Proceedings of the ACM SIGCOMM 2022 Conference 2022
DOI: 10.1145/3544216.3544249
|View full text |Cite
|
Sign up to set email alerts
|

Predicting IPv4 services across all ports

Abstract: Internet-wide scanning is commonly used to understand the topology and security of the Internet. However, IPv4 Internet scans have been limited to scanning only a subset of services-exhaustively scanning all IPv4 services is too costly and no existing bandwidthsaving frameworks are designed to scan IPv4 addresses across all ports. In this work we introduce GPS, a system that efficiently discovers Internet services across all ports. GPS runs a predictive framework that learns from extremely small sample sizes a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…They capture both, backscatter traffic (i.e., replies to spoofed addresses of the telescope) and scan traffic. With the increased deployment of malicious two-phase scanners [10], i.e., attackers that first check whether a TCP service is available before they initiate application requests, reactive telescopes have been proposed [11]. Reactive network telescopes implement the TCP connection handshake to gain additional knowledge about the attacker, since the attacker will proceed with an application layer request.…”
Section: Honeypots and Network Telescopesmentioning
confidence: 99%
“…They capture both, backscatter traffic (i.e., replies to spoofed addresses of the telescope) and scan traffic. With the increased deployment of malicious two-phase scanners [10], i.e., attackers that first check whether a TCP service is available before they initiate application requests, reactive telescopes have been proposed [11]. Reactive network telescopes implement the TCP connection handshake to gain additional knowledge about the attacker, since the attacker will proceed with an application layer request.…”
Section: Honeypots and Network Telescopesmentioning
confidence: 99%