Identifying Vulnerabilities Using Internet-Wide Scanning Data

Total Page:16

File Type:pdf, Size:1020Kb

Identifying Vulnerabilities Using Internet-Wide Scanning Data Identifying Vulnerabilities Using Internet-wide Scanning Data Jamie O’Hare, Rich Macfarlane, Owen Lo School of Computing Edinburgh Napier University Edinburgh, United Kingdom 40168785, r.macfarlane, [email protected] Abstract—Internet-wide scanning projects such as Shodan and of service, through the considerable time and resources re- Censys, scan the Internet and collect active reconnaissance results quired to perform the scans. Due to this potential issue, as for online devices. Access to this information is provided through well as specific legal requirements, vulnerability assessment associated websites. The Internet-wide scanning data can be used to identify devices and services which are exposed on the Internet. tools typically require permission from the target organization It is possible to identify services as being susceptible to known- before being used. vulnerabilities by analysing the data. Analysing this information The known vulnerabilities identified by these tools are is classed as passive reconnaissance, as the target devices are associated with a specific Common Vulnerabilities and Ex- not being directly communicated with. This paper goes on to posure (CVE), which highlights a vulnerability for a specific define this as contactless active reconnaissance. The vulnerability identification functionality in these Internet-wide scanning tools is service. A CVE entry contains information associated with currently limited to a small number of high profile vulnerabilities. the vulnerability including a Common Platform Enumeration This work looks towards extending these features through the (CPE) and a Common Vulnerability Scoring System (CVSS). creation of a tool Scout which combines data from Censys The CPE ties a CVE to a specific product and version, while and the National Vulnerability Database to passively identify the CVSS provides an impact score. These data feeds are potential vulnerabilities. This is possible by analysing Common Platform Enumerations and associated Common Vulnerability all stored as parts of the National Vulnerability Database and Exposures. Through this novel approach, active vulnerability (NVD), a public repository managed by the National Institute scanning results can be gained, while mitigating the associated of Standards and Technology. The NVD includes several sep- issues of active scanning, such as possible disruption to the arate data feeds including checklist references, software flaws, target network and devices. In initial experiments performed on misconfigurations, product names and impact metrics. Since its 2571 services across 7 local academic intuitions, 12967 potential known-vulnerabilities were identified. More focused experiments inception in 1997, the NVD has published information about to evaluate the results and compare accuracy with industry more than 100,000 vulnerabilities and is the standard reference standard vulnerability assessment tools were carried out and for vulnerabilities. Scout was found to successfully identify vulnerabilities with Another way to identify known vulnerabilities is through an effectiveness score of up to 74 percent when compared to the use of Internet-wide scanning projects such as Shodan and OpenVAS. Index Terms—Scout, Censys, Vulnerability Assessment, Censys [5], [6]. These tools collate lightweight active recon- Internet-wide, Scanning, Passive, Contactless, National Vulner- naissance results from services operating on publicly available ability Database IP addresses, made available to users through their respective websites and APIs. This data is collected by crawlers which I. INTRODUCTION scan the entire IPv4 address range across many ports gathering Gartner believes that by 2020, 99% of vulnerabilities ex- data on network services in a similar way to the vulnerability ploited will be known prior to their use [1]. The risk asso- assessment tools used in active reconnaissance [7], [8]. These ciated with known vulnerabilities cannot be overstated, with crawlers operate by sending only one or a small number of high profile incidents such as WannaCry and NotPetya both packets to each individual service. Service specific packets are exploiting the Eternal Blue vulnerability, which was both well sent to check for vulnerable service configurations, however known and which had patches developed to mitigate prior to currently, this vulnerability functionality provided by Shodan it being used in these attacks [2]. and Censys is rather limited [9]. Only a very small number of One way in which known vulnerabilities can be actively vulnerabilities are checked for and each has bespoke identifi- identified is through the use of vulnerability assessment tools cation functionality hard coded into the specific scanners [7], such as OpenVAS and Nessus [3], [4], typically as part of [10]. the active reconnaissance phase of a pentest enagagement. In A way in which this functionality could be expanded is an attempt to identify target systems and their exploitable through cross-referencing the more general service specific vulnerabilities, these tools aggressively scan networks and data provided by these Internet-wide scanning projects, against interrogate operating network services. This can be potentially vulnerability repositories such as the NVD. This piece of work disruptive to the target network causing issues such as denial looks at exploring and evaluating this type of vulnerability identification by building on the functionality of the Censys Internet-wide scanning project. This paper is organized as follows. The methodology in- cludes the design decisions and their impact on implemen- tation. Initial Validation presents an applicable use case. Experiments and Results describe the topology and design of the experiments conducted along with the corresponding results. Analysis and Evaluation examine and commentates on the results of the conducted experiment results. Finally, the Conclusion closes this paper, providing the outcomes. II. METHODOLOGY This section presents the design and subsequent implemen- tation process towards extending the vulnerability analysis functionality within an Internet-wide scanning project. This work resulted in a tool known as Scout, named due to the connotations of reconnaissance, exploration, and discovery. Previous work has defined Contactless Reconnaissance when using the output of Internet search engines such as Google [11] to limit the contact with target systems, and this work extends Fig. 1. Approach Comparison this with the use of the Censys Internet-wide scanning cached information and associated NVD vulnerability data. Thus the term Contactless Active Reconnaissance has been proposed Beijing. Despite being released in July 2013, ZoomEye does for this type of reconnaissance using Internet-wide subject- not seem to have been discussed much literature. From the specific search engines which index and make available active little research available, most of it appears to be not transcribed reconnaissance results [9], [11]. A graphical representation of into English yet. There is also seems to be a lack of detailed the comparison between the approach outlined above to a more documentation. Due to these factors, ZoomEye was not be standard vulnerability assessment approach can be seen in Fig. considered suitable. When deciding which scanning project to 1. Fig. 1 illustrates a difference between these approaches utilize, the determining factors were the value and format of can be highlighted. This comparison was originally performed the data provided. There are several factors which impact the by Simon, Moucha and Keller however, latency was not value of data coming from an Internet-scanning project, these considered [11]. This latency can vary across services across are age, bias, and comprehensiveness. Internet-wide scanning projects. The standard active approach 1) Age: Shodan's scans perpetually across a massive num- interacts with the target receiving immediate feedback through ber of services in the IPv4 address range, indexing 550 million their correspondence. While contactless active approach does services a month [8], [13]. Shodan scans are performed in not directly interact with the target and therefore, inherits a a blend of horizontal and vertical scanning as numerous latency which varies. services are scanned for, across the Internet in a random order This comparison will serve as the basis for the evaluation [14]. Matherly comments that the scan results are continually of Scout. used to update the underlying database, however, research suggests otherwise. In research conducted by Bodenhiem, A. Design Butts, Dunlap, and Mullins, they noted a varying delay in Scout has 3 distinct operations, gathering service scanning scan results appearing on the web interface of Shodan, a data, associating possible vulnerabilities, and presentation of delay varying from 1 day to 19 days [15]. This finding results. The first stage of gathering Internet-wide scanning has impacted the methodology employed in related research data can differ considerably depending on the service chosen. [16]. Censys’ scans horizontally with scans scheduled daily, There are three main Internet-wide scanning projects, Shodan, biweekly and weekly depending on the service [14]. These Censys and ZoomEye [5], [6], [12]. The oldest, most popular scans are performed over a 24-hour period, even though the and well-known internet scanning project is Shodan. Founded underlying ZMap technology can perform this faster [7]. This in 2009 by John Matherly, it is infamous
Recommended publications
  • An Internet-Wide View of Internet-Wide Scanning
    This paper appeared in Proceedings of the 23rd USENIX Security Symposium, August 2014. An Internet-Wide View of Internet-Wide Scanning Zakir Durumeric Michael Bailey J. Alex Halderman University of Michigan University of Michigan University of Michigan [email protected] [email protected] [email protected] Abstract scanning, and successfully fingerprint ZMap and Mass- can. We present a broad view of the current scanning While it is widely known that port scanning is widespread, landscape, including analyzing who is performing large neither the scanning landscape nor the defensive reactions scans, what protocols they target, and what software and of network operators have been measured at Internet scale. providers they use. In some cases we can determine the In this work, we analyze data from a large network tele- identity of the scanners and the intent of their scans. scope to study scanning activity from the past year, un- We find that scanning practice has changed dramati- covering large horizontal scan operations and identifying cally since previous studies from 5–10 years ago [5,39,45]. broad patterns in scanning behavior. We present an analy- Many large, likely malicious scans now originate from sis of who is scanning, what services are being targeted, bullet-proof hosting providers instead of from botnets. and the impact of new scanners on the overall landscape. Internet-scale horizontal scans have become common. Al- We also analyze the scanning behavior triggered by recent most 80% of non-Conficker probe traffic originates from vulnerabilities in Linksys routers, OpenSSL, and NTP. scans targeting ≥1% of the IPv4 address space and 68% We empirically analyze the defensive behaviors that orga- from scans targeting ≥10%.
    [Show full text]
  • 4. Offensive and Defensive Network Security Cryptoworks21 • July 15, 2021
    Fundamentals of Network Security 4. Offensive and defensive network security CryptoWorks21 • July 15, 2021 Dr Douglas Stebila https://www.douglas.stebila.ca/teaching/cryptoworks21 Fundamentals of Network Security • Basics of Information Security – Security architecture and infrastructure; security goals (confidentiality, integrity, availability, and authenticity); threats/vulnerabilities/attacks; risk management • Cryptographic Building Blocks – Symmetric crypto: ciphers (stream, block), hash functions, message authentication codes, pseudorandom functions – Public key crypto: public key encryption, digital signatures, key agreement • Network Security Protocols & Standards – Overview of networking and PKI – Transport Layer Security (TLS) protocol – Overview: SSH, IPsec, Wireless (Tool: Wireshark) • Offensive and defensive network security – Offensive: Pen-tester/attack sequence: reconnaissance; gaining access; maintaining access (Tool: nmap) • Supplemental material: denial of service attacks – Defensive: Firewalls and intrusion detection • Access Control & Authentication; Web Application Security – Access control: discretionary/mandatory/role-based; phases – Authentication: something you know/have/are/somewhere you are – Web security: cookies, SQL injection – Supplemental material: Passwords 3 Assignment 2 2a) Offensive network 2b) Defensive network security security • Use nmap to scan • Set up firewall rules in services running on your Kali to prevent your computer certain types of – Will be scanning from outbound traffic (egress guest
    [Show full text]
  • An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable Iot Devices
    S S symmetry Article An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices Hwankuk Kim ID , Taeun Kim and Daeil Jang * Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do 58324, Korea; [email protected] (H.K.); [email protected] (T.K.) * Correspondence: [email protected]; Tel.: +82-61-820-1274 Received: 31 March 2018; Accepted: 7 May 2018; Published: 10 May 2018 Abstract: Since 2016, Mirai and Persirai malware have infected hundreds of thousands of Internet of Things (IoT) devices and created a massive IoT botnet, which caused distributed denial of service (DDoS) attacks. IoT malware targets vulnerable IoT devices, which are vulnerable to security risks. Techniques are needed to prevent IoT devices from being exploited by attackers. However, unlike high-performance PCs, IoT devices are lightweight, low-power, and low-cost, having performance limitations regarding processing and memory, which makes it difficult to install security and anti-malware programs. Recently, several studies have been attempted to quickly search for vulnerable internet-connected devices to solve this real issue. Issues yet to be studied still exist regarding these types of internet-wide scan technologies, such as filtering by security devices and a shortage of collected operating system (OS) information. This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP) randomization, reactive protocol (port) scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. Additionally, we describe the experiment’s results compared to the existing internet-wide scan technologies, such as ZMap and Shodan.
    [Show full text]
  • A Large-Scale Empirical Study on the Vulnerability of Deployed Iot Devices
    A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices Binbin Zhao, Shouling Ji, Wei-Han Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang, Raheem Beyah Abstract—The Internet of Things (IoT) has become ubiquitous and greatly affected peoples’ daily lives. With the increasing development of IoT devices, the corresponding security issues are becoming more and more challenging. Such a severe security situation raises the following questions that need urgent attention: What are the primary security threats that IoT devices face currently? How do vendors and users deal with these threats? In this paper, we aim to answer these critical questions through a large-scale systematic study. Specifically, we perform a ten-month-long empirical study on the vulnerability of 1; 362; 906 IoT devices varying from six types. The results show sufficient evidence that N-days vulnerability is seriously endangering the IoT devices: 385; 060 (28:25%) devices suffer from at least one N-days vulnerability. Moreover, 2; 669 of these vulnerable devices may have been compromised by botnets. We further reveal the massive differences among five popular IoT search engines: Shodan [1], Censys [2], [3], Zoomeye [4], Fofa [5] and NTI [6]. To study whether vendors and users adopt defenses against the threats, we measure the security of MQTT [7] servers, and identify that 12; 740 (88%) MQTT servers have no password protection. Our analysis can serve as an important guideline for investigating the security of IoT devices, as well as advancing the development of a more secure environment for IoT systems. Index Terms—IoT Search Engine, Vulnerable Device Assessment.
    [Show full text]
  • Measuring the Deployment of Source Address Validation of Inbound Traffic
    1 The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic Maciej Korczy´nski, Yevheniya Nosyk, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda Abstract—Source Address Validation (SAV) is a standard achieved by filtering packets at the network edge, formalized aimed at discarding packets with spoofed source IP addresses. in RFC 2827, and called Source Address Validation (SAV) [3]. The absence of SAV for outgoing traffic has been known as a Given the prevalent role of IP spoofing in cyberattacks, there root cause of Distributed Denial-of-Service (DDoS) attacks and received widespread attention. While less obvious, the absence is a need to estimate the level of SAV deployment by network of inbound filtering enables an attacker to appear as an internal providers. Projects such as Spoofer [4] already enumerate host of a network and may reveal valuable information about the networks that do not implement packet filtering. However, a network infrastructure. Inbound IP spoofing may amplify other great majority of this existing work concentrates on outbound attack vectors such as DNS cache poisoning or the recently dis- SAV and filtering since it can prevent reflection-based DDoS covered NXNSAttack. In this paper, we present the preliminary results of the Closed Resolver Project that aims at mitigating the attacks near their origin [5]. While less obvious, the lack of problem of inbound IP spoofing. We perform the first Internet- inbound filtering enables an external attacker to masquerade wide active measurement study to enumerate networks that filter as an internal host of a network, which may reveal valuable or do not filter incoming packets by their source address, for both information about the network infrastructure that is usually the IPv4 and IPv6 address spaces.
    [Show full text]
  • Impacts of Cyberattacks on Iot Devices Table of Contents
    PALO ALTO NETWORKS | IoT Impacts of Cyberattacks on IoT Devices Table of Contents Introduction 3 Modern IoT Attacks 3 The IoT Attack Lifecycle 4 Cyberattack Scenarios on IoT Devices & Impacts 5 Network Scanning Impacts to Network Services 5 Experiment Environment and Test Methods CPU, Memory, and Bandwidth Usage Service Response Time Results Conclusions Impacts C-IoT Device Battery Exhaustion 7 Background and Attack Vectors Unlocking the Potential of C-IoT Connectivity Experiment Environment and Test Methods Test Results Conclusions Impact Summary 8 Impacts of Cyberattacks on IoT Devices | White Paper 2 Introduction attacks. Take Xbash for example, which has botnet, ransom- ware, cryptomining, and self-propagation capabilities. Da- The early days of the internet age were about connecting peo- ta-destructive by nature, Xbash spreads by attacking weak ple, whereas today the focus is on connecting “things.” In the passwords and unpatched vulnerabilities in Linux and Mic- broadest sense, the internet of things (IoT) is a vast matrix rosoft Windows® servers. Another example, a new variant of of numerous nonstandard devices and endpoints connected the Muhstik botnet, self-installs and infects Linux servers wirelessly over the internet. IoT device connections are en- and IoT devices with its wormlike self-propagating capabil- abled by advanced wireless cellular technologies, including ity to wreak havoc with cryptomining and DDoS attacks. To 3G, 4G, 5G, and low-power wide-area (LPWA) cellular tech- understand the reasons behind these attacks and their impact nologies, such as NB-IoT and LTE-M. on IoT devices, let’s move on to discuss IoT device attack sur- Connected IoT devices are capable of generating and trans- faces.
    [Show full text]
  • CSC 5290 Cyber Security Practice Winter 2019 Meyer & Anna Prentis Bldg, Room 0202 T R 10:00 A.M
    Computer Science Department CSC 5290 Cyber Security Practice Winter 2019 Meyer & Anna Prentis Bldg, Room 0202 T R 10:00 A.M. – 11:15 P.M. http://www.cs.wayne.edu/fengwei/19sp-csc5290/index.html Instructor: Name: Dr. Fengwei Zhang Office location: 5057 Woodward Ave; Suite 14109.3 Phone: 313-577-1648 Email: [email protected] Office Hours: Friday, 01:00PM - 02:30PM Course Description: This course provides hands-on experience in playing with security software and network systems in a live laboratory environment, with the purpose of understating real-world threats. The course will take both offensive and defense methods to help student explore security tools and attacks in practice. It will focus on attacks (e.g., buffer overflow, heap spray, kernel rootkits, and denial of service), hacking fundamentals (e.g., scanning and reconnaissance), defenses (e.g., intrusion detection systems and firewalls). Students are expected to finish intensive lab assignments that use real-world malware, exploits, and defenses. Credit Hours: 3 Credit Hours Perquisite: CSC 4420; or permission of the instructor. Text(s) Book: No textbook is required for this course. We will cover these topics using the provided slides, papers, and online material. Dr. Fengwei Zhang - CSC 4992 Cyber Security Practice 1 Computer Programs: You should have your own computer to take this class, on which you will install either VMware Workstation for Windows or Linux, or VMware Fusion for Mac. Course contents (tentative): Weeks Topics Readings Slides & Labs Week 1, 01/08 Course overview VMware software and Microsoft products through Dreamspark at WSU. [Link] Kali Linux with nmap, Wireshark, and Metasploit.
    [Show full text]
  • Research Article Vulnerability Analysis of Network Scanning on SCADA Systems
    Hindawi Security and Communication Networks Volume 2018, Article ID 3794603, 21 pages https://doi.org/10.1155/2018/3794603 Research Article Vulnerability Analysis of Network Scanning on SCADA Systems Kyle Coffey, Richard Smith, Leandros Maglaras , and Helge Janicke De Montfort University, Leicester, UK Correspondence should be addressed to Leandros Maglaras; [email protected] Received 14 September 2017; Revised 5 December 2017; Accepted 5 February 2018; Published 13 March 2018 Academic Editor: Jianying Zhou Copyright © 2018 Kyle Cofey et al. Tis is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for remote facilities to be controlled and monitored, industries have continued to adopt Internet technology into their ICS and SCADA systems so that their enterprise can span across international borders in order to meet the demand of modern living. Although this is a necessity, it could prove to be potentially dangerous. Te devices that make up ICS and SCADA systems have bespoke purposes and are ofen inherently vulnerable and difcult to merge with newer technologies. Te focus of this article is to explore, test, and critically analyse the use of network scanning tools against bespoke SCADA equipment in order to identify the issues with conducting asset discovery or service detection on SCADA systems with the same tools used on conventional IP networks. Te observations and results of the experiments conducted are helpful in evaluating their feasibility and whether they have a negative impact on how they operate.
    [Show full text]
  • D2.5 Threat Actors' Attack Strategies
    Advanced Cyber–Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things Grant Agreement: 786698 D2.5 Threat actors’ attack strategies Work Package 2: Cyber–threat landscape and end–user requirements Document Dissemination Level PU Public X CO Confidential, only for members of the Consortium (including the Commission Services) Document Due Date: 31/12/2018 Document Submission Date: 31/12/2018 Co–funded by the Horizon 2020 Framework Programme of the European Union D2.5 Threat actors’ attack strategies Document Information Deliverable number: D2.5 Deliverable title: Threat actors’ attack strategies Deliverable version: 1.00 Work Package number: WP2 Work Package title: Cyber–threat landscape and end–user requirements Due Date of delivery: 31/12/2018 Actual date of delivery: 31/12/2018 Dissemination level: PU Editor(s): Konstantinos Limniotis (UOP) Contributor(s): Nicholas Kolokotronis, Costas Vassilakis, Nicholas Kalouptsidis, Konstantinos Limniotis, Konstantinos Ntemos, Christos–Minas Mathas, Konstantinos–Panagiotis Grammatikakis (UOP) Dimitris Kavallieros, Giovana Bilali (KEMEA) Stavros Shiaeles, Bogdan Ghita, Julian Ludlow, Salam Ketab, Hussam Mohammed, Abdulrahman Alruban (CSCAN) Reviewer(s): Pavué Clément (SCORECHAIN) Michele Simioli (MATHEMA) Project name: Advanced Cyber–Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things Project Acronym Cyber–Trust Project starting date: 01/05/2018 Project duration: 36 months Rights: Cyber–Trust Consortium Copyright Cyber–Trust Consortium.
    [Show full text]
  • Drawing the Picture of Industrial Control Systems Security Status in the Internet Age
    From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age Yixiong Wu1, Jianwei Zhuge1;2, Tingting Yin1, Tianyi Li3, Junmin Zhu4, Guannan Guo5, Yue Liu6 and Jianju Hu7 1Institute of Network Science and Cyberspace, Tsinghua University, Beijing, China 2Beijing National Research Center for Information Science and Technology, Beijing, China 3Peking University, Beijing, China 4Shanghai Jiao Tong University, Shanghai, China 5School of Computer Science and Technology, University of Science and Technology of China, Hefei, China 6Qi An Xin Technology Research Institute, Beijing, China 7Siemens Ltd., China Keywords: Internet-facing ICS Devices, Passive Vulnerability Assessment, Device Search Engine. Abstract: The number of Internet-facing industrial control system(ICS) devices has risen rapidly due to remote control demand. Going beyond benefits in maintenance, this also exposes the fragile ICS devices to cyber-attackers. To characterize the security status of Internet-facing ICS devices, we analyze the exposed ICS devices and their vulnerabilities. Considering the ethic, we design and implement ICScope, a passive vulnerability assessment system based on device search engines. Firstly, ICScope extracts the ICS device information from the ban- ners returned by multiple search engines. Then, ICScope filters out the possible ICS honeypots to guarantee accuracy. Finally, ICScope associates ICS vulnerabilities with each ICS device. Over the past year, our mea- surements cover more than 466,000 IPs. We first perform a comprehensive measurement of Internet-facing ICS devices from Dec 2019 to Jan 2020. We find that there are about 49.58% of Internet-facing ICS devices that can be identified are affected by one or more vulnerabilities.
    [Show full text]
  • Footprinting and Brute Force Attacks Are Still in Use
    Beware of older cyber attacks Footprinting and brute force attacks are still in use IBM X-Force® Research Managed Security Services Report Click here to start ▶ ◀ Previous Next ▶ Contents Executive overview longer discussed much. One example is the TCP/ UDP port scan and TCP/UDP service sweep, Covering more than 18 years of vulnerability data, Executive overview which are part of an attack pattern known as the IBM® X-Force® database surpassed 100,000 Footprinting footprinting.2 Another is the password brute force entries in Q2 2016.1 That means there are a lot of attack pattern,3 one of the brute force attacks4 we Top 10 ports attack vectors at a criminal’s disposal. With much saw emerge decades ago and still see today. While of the media focus on new and emerging threats, Brute force password many products and services today require strong it’s easy to see how security teams might lose attacks passwords, weak passwords are still being used, sight of older, less newsworthy vulnerabilities and Secure shell (SSH) brute aiding criminals in carrying out successful brute attack vectors. force attacks force attacks.5 6 7 Persistence of SSH brute An assessment of recent data from IBM Managed Fortunately, many tools and mitigation techniques force top 20 attacker Security Services (IBM MSS), which continuously IP addresses to thwart these older kinds of cyber attack have monitors billions of events reported by more than been developed over the years. Organizations that SSH brute force top five 8,000 client devices in over 100 countries, reveals apply them in their environments will be better IP addresses some interesting findings about attack vectors no equipped to deal with the ongoing threat.
    [Show full text]
  • Fast Internet-Wide Scanning: a New Security Perspective
    Fast Internet-Wide Scanning: A New Security Perspective by Zakir Durumeric A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in the University of Michigan 2017 Doctoral Committee: Professor J. Alex Halderman, Chair Associate Professor Michael Bailey, University of Illinois Urbana-Champaign Research Professor Peter Honeyman Professor Vern Paxson, University of California, Berkeley Assistant Professor Florian Schaub Zakir Durumeric [email protected] ORCID iD: 0000-0002-9647-4192 © Zakir Durumeric 2017 ACKNOWLEDGMENTS I want to thank my advisor J. Alex Halderman, as well as Michael Bailey and Vern Paxson, for their support and guidance over the past six years. I have learned an immense amount both professionally and personally from each of you, and I would not be where I am today without you. I also thank my two other committee members—Peter Honeyman and Florian Schaub—as well as Prabal Dutta and Brian Noble for their time and advice. I would not have been able to complete this dissertation without the help of family and friends. I want to thank my parents Oguz Durumeric and Robin Paetzold, and my brother Aleksander Durumeric for their unwavering support. I am further grateful for the friends who have kept me sane: Brad Campbell, Noah Klugman, Kevin Lu, Corey Melnick, Pat Pannuto, Bethany Patten, Lane Powell, and Audrey Shelton. I thank my labmates and others in the department for their camaraderie and discussion: David Adrian, Jethro Beekman, Matthew Bernhard, Denis Bueno, Mike Chow, Meghan Clark, Rob Cohn, Jakub Czyz, David Devecsery, Chris Dzombak, Denis Foo Kune, Bran- den Ghena, Grant Ho, Will Huang, James Kasten, Deepak Kumar, Kyle Lady, Frank Li, Zane Ma, Bill Marczak, Allison McDonald, Ariana Mirian, Paul Pearce, Drew Springall, Benjamin VanderSloot, Eric Wustrow, and Jing Zhang.
    [Show full text]