Proceedings of the Internet Measurement Conference 2019
DOI: 10.1145/3355369.3355595
|View full text |Cite
|
Sign up to set email alerts
|

Scanning the Scanners

Abstract: Scanning of hosts on the Internet to identify vulnerable devices and services is a key component in many of today's cyberattacks. Tracking this scanning activity, in turn, provides an excellent signal to assess the current state-of-affairs for many vulnerabilities and their exploitation. So far, studies tracking scanning activity have relied on unsolicited traffic captured in darknets, focusing on random scans of the address space. In this work, we track scanning activity through the lens of unsolicited traffi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…This mechanism results in the possibility of multiple routing paths between two nodes. For example, there are two routing paths from Node 1 to Node 3, [1,3] and [1,2,3]. A similar situation exists from Node 2 to Node 8, as indicated by the dashed arrows in Fig.…”
Section: Multipath Routing and Repeat Nodesmentioning
confidence: 89%
“…This mechanism results in the possibility of multiple routing paths between two nodes. For example, there are two routing paths from Node 1 to Node 3, [1,3] and [1,2,3]. A similar situation exists from Node 2 to Node 8, as indicated by the dashed arrows in Fig.…”
Section: Multipath Routing and Repeat Nodesmentioning
confidence: 89%
“…Network telescopes. Network telescopes [4]- [9] are an unsolicited traffic measurement approach that captures incoming traffic to otherwise unused address space within a larger network segment. These typically cover between a /8 and /24 of IPv4 address space.…”
Section: Honeypots and Network Telescopesmentioning
confidence: 99%
“…To combat reconnaissance attacks, researchers have developed methods, such as tracking port scanners on the IP backbone [136], detecting subtle port scanning via interactive visualization [154], disrupting reconnaissance attacks via address mutation [64], constructing distributed network telescope to capture scanners [121], and optimizing backscatter [45] technique for scan detection in massive IPv6 address space [46]. However, according to [57], [34], only a few enterprises have practically adopted robust defensive measures.…”
Section: A Reconnaissance Attacksmentioning
confidence: 99%