Abstract
The reliability of the “Internet Census 2012” (IC), an anonymously published scan of he entire IPv4 address space, is not a priori clear. As a step towards validation of this dataset, we compare it to logged reference data on a /16 network, and present an approach to systematically handle uncertainties in timestamps in the IC and reference data. We find evidence the scan indeed took place, and a 93 % match with the /16 reference data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alistair, A.: Carna botnet scans confirmed (2013). http://blog.caida.org/best_available_data/2013/05/13/carna-botnet-scans/
Anonymous.: Internet census 2012 (2013). http://internetcensus2012.bitbucket.org/paper.html
Dainotti, A., King, A., Claffy, K., Papale, F., Pescapè, A.: Analysis of a “/0” stealth scan from a botnet. In: Proceedings of the 2012 ACM Internet Measurement Conference, pp. 1–14. IMC ’12. ACM, New York (2012). http://doi.acm.org/10.1145/2398776.2398778
Durumeric, Z., Wustrow, E., Halderman, J.A.: Zmap: fast internet-wide scanning and its security applications. In: 22nd USENIX Security Symposium, pp. 605–619 (2013)
Eckersley, P., Burns, J.: An observatory for the SSLiverse. Talk at Defcon 18 (2010). https://www.eff.org/files/DefconSSLiverse.pdf
Heidemann, J., Pradkin, Y., Govindan, R., Papadopoulos, C., Bartlett, G., Bannister, J.: Census and survey of the visible internet. In: Proceedings of the 2008 ACM Internet Measurement Conference, pp. 169–182. ACM, Vouliagmeni, Greece (2008). http://www.isi.edu/~johnh/PAPERS/Heidemann08c.html
Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.: Mining your ps and qs: detection of widespread weak keys in network devices. In: 21st USENIX Security Symposium (2012)
Holz, R., Braun, L., Kammenhuber, N., Carle, G.: The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements. In: Proceedings of the 2011 ACM Internet Measurement Conference, pp. 427–444. IMC ’11. ACM, New York (2011). http://doi.acm.org/10.1145/2068816.2068856
Maan, H.C.: Validation of internet census 2012. BSc thesis, University of Twente, The Netherlands (2014)
Moore, H.: Security flaws in universal plug and play: unplug, don’t play (2013). http://community.rapid7.com/servlet/JiveServlet/download/2150- 1-16596/SecurityFlawsUPnP.pdf
Smallberg, D.: Request For Comment 832: Who talks TCP. RFC 832, December 1982. https://tools.ietf.org/html/rfc832
Acknowledgements
Special thanks goes to Jeroen van Ingen at ICTS (University of Twente) for providing the ARP data. This work was funded by the FP7 Network of Excellence project FLAMINGO (ICT-318488).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Maan, D., Santanna, J.J., Sperotto, A., de Boer, PT. (2014). Towards Validation of the Internet Census 2012. In: Kermarrec, Y. (eds) Advances in Communication Networking. EUNICE 2014. Lecture Notes in Computer Science(), vol 8846. Springer, Cham. https://doi.org/10.1007/978-3-319-13488-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-13488-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13487-1
Online ISBN: 978-3-319-13488-8
eBook Packages: Computer ScienceComputer Science (R0)