Skip to main content

Towards Validation of the Internet Census 2012

  • Conference paper
  • First Online:
Advances in Communication Networking (EUNICE 2014)

Abstract

The reliability of the “Internet Census 2012” (IC), an anonymously published scan of he entire IPv4 address space, is not a priori clear. As a step towards validation of this dataset, we compare it to logged reference data on a /16 network, and present an approach to systematically handle uncertainties in timestamps in the IC and reference data. We find evidence the scan indeed took place, and a 93 % match with the /16 reference data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alistair, A.: Carna botnet scans confirmed (2013). http://blog.caida.org/best_available_data/2013/05/13/carna-botnet-scans/

  2. Anonymous.: Internet census 2012 (2013). http://internetcensus2012.bitbucket.org/paper.html

  3. Dainotti, A., King, A., Claffy, K., Papale, F., Pescapè, A.: Analysis of a “/0” stealth scan from a botnet. In: Proceedings of the 2012 ACM Internet Measurement Conference, pp. 1–14. IMC ’12. ACM, New York (2012). http://doi.acm.org/10.1145/2398776.2398778

  4. Durumeric, Z., Wustrow, E., Halderman, J.A.: Zmap: fast internet-wide scanning and its security applications. In: 22nd USENIX Security Symposium, pp. 605–619 (2013)

    Google Scholar 

  5. Eckersley, P., Burns, J.: An observatory for the SSLiverse. Talk at Defcon 18 (2010). https://www.eff.org/files/DefconSSLiverse.pdf

  6. Heidemann, J., Pradkin, Y., Govindan, R., Papadopoulos, C., Bartlett, G., Bannister, J.: Census and survey of the visible internet. In: Proceedings of the 2008 ACM Internet Measurement Conference, pp. 169–182. ACM, Vouliagmeni, Greece (2008). http://www.isi.edu/~johnh/PAPERS/Heidemann08c.html

  7. Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.: Mining your ps and qs: detection of widespread weak keys in network devices. In: 21st USENIX Security Symposium (2012)

    Google Scholar 

  8. Holz, R., Braun, L., Kammenhuber, N., Carle, G.: The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements. In: Proceedings of the 2011 ACM Internet Measurement Conference, pp. 427–444. IMC ’11. ACM, New York (2011). http://doi.acm.org/10.1145/2068816.2068856

  9. Maan, H.C.: Validation of internet census 2012. BSc thesis, University of Twente, The Netherlands (2014)

    Google Scholar 

  10. Moore, H.: Security flaws in universal plug and play: unplug, don’t play (2013). http://community.rapid7.com/servlet/JiveServlet/download/2150- 1-16596/SecurityFlawsUPnP.pdf

  11. Smallberg, D.: Request For Comment 832: Who talks TCP. RFC 832, December 1982. https://tools.ietf.org/html/rfc832

Download references

Acknowledgements

Special thanks goes to Jeroen van Ingen at ICTS (University of Twente) for providing the ARP data. This work was funded by the FP7 Network of Excellence project FLAMINGO (ICT-318488).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dirk Maan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Maan, D., Santanna, J.J., Sperotto, A., de Boer, PT. (2014). Towards Validation of the Internet Census 2012. In: Kermarrec, Y. (eds) Advances in Communication Networking. EUNICE 2014. Lecture Notes in Computer Science(), vol 8846. Springer, Cham. https://doi.org/10.1007/978-3-319-13488-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13488-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13487-1

  • Online ISBN: 978-3-319-13488-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics