Proceedings of the Internet Measurement Conference 2018 2018
DOI: 10.1145/3278532.3278564
|View full text |Cite
|
Sign up to set email alerts
|

Clusters in the Expanse

Abstract: Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In recent years, several studies have proposed the use of target lists of IPv6 addresses, called IPv6 hitlists.In this paper, we show that addresses in IPv6 hitlists are heavily clustered. We present novel techniques that allow IPv6 hitlists to be pushed from quantity to quality. We perform a longitudinal active measurement study over 6 m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 92 publications
(44 citation statements)
references
References 38 publications
0
44
0
Order By: Relevance
“…In IPv6, however, the exhaustive scan of the routable space is not feasible. Instead, we scan more than 445 million hosts from the IPv6 Hitlist Service [17].…”
Section: Internet-wide Scansmentioning
confidence: 99%
“…In IPv6, however, the exhaustive scan of the routable space is not feasible. Instead, we scan more than 445 million hosts from the IPv6 Hitlist Service [17].…”
Section: Internet-wide Scansmentioning
confidence: 99%
“…Limitations of our experimental setup. We selected the above-mentioned services for two reasons: (1) they provide a range of common host activities that expose their IP addresses to potential scanners and (2) based on their use in IPv6 target generation and address extraction in prior work [15,37,40]. These services allow us to "leak" our address space to scanners and achieve two goals.…”
Section: Attracting Scanner Attentionmentioning
confidence: 99%
“…Port scan We use ZMap [16,46] and ZMapv6 [47] to find responsive addresses on port 0. In IPv4 we conduct Internet-wide measurements, in IPv6 we leverage an IPv6 hitlist [19,20,21]. Traceroute We use Yarrp [7,45] to traceroute addresses in IPv4 and IPv6 prefixes in order to analyze port 0 traffic filtering in the Internet.…”
Section: Datasets Overviewmentioning
confidence: 99%
“…We run four types of port scan measurements, for each possible combination of IPv4/IPv6 and TCP/UDP. The IPv4 measurements are run on the complete address space minus a blocklist, the IPv6 measurements use an IPv6 hitlist [20].…”
Section: Responsive Addressesmentioning
confidence: 99%