Conference paper Open Access
Hiesgen, Raphael; Nawrocki, Marcin; King, Alistair; Dainotti, Alberto; Schmidt, Thomas C.; Wählisch, Matthias
{ "publisher": "Zenodo", "DOI": "10.5281/zenodo.5668294", "language": "eng", "title": "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope", "issued": { "date-parts": [ [ 2021, 11, 10 ] ] }, "abstract": "<p>Spoki is a real-time reactive network telescope. It is written in C++ and based on actors to achieve high scalability. It comes with python tools to analyze its log files, identify downloaders, and download the linked files.</p>\n\n<p>We used Spoki to collect the data for our paper over the course of three months. The artifact contains the source code of its essential parts. It can be used to collect the same information (given a suitable setup) and get started with the evaluation.</p>\n\n<p><strong>NOTE:</strong> If you use our tools, please cite <a href=\"https://www.usenix.org/conference/usenixsecurity22/presentation/hiesgen\">our paper</a> as follows:</p>\n\n<pre><code>Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope.\nR. Hiesgen, M. Nawrocki, A. King, A. Dainotti, T. C. Schmidt, and Matthias W\u00e4hlisch.\nProc. of 31st USENIX Security Symposium, 2022, Berkeley, CA, USA.</code></pre>\n\n<p><strong>Abstract</strong> </p>\n\n<blockquote>\n<p>Large-scale Internet scans are a common method to identify victims of a specific attack. Stateless scanning like in ZMap has been established as an efficient approach to probing at Internet scale. Stateless scans, however, need a second phase to perform the attack. This remains invisible to network telescopes, which only capture the first incoming packet, and is not observed as a related event by honeypots, either. In this work, we examine Internet-wide scan traffic through Spoki, a reactive network telescope operating in real-time that we design and implement. Spoki responds to asynchronous TCP SYN packets and engages in TCP handshakes initiated in the second phase of two-phase scans. Because it is extremely lightweight it scales to large prefixes where it has the unique opportunity to record the first data sequence submitted within the TCP handshake ACK. We analyze two-phase scanners during a three months period using globally deployed Spoki reactive telescopes as well as flow data sets from IXPs and ISPs. We find that a predominant fraction of TCP SYNs on the Internet has irregular characteristics. Our findings also provide a clear signature of today's scans as: (i) highly targeted, (ii) scanning activities notably vary between regional vantage points, and (iii) a significant share originates from malicious sources.</p>\n</blockquote>\n\n<p><strong>Repository structure</strong> </p>\n\n<ul>\n\t<li><strong>spoki/</strong> contains the Spoki code in C++.</li>\n\t<li><strong>malware/</strong> contains the malware tool chain in Python.</li>\n\t<li><strong>scripts/</strong> contains scripts for the setup.</li>\n\t<li><strong>logs/</strong> contains example data.</li>\n</ul>\n\n<p>Please check the README files for detailed instructions.</p>", "author": [ { "family": "Hiesgen, Raphael" }, { "family": "Nawrocki, Marcin" }, { "family": "King, Alistair" }, { "family": "Dainotti, Alberto" }, { "family": "Schmidt, Thomas C." }, { "family": "W\u00e4hlisch, Matthias" } ], "id": "5668294", "event-place": "Boston, MA, USA", "type": "paper-conference", "event": "USENIX Security Symposium" }
All versions | This version | |
---|---|---|
Views | 196 | 124 |
Downloads | 4 | 3 |
Data volume | 3.6 MB | 2.7 MB |
Unique views | 170 | 112 |
Unique downloads | 4 | 3 |