Skip to main content

Showing 1–7 of 7 results for author: Dainotti, A

.
  1. arXiv:2305.07193  [pdf, other

    cs.NI

    Aggressive Internet-Wide Scanners: Network Impact and Longitudinal Characterization

    Authors: Aniket Anand, Michalis Kallitsis, Jackson Sippe, Alberto Dainotti

    Abstract: Aggressive network scanners, i.e., ones with immoderate and persistent behaviors, ubiquitously search the Internet to identify insecure and publicly accessible hosts. These scanners generally lie within two main categories; i) benign research-oriented probers; ii) nefarious actors that forage for vulnerable victims and host exploitation. However, the origins, characteristics and the impact on real… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  2. arXiv:2110.05772  [pdf, other

    cs.NI

    Quantifying Nations Exposure to Traffic Observation and Selective Tampering

    Authors: Alexander Gamero-Garrido, Esteban Carisimo, Shuai Hao, Bradley Huffaker, Alex C. Snoeren, Alberto Dainotti

    Abstract: Almost all popular Internet services are hosted in a select set of countries, forcing other nations to rely on international connectivity to access them. We infer instances where traffic towards a large portion of a country is serviced by a small number of Autonomous Systems, and, therefore, may be exposed to observation or selective tampering. We introduce the Country-level Transit Influence (CTI… ▽ More

    Submitted 25 February, 2022; v1 submitted 12 October, 2021; originally announced October 2021.

    Comments: Passive and Active Measurement Conference (PAM) 2022

  3. arXiv:2110.05160  [pdf, other

    cs.CR cs.NI

    Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope

    Authors: Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Large-scale Internet scans are a common method to identify victims of a specific attack. Stateless scanning like in ZMap has been established as an efficient approach to probing at Internet scale. Stateless scans, however, need a second phase to perform the attack, which remains invisible to network telescopes that only capture the first incoming packet and is not observed as a related event by ho… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

    Comments: Proc. of 31st USENIX Security Symposium, camera-ready

  4. arXiv:1906.04426  [pdf, other

    cs.NI

    Chocolatine: Outage Detection for Internet Background Radiation

    Authors: Andreas Guillot, Romain Fontugne, Philipp Winter, Pascal Merindol, Alistair King, Alberto Dainotti, Cristel Pelsser

    Abstract: The Internet is a complex ecosystem composed of thousands of Autonomous Systems (ASs) operated by independent organizations; each AS having a very limited view outside its own network. These complexities and limitations impede network operators to finely pinpoint the causes of service degradation or disruption when the problem lies outside of their network. In this paper, we present Chocolatine, a… ▽ More

    Submitted 30 September, 2019; v1 submitted 11 June, 2019; originally announced June 2019.

    Comments: TMA 2019

  5. arXiv:1801.02918  [pdf, ps, other

    cs.NI cs.CR

    A Survey among Network Operators on BGP Prefix Hijacking

    Authors: Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti, Xenofontas Dimitropoulos

    Abstract: BGP prefix hijacking is a threat to Internet operators and users. Several mechanisms or modifications to BGP that protect the Internet against it have been proposed. However, the reality is that most operators have not deployed them and are reluctant to do so in the near future. Instead, they rely on basic - and often inefficient - proactive defenses to reduce the impact of hijacking events, or on… ▽ More

    Submitted 9 January, 2018; originally announced January 2018.

  6. arXiv:1801.01085  [pdf, ps, other

    cs.NI

    ARTEMIS: Neutralizing BGP Hijacking within a Minute

    Authors: Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas Dimitropoulos, Danilo Cicalese, Alistair King, Alberto Dainotti

    Abstract: BGP prefix hijacking is a critical threat to Internet organizations and users. Despite the availability of several defense approaches (ranging from RPKI to popular third-party services), none of them solves the problem adequately in practice. In fact, they suffer from: (i) lack of detection comprehensiveness, allowing sophisticated attackers to evade detection, (ii) limited accuracy, especially in… ▽ More

    Submitted 27 June, 2018; v1 submitted 3 January, 2018; originally announced January 2018.

  7. arXiv:1410.6858  [pdf, ps, other

    cs.NI

    Lost in Space: Improving Inference of IPv4 Address Space Utilization

    Authors: Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Eduard Glatz, Xenofontas Dimitropoulos, Philipp Richter, Alessandro Finamore, Alex C. Snoeren

    Abstract: One challenge in understanding the evolution of Internet infrastructure is the lack of systematic mechanisms for monitoring the extent to which allocated IP addresses are actually used. In this paper we try to advance the science of inferring IPv4 address space utilization by analyzing and correlating results obtained through different types of measurements. We have previously studied an approach… ▽ More

    Submitted 30 October, 2014; v1 submitted 24 October, 2014; originally announced October 2014.