Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3618257.3624831acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article
Open access

How to Operate a Meta-Telescope in your Spare Time

Published: 24 October 2023 Publication History

Abstract

Unsolicited traffic sent to advertised network space that does not host active services provides insights about misconfigurations as well as potentially malicious activities, including the spread of Botnets, DDoS campaigns, and exploitation of vulnerabilities. Network telescopes have been used for many years to monitor such unsolicited traffic. Unfortunately, they are limi the available address space for such tasks and, thus, limited to specific geographic and/or network regions.
In this paper, we introduce a novel concept to broadly capture unsolicited Internet traffic, which we call a "meta-telescope". A meta-telescope is based on the intuition that, with the availability of appropriate vantage points, one can (i) infer which address blocks on the Internet are unused and (ii) capture traffic towards them-both without having control of such address blocks. From this intuition, we develop and evaluate a methodology for identifying unlikely to be used Internet address space and build a meta-telescope that has very desirable properties, such as broad coverage of dark space both in terms of size and topological placement. Such meta-telescope identifies and captures unsolicited traffic to more than 350k /24 blocks in more than 7k ASes. Through the analysis of background radiation towards these networks, we also highlight that unsolicited traffic differs by destination network/geographic region as well as by network type. Finally, we discuss our experience and challenges when operating a meta-telescope in the wild.

Supplemental Material

MP4 File
Presenter Daniel Wagner talks about the most interesting insights of the IMC'23 paper titled "How to Operate a Meta-Telescope in your Spare Time". A novel concept to to overcome the shortcomings of traditional Internet telescopes using the availability of appropriate vantage points is presented. One can (i) infer which address blocks on the Internet are unused and (ii) capture traffic towards them?both without having control of such address blocks. Such meta-telescope identifies and captures unsolicited traffic to more than 350k /24 blocks in more than 7k ASes all over the globe. Challenges and experiences when operating a meta-telescope in the wild are being reported.

References

[1]
2023. Routeviews Project - University of Oregon. http://www.routeviews.org/.(2023).
[2]
Bernhard Ager, Nikolaos Chatzis, Anja Feldmann, Nadi Sarrar, Steve Uhlig, and Walter Willinger. 2012. Anatomy of a Large European IXP. In Proc. ACM SIG- COMM.
[3]
Aniket Anand, Michalis Kallitsis, Jackson Sippe, and Alberto Dainotti. 2023. Aggressive Internet-Wide Scanners: Network Impact and Longitudinal Characterization. In ACM CoNEXT.
[4]
Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security Symposium.
[5]
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson. 2005. The Internet Motion Sensor - A Distributed Blackhole Monitoring System. In NDSS.
[6]
Karyn Benson, Alberto Dainotti, kc Claffy, and Emile Aben. 2012. Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation. In ACM CoNEXT Student Workshop.
[7]
Karyn. Benson, Alberto. Dainotti, kc. Claffy, Alex C. Snoeren, and Michalis Kallitsis. 2015. Leveraging Internet Background Radiation for Opportunistic Network Analysis. In ACM IMC.
[8]
Timm Böttger, Felix Cuadrado, and Steve Uhlig. 2018. Looking for Hypergiants in PeeringDB. ACM SIGCOMM Computer Communication Review 48, 3 (2018).
[9]
CAIDA. 2023. Routeviews Prefix to AS mappings Dataset for IPv4 and IPv6. https://www.caida.org/catalog/datasets/routeviews-prefix2as/. (2023).
[10]
CAIDA. 2023. The CAIDA UCSD AS to Organization Mapping Dataset, 2023-04-11. https://www.caida.org/data/as_organizations/. (2023).
[11]
CAIDA. 2023. The UCSD Network Telescope. https://www.caida.org/projects/network_telescope/. (2023).
[12]
Ignocio Castro, Juan Camilo Cardona, Sergey Gorinsky, and Pierre François. 2014. Remote Peering: More Peering without Internet Flattening. In Proc. ACM CoNEXT.
[13]
Nikolaos Chatzis, Georgios Smaragdakis, Anja Feldmann, and Walter Willinger. 2013. There is More to IXPs than Meets the Eye. ACM SIGCOMM Computer Communication Review 45, 5 (2013).
[14]
Benoit Claise, Brian. Trammell, and Paul Aitken. 2013. RFC 7011: Specification of the IPFIX Protocol for the Exchange of Flow Information. (2013).
[15]
Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, Farnam Jahanian, and Danny McPherson. 2004. Toward Understanding Distributed Blackhole Placement. In Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM '04). Association for Computing Machinery, New York, NY, USA, 54--64. https: //doi.org/10.1145/1029618.1029627
[16]
Michelle Cotton, Leo Vegoda, Ronald P. Bonica, and Brian Haberman. 2013. Special-Purpose IP Address Registries. IETF RFC 6890. (2013).
[17]
Jakub Czyz, Kyle Lady, Sam G. Miller, Michael Bailey, Michael Kallitsis, and Manish Karir. 2013. Understanding IPv6 Internet Background Radiation. In ACM IMC.
[18]
Alberto Dainotti, Roman Amman, Emile Aben, and Kimberly C. Claffy. 2012. Extracting Benefit from Harm: Using Malware Pollution to Analyze the Impact of Political and Geophysical Events on the Internet. ACM SIGCOMM Computer Communication Review 42, 1 (2012), 31--39.
[19]
Alberto Dainotti, Karyn Benson, Alistair King, kc Claffy, M Kallitsis, E Glatz, and X Dimitropoulos. 2014. Estimating Internet Address Space Usage Through Passive Measurements. ACM SIGCOMM Computer Communication Review 44, 1 (2014).
[20]
Alberto Dainotti, Karyn Benson, Alistair King, Bradley Huffaker, Eduard Glatz, Xenofontas Dimitropoulos, Philipp Richter, Alessandro Finamore, and Alex C. Snoeren. 2016. Lost in Space: Improving Inference of IPv4 Address Space Utilization. IEEE Journal on Selected Areas in Communications (JSAC) 34, 6 (2016), 1862--1876.
[21]
Alberto Dainotti, Alistair King, kc Claffy, Ferdinando Papale, and Antonio Pescapè. 2012. Analysis of a "/0" stealth scan from a botnet. In ACM IMC.
[22]
Alberto Dainotti, Claudio Squarcella, Emilie Aben, kc Claffy, Marco Chiesa, Michele Russo, and Antonio Pescape. 2011. Analysis of Country-wide Internet Outages Caused by Censorship. In ACM IMC.
[23]
Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, and J. Alex Halderman. 2015. A Search Engine Backed by Internet-Wide Scanning.
[24]
Zakir Durumeric, Michael Bailey, and Alex J. Halderman. 2014. An Internet-Wide View of Internet-Wide Scanning. In USENIX Security Symposium.
[25]
Paul Ferguson and Daniel Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. IETF RFC 2827. (2000).
[26]
Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, and Georg Carle. 2018. Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. In ACM IMC.
[27]
Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C Schmidt, and Matthias Wählisch. 2022. Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. In USENIX Security Symposium.
[28]
Kantor, Brian and Karn, Phil and Claffy, kc. and Gilmore, John and Magnuski, Hank and Garbee, Bdale and Hansen, Skip and Horne, Bill and Ricketts, John and Traschewski, Jann and Vixie, Paul. 2019. AMPRNet. https://web.archive.org/web/20190719144558/https://www.ampr.org/amprnet/. (2019).
[29]
Franziska Lichtblau, Florian Streibelt, Thorben Krüger, Philipp Richter, and Anja Feldmann. 2017. Detection, Classification, and Analysis of Inter-Domain Traffic with Spoofed Source IP Addresses. In Proceedings of ACM IMC 2017.
[30]
Matthew Luckie, Robert Beverly, Ryan Koga, Ken Keys, Joshua A. Kroll, and k claffy. 2019. Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet.
[31]
Matthew Luckie, Bradley Huffaker, kc Claffy, Amogh Dhamdhere, and Vasileios Giotsas. 2013. AS Relationships, Customer Cones, and Validation. In ACM IMC.
[32]
Maxmind GeoLite2. 2023. GeoIP2 and GeoLite City and Country Databases. https://www.maxmind.com. (2023).
[33]
Measurement Lab. (2023-04-24-2023-04-30). The M-Lab NDT Data Set. https://measurementlab.net/tests/ndt. ((2023-04-24-2023-04-30)).
[34]
Merit Network, Inc. 2023. ORION: Observatory for Cyber-Risk Insights and Outages of Networks. https://www.merit.edu/initiatives/orion-network-telescope/.(2023).
[35]
David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver. 2003. Inside the Slammer Worm. IEEE Security and Privacy 1, 4 (2003), 33--39.
[36]
David Moore and Colleen Shannon. 2005. The Spread of the Witty Worm. IEEE Security and Privacy 2, 4 (2005), 46--50.
[37]
David Moore, Colleen Shannon, and kc Claffy. 2002. Code-Red: A Case Study on the Spread and Victims of an Internet Worm. In ACM Internet Measurement Workshop.
[38]
David Moore, Geoffrey Voelker, and Stefan Savage. 2001. Inferring Internet Denial-of-Service Activity. In USENIX Security Symposium.
[39]
George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas Dimitropoulos, and Vasileios Giotsas. 2018. O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs. In ACM IMC.
[40]
Honeynet Project. 2002. Know Your Enemy: Honeynets. (Nov 2002). http://projects.honeynet.org/papers/honeynet/.
[41]
Lin Quan, John Heidemann, and Yuri Pradkin. 2013. Trinocular: Understanding Internet Reliability Through Adaptive Probing. In Proc. ACM SIGCOMM.
[42]
Elias Raftopoulos, Eduard Glatz, Xenofontas Dimitropoulos, and Alberto Dainotti. 2015. How Dangerous Is Internet Scanning? A Measurement Study of the Aftermath of an Internet-Wide Scan. In Traffic Monitoring and Analysis Workshop.
[43]
Philipp Richter, Mark Allman, Randy Bush, and Vern Paxson. 2015. A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review 45, 2 (Apr 2015).
[44]
Philipp Richter and Arthur Berger. 2019. Scanning the scanners: Sensing the internet from a massively distributed network telescope. In Proceedings of the Internet Measurement Conference. 144--157.
[45]
Philipp Richter and Arthur Berger. 2019. Scanning the Scanners: Sensing the Internet from a Massively Sistributed Network Telescope. In ACM IMC.
[46]
Stuart Staniford, David Moore, Vern Paxson, and Nicholas Weaver. 2004. The Top Speed of Flash Worms. In ACM Workshop on Rapid Malcode (WORM).
[47]
USC/LANDER project. 2023. Internet Addresses IPv4 Response History Dataset. https://ant.isi.edu/datasets/index.html. (2023).
[48]
Vinod Yegneswaran, Paul Barford, and Dave Plonka. 2004. On the Design and Use of Internet Sinks for Network Abuse Monitoring. In Recent Advances in Intrusion Detection, Erland Jonsson, Alfonso Valdes, and Magnus Almgren (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 146--165.

Cited By

View all
  • (2024)Less is More? Exploring the Impact of Scaled-Down Network Telescopes on Security and ResearchAnais do XLII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2024)10.5753/sbrc.2024.1538(1050-1063)Online publication date: 20-May-2024

Index Terms

  1. How to Operate a Meta-Telescope in your Spare Time

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IMC '23: Proceedings of the 2023 ACM on Internet Measurement Conference
    October 2023
    746 pages
    ISBN:9798400703829
    DOI:10.1145/3618257
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 October 2023

    Check for updates

    Author Tags

    1. network security
    2. security and privacy

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    IMC '23
    Sponsor:
    IMC '23: ACM Internet Measurement Conference
    October 24 - 26, 2023
    Montreal QC, Canada

    Acceptance Rates

    Overall Acceptance Rate 277 of 1,083 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)467
    • Downloads (Last 6 weeks)48
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Less is More? Exploring the Impact of Scaled-Down Network Telescopes on Security and ResearchAnais do XLII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2024)10.5753/sbrc.2024.1538(1050-1063)Online publication date: 20-May-2024

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media