: dns, proto: UDP, dns_type: query, dns_id: 27938, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2725, event_type: dns, proto: UDP, dns_type: query, dns_id: 27938, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2726, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 27938, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2727, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 27938, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2720, event_type: dns, proto: UDP, dns_type: query, dns_id: 45047, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2721, event_type: dns, proto: UDP, dns_type: query, dns_id: 45047, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2722, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45047, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 2723, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45047, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: krb5, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 432, flow_bytes_toclient: 442, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2718, event_type: krb5, proto: UDP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: <none>, krb5_weak_encryption: False ; pcap_cnt: 2719, event_type: krb5, proto: UDP, krb5_msg_type: KRB_ERROR, krb5_failed_request: MessageType(0), krb5_error_code: KDC_ERR_PREAUTH_REQUIRED, krb5_cname: <empty>, krb5_realm: <empty>, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: <none>, krb5_weak_encryption: False
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2710, event_type: dns, proto: UDP, dns_type: query, dns_id: 50837, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2711, event_type: dns, proto: UDP, dns_type: query, dns_id: 50837, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2714, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50837, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 2715, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50837, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2708, event_type: dns, proto: UDP, dns_type: query, dns_id: 57063, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2709, event_type: dns, proto: UDP, dns_type: query, dns_id: 57063, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2712, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57063, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 2713, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57063, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2704, event_type: dns, proto: UDP, dns_type: query, dns_id: 2095, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2705, event_type: dns, proto: UDP, dns_type: query, dns_id: 2095, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2706, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2095, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2707, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2095, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2700, event_type: dns, proto: UDP, dns_type: query, dns_id: 33845, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2701, event_type: dns, proto: UDP, dns_type: query, dns_id: 33845, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2702, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33845, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2703, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33845, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 1320, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 20, flow_pkts_toclient: 13, flow_bytes_toserver: 4748, flow_bytes_toclient: 7516, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2607, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: tls, anomaly_type: applayer, anomaly_event: INVALID_RECORD_TYPE, anomaly_layer: proto_parser
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2595, event_type: dns, proto: UDP, dns_type: query, dns_id: 25293, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2596, event_type: dns, proto: UDP, dns_type: query, dns_id: 25293, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2597, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25293, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2598, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25293, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 226, flow_bytes_toclient: 326, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2591, event_type: dns, proto: UDP, dns_type: query, dns_id: 23376, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2592, event_type: dns, proto: UDP, dns_type: query, dns_id: 23376, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2593, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23376, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2594, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23376, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.Default-First-Site-Name._sites.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: failed, flow_pkts_toserver: 12, flow_pkts_toclient: 8, flow_bytes_toserver: 980, flow_bytes_toclient: 858, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2567, event_type: dns, proto: UDP, dns_type: query, dns_id: 32747, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2568, event_type: dns, proto: UDP, dns_type: query, dns_id: 32747, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2569, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32747, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2570, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32747, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 22, flow_pkts_toclient: 0, flow_bytes_toserver: 1320, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.