Skip to main content

Showing 1–17 of 17 results for author: Beverly, R

.
  1. arXiv:2309.15612  [pdf, other

    cs.NI

    Illuminating Router Vendor Diversity Within Providers and Along Network Paths

    Authors: Taha Albakour, Oliver Gasser, Robert Beverly, Georgios Smaragdakis

    Abstract: The Internet architecture has facilitated a multi-party, distributed, and heterogeneous physical infrastructure where routers from different vendors connect and inter-operate via IP. Such vendor heterogeneity can have important security and policy implications. For example, a security vulnerability may be specific to a particular vendor and implementation, and thus will have a disproportionate imp… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  2. arXiv:2308.12436  [pdf, other

    cs.NI

    IP Neo-colonialism: Geo-auditing RIR Address Registrations

    Authors: Robert Beverly

    Abstract: Allocation of the global IP address space is under the purview of IANA, who distributes management responsibility among five geographically distinct Regional Internet Registries (RIRs). Each RIR is empowered to bridge technical (e.g., address uniqueness and aggregatability) and policy (e.g., contact information and IP scarcity) requirements unique to their region. While different RIRs have differe… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

  3. arXiv:2208.06767  [pdf, other

    cs.NI cs.CR

    IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation

    Authors: Erik Rye, Robert Beverly

    Abstract: We present IPvSeeYou, a privacy attack that permits a remote and unprivileged adversary to physically geolocate many residential IPv6 hosts and networks with street-level precision. The crux of our method involves: 1) remotely discovering wide area (WAN) hardware MAC addresses from home routers; 2) correlating these MAC addresses with their WiFi BSSID counterparts of known location; and 3) extendi… ▽ More

    Submitted 15 September, 2022; v1 submitted 13 August, 2022; originally announced August 2022.

    Comments: Accepted to S&P '23

  4. arXiv:2110.03816  [pdf, other

    cs.NI

    AS-Level BGP Community Usage Classification

    Authors: Thomas Krenc, Robert Beverly, Georgios Smaragdakis

    Abstract: BGP communities are a popular mechanism used by network operators for traffic engineering, blackholing, and to realize network policies and business strategies. In recent years, many research works have contributed to our understanding of how BGP communities are utilized, as well as how they can reveal secondary insights into real-world events such as outages and security attacks. However, one fun… ▽ More

    Submitted 7 October, 2021; originally announced October 2021.

  5. Third Time's Not a Charm: Exploiting SNMPv3 for Router Fingerprinting

    Authors: Taha Albakour, Oliver Gasser, Robert Beverly, Georgios Smaragdakis

    Abstract: In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a unique -- but likely unintended -- opportunity for remotely fingerprinting network infrastructure in the wild. Specifically, by sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed information about the configuration and status of network devices including vendor, uptime, and the… ▽ More

    Submitted 6 October, 2021; v1 submitted 30 September, 2021; originally announced September 2021.

    Comments: Visit https://snmpv3.io for up-to-date SNMPv3 measurement results

    Journal ref: Proceedings of the 2021 ACM Internet Measurement Conference (IMC '21)

  6. arXiv:2107.03988  [pdf, other

    cs.NI

    Longitudinal Study of an IP Geolocation Database

    Authors: Matthieu Gouel, Kevin Vermeulen, Olivier Fourmaux, Timur Friedman, Robert Beverly

    Abstract: IP geolocation - the process of map** network identifiers to physical locations - has myriad applications. We examine a large collection of snapshots from a popular geolocation database and take a first look at its longitudinal properties. We define metrics of IP geo-persistence, prevalence, coverage, and movement, and analyse 10 years of geolocation data at different location granularities. Acr… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

    Comments: Technical Report related to a paper appeared in Network Traffic Measurement and Analysis Conference (TMA 2021)

  7. Follow the Scent: Defeating IPv6 Prefix Rotation Privacy

    Authors: Erik C. Rye, Robert Beverly, kc claffy

    Abstract: IPv6's large address space allows ample freedom for choosing and assigning addresses. To improve client privacy and resist IP-based tracking, standardized techniques leverage this large address space, including privacy extensions and provider prefix rotation. Ephemeral and dynamic IPv6 addresses confound not only tracking and traffic correlation attempts, but also traditional network measurements,… ▽ More

    Submitted 18 December, 2021; v1 submitted 31 January, 2021; originally announced February 2021.

    Journal ref: IMC '21: Proceedings of the 21st ACM Internet Measurement Conference, November 2021, Pages 739-752

  8. arXiv:2010.00745  [pdf, other

    cs.NI

    Keep your Communities Clean: Exploring the Routing Message Impact of BGP Communities

    Authors: Thomas Krenc, Robert Beverly, Georgios Smaragdakis

    Abstract: BGP communities are widely used to tag prefix aggregates for policy, traffic engineering, and inter-AS signaling. Because individual ASes define their own community semantics, many ASes blindly propagate communities they do not recognize. Prior research has shown the potential security vulnerabilities when communities are not filtered. This work sheds light on a second unintended side-effect of co… ▽ More

    Submitted 2 November, 2020; v1 submitted 1 October, 2020; originally announced October 2020.

  9. Reading In-Between the Lines: An Analysis of Dissenter

    Authors: Erik Rye, Jeremy Blackburn, Robert Beverly

    Abstract: Efforts by content creators and social networks to enforce legal and policy-based norms, e.g. blocking hate speech and users, has driven the rise of unrestricted communication platforms. One such recent effort is Dissenter, a browser and web application that provides a conversational overlay for any web page. These conversations hide in plain sight - users of Dissenter can see and participate in t… ▽ More

    Submitted 26 September, 2020; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: Accepted at IMC 2020

  10. arXiv:2001.08684  [pdf, other

    cs.NI

    Discovering the IPv6 Network Periphery

    Authors: Erik C. Rye, Robert Beverly

    Abstract: We consider the problem of discovering the IPv6 network periphery, i.e., the last hop router connecting endhosts in the IPv6 Internet. Finding the IPv6 periphery using active probing is challenging due to the IPv6 address space size, wide variety of provider addressing and subnetting schemes, and incomplete topology traces. As such, existing topology map** systems can miss the large footprint of… ▽ More

    Submitted 30 January, 2020; v1 submitted 23 January, 2020; originally announced January 2020.

  11. Sundials in the Shade: An Internet-wide Perspective on ICMP Timestamps

    Authors: Erik C. Rye, Robert Beverly

    Abstract: ICMP timestamp request and response packets have been standardized for nearly 40 years, but have no modern practical application, having been superseded by NTP. However, ICMP timestamps are not deprecated, suggesting that while hosts must support them, little attention is paid to their implementation and use. In this work, we perform active measurements and find 2.2 million hosts on the Internet r… ▽ More

    Submitted 19 March, 2019; originally announced March 2019.

    Comments: Passive and Active Measurements (PAM) 2019

  12. arXiv:1902.08968  [pdf, ps, other

    cs.NI

    EUI-64 Considered Harmful

    Authors: Erik C. Rye, Jeremy Martin, Robert Beverly

    Abstract: This position paper considers the privacy and security implications of EUI-64-based IPv6 addresses. By encoding MAC addresses, EUI-64 addresses violate layers by exposing hardware identifiers in IPv6 addresses. The hypothetical threat of EUI-64 addresses is well-known, and the adoption of privacy extensions in operating systems (OSes) suggests this vulnerability has been mitigated. Instead, our wo… ▽ More

    Submitted 24 February, 2019; originally announced February 2019.

    Comments: Coordinating Attack Response at Internet Scale 2 (CARIS2) Workshop

  13. arXiv:1901.10441  [pdf, other

    cs.NI

    An Internet Heartbeat

    Authors: Robert Beverly, Mark Allman

    Abstract: Obtaining sound inferences over remote networks via active or passive measurements is difficult. Active measurement campaigns face challenges of load, coverage, and visibility. Passive measurements require a privileged vantage point. Even networks under our own control too often remain poorly understood and hard to diagnose. As a step toward the democratization of Internet measurement, we consider… ▽ More

    Submitted 29 January, 2019; originally announced January 2019.

  14. In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery

    Authors: Robert Beverly, Ramakrishnan Durairajan, David Plonka, Justin P. Rohrer

    Abstract: Existing methods for active topology discovery within the IPv6 Internet largely mirror those of IPv4. In light of the large and sparsely populated address space, in conjunction with aggressive ICMPv6 rate limiting by routers, this work develops a different approach to Internet-wide IPv6 topology map**. We adopt randomized probing techniques in order to distribute probing load, minimize the effec… ▽ More

    Submitted 9 October, 2018; v1 submitted 29 May, 2018; originally announced May 2018.

  15. arXiv:1702.07946  [pdf, other

    cs.NI

    SDN as Active Measurement Infrastructure

    Authors: Erik Rye, Robert Beverly

    Abstract: Active measurements are integral to the operation and management of networks, and invaluable to supporting empirical network research. Unfortunately, it is often cost-prohibitive and logistically difficult to widely deploy measurement nodes, especially in the core. In this work, we consider the feasibility of tightly integrating measurement within the infrastructure by using Software Defined Netwo… ▽ More

    Submitted 25 February, 2017; originally announced February 2017.

  16. arXiv:1612.02902  [pdf, ps, other

    cs.NI

    Principles for Measurability in Protocol Design

    Authors: Mark Allman, Robert Beverly, Brian Trammell

    Abstract: Measurement has become fundamental to the operation of networks and at-scale services---whether for management, security, diagnostics, optimization, or simply enhancing our collective understanding of the Internet as a complex system. Further, measurements are useful across points of view---from end hosts to enterprise networks and data centers to the wide area Internet. We observe that many measu… ▽ More

    Submitted 15 May, 2017; v1 submitted 8 December, 2016; originally announced December 2016.

    Comments: ACM SIGCOMM Computer Communication Review, April 2017

  17. Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery

    Authors: Robert Beverly

    Abstract: Obtaining a "snapshot" of the Internet topology remains an elusive task. Existing active topology discovery techniques and systems require significant probing time -- time during which the underlying network may experience transient dynamics. This work considers how active probing can gather the Internet topology in minutes rather than days. Conventional approaches to active topology map** face… ▽ More

    Submitted 29 May, 2018; v1 submitted 12 May, 2016; originally announced May 2016.

    Journal ref: Proceedings of the ACM Internet Measurement Conference, 2016