In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a unique - -but likely unintended - -opportunity for remotely fingerprinting network infrastructure in the wild. Specifically, by sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed information about the configuration and status of network devices including vendor, uptime, and the number of restarts. More importantly, the reply contains a persistent and strong identifier that allows for lightweight Internet-scale alias resolution and dual-stack association. By launching active Internet-wide SNMPv3 scan campaigns, we show that our technique can fingerprint more than 4.6 million devices of which around 350k are network router...
Nowadays, computer networks have become as popular as telephone networks fifteen years ago and by th...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
peer reviewedSince the early 2000's, the Internet Topology has been frequently described and modeled...
In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a uni...
The internet has gone from being a small network of niche uses and mostly academic interest to being...
peer reviewedNowadays, simple tools such as traceroute can be used by attackers to acquire topology ...
Fingerprinting techniques aim to identify objects such as devices, data, users, or even attacks, bas...
Fingerprinting techniques aim to identify objects such as devices, data, users, or even attacks, ba...
peer reviewedNowadays, simple tools such as traceroute can be used by attackers to acquire topology ...
In modern computer networks, administrators have limited control over physical security of the netwo...
Virtual private networks are often used to secure communication between two hosts and preserve priva...
In this paper, we present novel and practical techniques to accurately detect IP prefix hijacking at...
This paper explores the effectiveness of three network tools for analyzing network traffic and highl...
This paper explores the effectiveness of three network tools for analyzing network traffic and highl...
or more than a decade, many network administrators have relied on SNMP, the Simple Network Managemen...
Nowadays, computer networks have become as popular as telephone networks fifteen years ago and by th...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
peer reviewedSince the early 2000's, the Internet Topology has been frequently described and modeled...
In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a uni...
The internet has gone from being a small network of niche uses and mostly academic interest to being...
peer reviewedNowadays, simple tools such as traceroute can be used by attackers to acquire topology ...
Fingerprinting techniques aim to identify objects such as devices, data, users, or even attacks, bas...
Fingerprinting techniques aim to identify objects such as devices, data, users, or even attacks, ba...
peer reviewedNowadays, simple tools such as traceroute can be used by attackers to acquire topology ...
In modern computer networks, administrators have limited control over physical security of the netwo...
Virtual private networks are often used to secure communication between two hosts and preserve priva...
In this paper, we present novel and practical techniques to accurately detect IP prefix hijacking at...
This paper explores the effectiveness of three network tools for analyzing network traffic and highl...
This paper explores the effectiveness of three network tools for analyzing network traffic and highl...
or more than a decade, many network administrators have relied on SNMP, the Simple Network Managemen...
Nowadays, computer networks have become as popular as telephone networks fifteen years ago and by th...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
peer reviewedSince the early 2000's, the Internet Topology has been frequently described and modeled...