A Search Engine Backed by Internet-Wide Scanning

被引:229
|
作者
Durumeric, Zakir [1 ]
Adrian, David [1 ]
Mirian, Ariana [1 ]
Bailey, Michael [2 ]
Halderman, J. Alex [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
[2] Univ Illinois, Champaign, IL USA
基金
美国国家科学基金会;
关键词
D O I
10.1145/2810103.2813703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fast Internet-wide scanning has opened new avenues for security research, ranging from uncovering widespread vulnerabilities in random number generators to tracking the evolving impact of Heartbleed. However, this technique still requires significant effort: even simple questions, such as, "What models of embedded devices prefer CBC ciphers?", require developing an application scanner, manually identifying and tagging devices, negotiating with network administrators, and responding to abuse complaints. In this paper, we introduce Censys, a public search engine and data processing facility backed by data collected from ongoing Internet-wide scans. Designed to help researchers answer security-related questions, Censys supports full-text searches on protocol banners and querying a wide range of derived fields (e.g., 443. https. cipher). It can identify specific vulnerable devices and networks and generate statistical reports on broad usage patterns and trends. Censys returns these results in sub-second time, dramatically reducing the effort of understanding the hosts that comprise the Internet. We present the search engine architecture and experimentally evaluate its performance. We also explore Censys's applications and show how questions asked in recent studies become simple to answer.
引用
收藏
页码:542 / 553
页数:12
相关论文
共 50 条
  • [1] An Internet-Wide View of Internet-Wide Scanning
    Durumeric, Zakir
    Bailey, Michael
    Halderman, J. Alex
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 65 - 78
  • [2] SMap: Internet-wide Scanning for Spoofing
    Dai, Tianxiang
    Shulman, Haya
    37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 1039 - 1050
  • [3] Identifying Vulnerabilities Using Internet-wide Scanning Data
    O'Hare, Jamie
    Macfarlane, Rich
    Lo, Owen
    PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019), 2019, : 62 - 71
  • [4] How Dangerous Is Internet Scanning? A Measurement Study of the Aftermath of an Internet-Wide Scan
    Raftopoulos, Elias
    Glatz, Eduard
    Dimitropoulos, Xenofontas
    Dainotti, Alberto
    TRAFFIC MONITORING AND ANALYSIS, TMA 2015, 2015, 9053 : 158 - 172
  • [5] Target Generation for Internet-wide IPv6 Scanning
    Murdock, Austin
    Li, Frank
    Bramsen, Paul
    Durumeric, Zakir
    Paxson, Vern
    PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17), 2017, : 242 - 253
  • [6] Impact of Internet-Wide Scanning on IoT Data Communication in Wireless LANs
    Hashida, Hiroaki
    Kawamoto, Yuichi
    Kato, Nei
    2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2020,
  • [7] Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint
    Tanaka, Akira
    Han, Chansu
    Takahashi, Takeshi
    IEEE ACCESS, 2023, 11 : 23227 - 23244
  • [8] PMap: Reinforcement Learning-Based Internet-Wide Port Scanning
    Song, Guanglei
    He, Lin
    Chen, Tao
    Lin, Jinlei
    Fan, Linna
    Wen, Kun
    Wang, Zhiliang
    Yang, Jiahai
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, : 5524 - 5538
  • [9] An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices
    Kim, Hwankuk
    Kim, Taeun
    Jang, Daeil
    SYMMETRY-BASEL, 2018, 10 (05):
  • [10] A Framework for Searching Internet-Wide Devices
    Li, Qiang
    Feng, Xuan
    Zhao, Lian
    Sun, Limin
    IEEE NETWORK, 2017, 31 (06): : 101 - 107