Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813703
|View full text |Cite
|
Sign up to set email alerts
|

A Search Engine Backed by Internet-Wide Scanning

Abstract: Fast Internet-wide scanning has opened new avenues for security research, ranging from uncovering widespread vulnerabilities in random number generators to tracking the evolving impact of Heartbleed. However, this technique still requires significant effort: even simple questions, such as, "What models of embedded devices prefer CBC ciphers?", require developing an application scanner, manually identifying and tagging devices, negotiating with network administrators, and responding to abuse complaints. In this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
299
2
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 378 publications
(348 citation statements)
references
References 10 publications
4
299
2
2
Order By: Relevance
“…We confirm the existence of Internet-wide scanners for research purpose like ZMap [11] and malicious ones like Mirai Botnet [29], [31]. We also find that attackers generally prefer light scanning to heavy scanning because light traffic is more likely to evade detections by intrusion detection systems (IDS).…”
Section: Longitudinal Analysissupporting
confidence: 74%
See 2 more Smart Citations
“…We confirm the existence of Internet-wide scanners for research purpose like ZMap [11] and malicious ones like Mirai Botnet [29], [31]. We also find that attackers generally prefer light scanning to heavy scanning because light traffic is more likely to evade detections by intrusion detection systems (IDS).…”
Section: Longitudinal Analysissupporting
confidence: 74%
“…Continuous efforts have been made to tackle Conficker throughout the years [13], [26], [27]. Recently fast Internet-wide scanners [10], [11], [16] are widely used for research purpose and they provide a source for darknet traffic.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The probing of Large Area Networks (LANs) is achieved using TCP-SYN and ICMP echo scans. This is addressed in Durumeric, Wustrow, and Halderman [23]. Not only is the active technology behind ZMap discussed in detail, but also each element of the ZMap functionality is dissected and explained at a substantial technical level, including its modular framework for dissecting different protocols.…”
Section: Zmapmentioning
confidence: 99%
“…STIX is a standard for expressing threat information such as vulnerabilities, incidents, and related events, while Open-IOC is a standard for describing intrusion indicators such as detailed information about files and traffic (Durumeric et al 2015;.…”
Section: Technology Of Sharing Information On Security Threatsmentioning
confidence: 99%