首页 > 最新文献

Passive and Active Network Measurement Conference最新文献

英文 中文
WHOIS Right? An Analysis of WHOIS and RDAP Consistency WHOIS 正确吗?WHOIS 和 RDAP 一致性分析
Pub Date : 2024-06-04 DOI: 10.1007/978-3-031-56249-5_9
Simon Fernandez, Olivier Hureau, Andrzej Duda, Maciej Korczyński
{"title":"WHOIS Right? An Analysis of WHOIS and RDAP Consistency","authors":"Simon Fernandez, Olivier Hureau, Andrzej Duda, Maciej Korczyński","doi":"10.1007/978-3-031-56249-5_9","DOIUrl":"https://doi.org/10.1007/978-3-031-56249-5_9","url":null,"abstract":"","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"8 6","pages":"206-231"},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141267681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SunBlock: Cloudless Protection for IoT Systems SunBlock:为物联网系统提供无云保护
Pub Date : 2024-01-25 DOI: 10.48550/arXiv.2401.14332
Vadim Safronov, A. Mandalari, Daniel J. Dubois, D. Choffnes, Hamed Haddadi
With an increasing number of Internet of Things (IoT) devices present in homes, there is a rise in the number of potential information leakage channels and their associated security threats and privacy risks. Despite a long history of attacks on IoT devices in unprotected home networks, the problem of accurate, rapid detection and prevention of such attacks remains open. Many existing IoT protection solutions are cloud-based, sometimes ineffective, and might share consumer data with unknown third parties. This paper investigates the potential for effective IoT threat detection locally, on a home router, using AI tools combined with classic rule-based traffic-filtering algorithms. Our results show that with a slight rise of router hardware resources caused by machine learning and traffic filtering logic, a typical home router instrumented with our solution is able to effectively detect risks and protect a typical home IoT network, equaling or outperforming existing popular solutions, without any effects on benign IoT functionality, and without relying on cloud services and third parties.
随着家庭中物联网(IoT)设备的日益增多,潜在的信息泄漏渠道及其相关的安全威胁和隐私风险也随之增加。尽管针对未受保护的家庭网络中的物联网设备的攻击由来已久,但准确、快速地检测和预防此类攻击的问题仍未解决。许多现有的物联网保护解决方案都是基于云的,有时效果不佳,而且可能会与未知的第三方共享消费者数据。本文将人工智能工具与基于规则的经典流量过滤算法相结合,研究了在家用路由器上本地有效检测物联网威胁的潜力。我们的研究结果表明,在机器学习和流量过滤逻辑略微增加路由器硬件资源的情况下,采用我们的解决方案的典型家用路由器能够有效检测风险并保护典型的家庭物联网网络,其性能等同于或优于现有的流行解决方案,而且不会对良性物联网功能造成任何影响,也无需依赖云服务和第三方。
{"title":"SunBlock: Cloudless Protection for IoT Systems","authors":"Vadim Safronov, A. Mandalari, Daniel J. Dubois, D. Choffnes, Hamed Haddadi","doi":"10.48550/arXiv.2401.14332","DOIUrl":"https://doi.org/10.48550/arXiv.2401.14332","url":null,"abstract":"With an increasing number of Internet of Things (IoT) devices present in homes, there is a rise in the number of potential information leakage channels and their associated security threats and privacy risks. Despite a long history of attacks on IoT devices in unprotected home networks, the problem of accurate, rapid detection and prevention of such attacks remains open. Many existing IoT protection solutions are cloud-based, sometimes ineffective, and might share consumer data with unknown third parties. This paper investigates the potential for effective IoT threat detection locally, on a home router, using AI tools combined with classic rule-based traffic-filtering algorithms. Our results show that with a slight rise of router hardware resources caused by machine learning and traffic filtering logic, a typical home router instrumented with our solution is able to effectively detect risks and protect a typical home IoT network, equaling or outperforming existing popular solutions, without any effects on benign IoT functionality, and without relying on cloud services and third parties.","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"10 1","pages":"322-338"},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140495891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Augmentation for Traffic Classification 用于交通分类的数据增强
Pub Date : 2024-01-19 DOI: 10.48550/arXiv.2401.10754
Chao Wang, A. Finamore, Pietro Michiardi, Massimo Gallo, Dario Rossi
Data Augmentation (DA) -- enriching training data by adding synthetic samples -- is a technique widely adopted in Computer Vision (CV) and Natural Language Processing (NLP) tasks to improve models performance. Yet, DA has struggled to gain traction in networking contexts, particularly in Traffic Classification (TC) tasks. In this work, we fulfill this gap by benchmarking 18 augmentation functions applied to 3 TC datasets using packet time series as input representation and considering a variety of training conditions. Our results show that (i) DA can reap benefits previously unexplored, (ii) augmentations acting on time series sequence order and masking are better suited for TC than amplitude augmentations and (iii) basic models latent space analysis can help understanding the positive/negative effects of augmentations on classification performance.
数据增强(DA)--通过添加合成样本来丰富训练数据--是计算机视觉(CV)和自然语言处理(NLP)任务中广泛采用的一种技术,用于提高模型性能。然而,在网络环境中,尤其是在交通分类(TC)任务中,DA 一直难以获得重视。在这项工作中,我们使用数据包时间序列作为输入表示,并考虑了各种训练条件,对应用于 3 个交通分类数据集的 18 种增强功能进行了基准测试,从而弥补了这一不足。我们的研究结果表明:(i) DA 可以带来以前未曾探索过的好处;(ii) 与振幅增强相比,作用于时间序列顺序和掩码的增强更适合流量分类;(iii) 基本模型潜空间分析有助于理解增强对分类性能的正/负效应。
{"title":"Data Augmentation for Traffic Classification","authors":"Chao Wang, A. Finamore, Pietro Michiardi, Massimo Gallo, Dario Rossi","doi":"10.48550/arXiv.2401.10754","DOIUrl":"https://doi.org/10.48550/arXiv.2401.10754","url":null,"abstract":"Data Augmentation (DA) -- enriching training data by adding synthetic samples -- is a technique widely adopted in Computer Vision (CV) and Natural Language Processing (NLP) tasks to improve models performance. Yet, DA has struggled to gain traction in networking contexts, particularly in Traffic Classification (TC) tasks. In this work, we fulfill this gap by benchmarking 18 augmentation functions applied to 3 TC datasets using packet time series as input representation and considering a variety of training conditions. Our results show that (i) DA can reap benefits previously unexplored, (ii) augmentations acting on time series sequence order and masking are better suited for TC than amplitude augmentations and (iii) basic models latent space analysis can help understanding the positive/negative effects of augmentations on classification performance.","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"393 4-6","pages":"159-186"},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140502394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Ready Is DNS for an IPv6-Only World? ipv6世界的DNS准备好了吗?
Pub Date : 2023-02-22 DOI: 10.48550/arXiv.2302.11393
Florian Streibelt, Patrick Sattler, F. Lichtblau, Carlos H. Gan'an, A. Feldmann, Oliver Gasser, T. Fiebig
DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved. We point out, that the presence of an AAAA resource record for a zone's nameserver does not necessarily imply that it is resolvable in an IPv6-only environment since the full DNS delegation chain must resolve via IPv6 as well. Hence, in an IPv6-only setting zones may experience an effect similar to what is commonly referred to as lame delegation. Our longitudinal study shows that the continuing centralization of the Internet has a large impact on IPv6 readiness, i.e., a small number of large DNS providers has, and still can, influence IPv6 readiness for a large number of zones. A single operator that enabled IPv6 DNS resolution -- by adding IPv6 glue records -- was responsible for around 20.3% of all zones in our dataset not resolving over IPv6 until January 2017. Even today, 10% of DNS operators are responsible for more than 97.5% of all zones that do not resolve using IPv6.
DNS是互联网的核心组成部分之一。在本文中,我们研究了严格的纯ipv6场景下的DNS解析,并发现大部分区域无法解析。我们指出,区域名称服务器的AAAA资源记录的存在并不一定意味着它在纯IPv6环境中是可解析的,因为完整的DNS委托链也必须通过IPv6进行解析。因此,在纯ipv6设置中,区域可能会遇到类似于通常所说的蹩脚委托的效果。我们的纵向研究表明,互联网的持续集中化对IPv6的准备情况有很大的影响,即,少数大型DNS提供商已经并且仍然可以影响大量区域的IPv6准备情况。通过添加IPv6 glue记录,单个运营商启用了IPv6 DNS解析,直到2017年1月,我们的数据集中约有20.3%的区域没有通过IPv6解析。即使在今天,10%的DNS运营商负责超过97.5%的不使用IPv6解析的区域。
{"title":"How Ready Is DNS for an IPv6-Only World?","authors":"Florian Streibelt, Patrick Sattler, F. Lichtblau, Carlos H. Gan'an, A. Feldmann, Oliver Gasser, T. Fiebig","doi":"10.48550/arXiv.2302.11393","DOIUrl":"https://doi.org/10.48550/arXiv.2302.11393","url":null,"abstract":"DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved. We point out, that the presence of an AAAA resource record for a zone's nameserver does not necessarily imply that it is resolvable in an IPv6-only environment since the full DNS delegation chain must resolve via IPv6 as well. Hence, in an IPv6-only setting zones may experience an effect similar to what is commonly referred to as lame delegation. Our longitudinal study shows that the continuing centralization of the Internet has a large impact on IPv6 readiness, i.e., a small number of large DNS providers has, and still can, influence IPv6 readiness for a large number of zones. A single operator that enabled IPv6 DNS resolution -- by adding IPv6 glue records -- was responsible for around 20.3% of all zones in our dataset not resolving over IPv6 until January 2017. Even today, 10% of DNS operators are responsible for more than 97.5% of all zones that do not resolve using IPv6.","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127312939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Characterizing the VPN Ecosystem in the Wild 野外VPN生态系统的特征
Pub Date : 2023-02-13 DOI: 10.48550/arXiv.2302.06566
Aniss Maghsoudlou, Lukas Vermeulen, Ingmar Poese, Oliver Gasser
With the shift to working remotely after the COVID-19 pandemic, the use of Virtual Private Networks (VPNs) around the world has nearly doubled. Therefore, measuring the traffic and security aspects of the VPN ecosystem is more important now than ever. It is, however, challenging to detect and characterize VPN traffic since some VPN protocols use the same port number as web traffic and port-based traffic classification will not help. VPN users are also concerned about the vulnerabilities of their VPN connections due to privacy issues. In this paper, we aim at detecting and characterizing VPN servers in the wild, which facilitates detecting the VPN traffic. To this end, we perform Internet-wide active measurements to find VPN servers in the wild, and characterize them based on their vulnerabilities, certificates, locations, and fingerprinting. We find 9.8M VPN servers distributed around the world using OpenVPN, SSTP, PPTP, and IPsec, and analyze their vulnerability. We find SSTP to be the most vulnerable protocol with more than 90% of detected servers being vulnerable to TLS downgrade attacks. Of all the servers that respond to our VPN probes, 2% also respond to HTTP probes and therefore are classified as Web servers. We apply our list of VPN servers to the traffic from a large European ISP and observe that 2.6% of all traffic is related to these VPN servers.
随着COVID-19大流行后人们转向远程工作,全球虚拟专用网络(vpn)的使用量几乎翻了一番。因此,衡量VPN生态系统的流量和安全方面比以往任何时候都更加重要。然而,检测和描述VPN流量是具有挑战性的,因为一些VPN协议使用与web流量相同的端口号,基于端口的流量分类将没有帮助。由于隐私问题,VPN用户也担心VPN连接的漏洞。在本文中,我们的目的是在野外检测和表征VPN服务器,以便于检测VPN流量。为此,我们执行互联网范围内的主动测量,以在野外找到VPN服务器,并根据它们的漏洞、证书、位置和指纹特征来描述它们。我们发现了分布在世界各地的980万台使用OpenVPN、SSTP、PPTP和IPsec的VPN服务器,并分析了它们的漏洞。我们发现SSTP是最脆弱的协议,超过90%的检测到的服务器容易受到TLS降级攻击。在所有响应我们的VPN探测的服务器中,2%也响应HTTP探测,因此被归类为Web服务器。我们将VPN服务器列表应用于来自大型欧洲ISP的流量,并观察到所有流量的2.6%与这些VPN服务器有关。
{"title":"Characterizing the VPN Ecosystem in the Wild","authors":"Aniss Maghsoudlou, Lukas Vermeulen, Ingmar Poese, Oliver Gasser","doi":"10.48550/arXiv.2302.06566","DOIUrl":"https://doi.org/10.48550/arXiv.2302.06566","url":null,"abstract":"With the shift to working remotely after the COVID-19 pandemic, the use of Virtual Private Networks (VPNs) around the world has nearly doubled. Therefore, measuring the traffic and security aspects of the VPN ecosystem is more important now than ever. It is, however, challenging to detect and characterize VPN traffic since some VPN protocols use the same port number as web traffic and port-based traffic classification will not help. VPN users are also concerned about the vulnerabilities of their VPN connections due to privacy issues. In this paper, we aim at detecting and characterizing VPN servers in the wild, which facilitates detecting the VPN traffic. To this end, we perform Internet-wide active measurements to find VPN servers in the wild, and characterize them based on their vulnerabilities, certificates, locations, and fingerprinting. We find 9.8M VPN servers distributed around the world using OpenVPN, SSTP, PPTP, and IPsec, and analyze their vulnerability. We find SSTP to be the most vulnerable protocol with more than 90% of detected servers being vulnerable to TLS downgrade attacks. Of all the servers that respond to our VPN probes, 2% also respond to HTTP probes and therefore are classified as Web servers. We apply our list of VPN servers to the traffic from a large European ISP and observe that 2.6% of all traffic is related to these VPN servers.","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128168598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring the Cookieverse: A Multi-Perspective Analysis of Web Cookies 探索cookie世界:对Web cookie的多角度分析
Pub Date : 2023-02-10 DOI: 10.48550/arXiv.2302.05353
Ali Rasaii, Shivani Singh, D. Gosain, Oliver Gasser
Web cookies have been the subject of many research studies over the last few years. However, most existing research does not consider multiple crucial perspectives that can influence the cookie landscape, such as the client's location, the impact of cookie banner interaction, and from which operating system a website is being visited. In this paper, we conduct a comprehensive measurement study to analyze the cookie landscape for Tranco top-10k websites from different geographic locations and analyze multiple different perspectives. One important factor which influences cookies is the use of cookie banners. We develop a tool, BannerClick, to automatically detect, accept, and reject cookie banners with an accuracy of 99%, 97%, and 87%, respectively. We find banners to be 56% more prevalent when visiting websites from within the EU region. Moreover, we analyze the effect of banner interaction on different types of cookies (i.e., first-party, third-party, and tracking). For instance, we observe that websites send, on average, 5.5x more third-party cookies after clicking ``accept'', underlining that it is critical to interact with banners when performing Web measurements. Additionally, we analyze statistical consistency, evaluate the widespread deployment of consent management platforms, compare landing to inner pages, and assess the impact of visiting a website on a desktop compared to a mobile phone. Our study highlights that all of these factors substantially impact the cookie landscape, and thus a multi-perspective approach should be taken when performing Web measurement studies.
在过去的几年里,网络cookie一直是许多研究的主题。然而,大多数现有的研究并没有考虑到可以影响cookie景观的多个关键角度,例如客户端的位置,cookie横幅交互的影响,以及从哪个操作系统访问网站。在本文中,我们进行了一项全面的测量研究,从不同的地理位置和多个不同的角度分析了Tranco前10k网站的cookie景观。影响cookie的一个重要因素是cookie横幅的使用。我们开发了一个工具,BannerClick,可以自动检测、接受和拒绝cookie横幅,准确率分别为99%、97%和87%。我们发现,当访问来自欧盟地区的网站时,横幅广告的流行率要高出56%。此外,我们还分析了横幅交互对不同类型cookie(即第一方、第三方和跟踪)的影响。例如,我们观察到,在点击“接受”后,网站发送的第三方cookie平均增加了5.5倍,这强调了在执行Web测量时与横幅进行交互至关重要。此外,我们分析了统计一致性,评估了同意管理平台的广泛部署,比较了登陆页面和内页,并评估了在桌面电脑上访问网站与在手机上访问网站的影响。我们的研究强调了所有这些因素对cookie的影响,因此在进行Web测量研究时应该采取多角度的方法。
{"title":"Exploring the Cookieverse: A Multi-Perspective Analysis of Web Cookies","authors":"Ali Rasaii, Shivani Singh, D. Gosain, Oliver Gasser","doi":"10.48550/arXiv.2302.05353","DOIUrl":"https://doi.org/10.48550/arXiv.2302.05353","url":null,"abstract":"Web cookies have been the subject of many research studies over the last few years. However, most existing research does not consider multiple crucial perspectives that can influence the cookie landscape, such as the client's location, the impact of cookie banner interaction, and from which operating system a website is being visited. In this paper, we conduct a comprehensive measurement study to analyze the cookie landscape for Tranco top-10k websites from different geographic locations and analyze multiple different perspectives. One important factor which influences cookies is the use of cookie banners. We develop a tool, BannerClick, to automatically detect, accept, and reject cookie banners with an accuracy of 99%, 97%, and 87%, respectively. We find banners to be 56% more prevalent when visiting websites from within the EU region. Moreover, we analyze the effect of banner interaction on different types of cookies (i.e., first-party, third-party, and tracking). For instance, we observe that websites send, on average, 5.5x more third-party cookies after clicking ``accept'', underlining that it is critical to interact with banners when performing Web measurements. Additionally, we analyze statistical consistency, evaluate the widespread deployment of consent management platforms, compare landing to inner pages, and assess the impact of visiting a website on a desktop compared to a mobile phone. Our study highlights that all of these factors substantially impact the cookie landscape, and thus a multi-perspective approach should be taken when performing Web measurement studies.","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133579916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Quantifying User Password Exposure to Third-Party CDNs 量化用户密码对第三方cdn的暴露
Pub Date : 2023-01-09 DOI: 10.48550/arXiv.2301.03690
Rui Xin, Shih-Yi Lin, Xiaowei Yang
Web services commonly employ Content Distribution Networks (CDNs) for performance and security. As web traffic is becoming 100% HTTPS, more and more websites allow CDNs to terminate their HTTPS connections. This practice may expose a website's user sensitive information such as a user's login password to a third-party CDN. In this paper, we measure and quantify the extent of user password exposure to third-party CDNs. We find that among Alexa top 50K websites, at least 12,451 of them use CDNs and contain user login entrances. Among those websites, 33% of them expose users' passwords to the CDNs, and a popular CDN may observe passwords from more than 40% of its customers. This result suggests that if a CDN infrastructure has a vulnerability or an insider attack, many users' accounts will be at risk. If we assume the attacker is a passive eavesdropper, a website can avoid this vulnerability by encrypting users' passwords in HTTPS connections. Our measurement shows that less than 17% of the websites adopt this countermeasure.
Web服务通常使用内容分发网络(cdn)来提高性能和安全性。随着网络流量100%使用HTTPS,越来越多的网站允许cdn终止其HTTPS连接。这种做法可能会将网站的用户敏感信息(如用户的登录密码)暴露给第三方CDN。在本文中,我们测量和量化用户密码暴露给第三方cdn的程度。我们发现,在Alexa排名前50K的网站中,至少有12451个网站使用cdn并包含用户登录入口。在这些网站中,有33%的网站将用户的密码暴露给CDN,而一个受欢迎的CDN可能会看到超过40%的客户的密码。这一结果表明,如果CDN基础设施存在漏洞或内部攻击,许多用户的帐户将处于危险之中。如果我们假设攻击者是一个被动的窃听者,网站可以通过在HTTPS连接中加密用户的密码来避免这个漏洞。我们的测量显示,只有不到17%的网站采用了这种对策。
{"title":"Quantifying User Password Exposure to Third-Party CDNs","authors":"Rui Xin, Shih-Yi Lin, Xiaowei Yang","doi":"10.48550/arXiv.2301.03690","DOIUrl":"https://doi.org/10.48550/arXiv.2301.03690","url":null,"abstract":"Web services commonly employ Content Distribution Networks (CDNs) for performance and security. As web traffic is becoming 100% HTTPS, more and more websites allow CDNs to terminate their HTTPS connections. This practice may expose a website's user sensitive information such as a user's login password to a third-party CDN. In this paper, we measure and quantify the extent of user password exposure to third-party CDNs. We find that among Alexa top 50K websites, at least 12,451 of them use CDNs and contain user login entrances. Among those websites, 33% of them expose users' passwords to the CDNs, and a popular CDN may observe passwords from more than 40% of its customers. This result suggests that if a CDN infrastructure has a vulnerability or an insider attack, many users' accounts will be at risk. If we assume the attacker is a passive eavesdropper, a website can avoid this vulnerability by encrypting users' passwords in HTTPS connections. Our measurement shows that less than 17% of the websites adopt this countermeasure.","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets 回到未来的Whois:用于处理历史数据集的IP地址归属服务
Pub Date : 2022-11-12 DOI: 10.1007/978-3-031-28486-1_10
Florian Streibelt, Martina Lindorfer, Seda F. Gürses, Carlos H. Gan'an, T. Fiebig
{"title":"Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets","authors":"Florian Streibelt, Martina Lindorfer, Seda F. Gürses, Carlos H. Gan'an, T. Fiebig","doi":"10.1007/978-3-031-28486-1_10","DOIUrl":"https://doi.org/10.1007/978-3-031-28486-1_10","url":null,"abstract":"","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133857895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Early Detection of Spam Domains with Passive DNS and SPF 基于被动DNS和SPF的垃圾域名早期检测
Pub Date : 2022-05-04 DOI: 10.1007/978-3-030-98785-5_2
Simon Fernandez, Maciej Korczyński, A. Duda
{"title":"Early Detection of Spam Domains with Passive DNS and SPF","authors":"Simon Fernandez, Maciej Korczyński, A. Duda","doi":"10.1007/978-3-030-98785-5_2","DOIUrl":"https://doi.org/10.1007/978-3-030-98785-5_2","url":null,"abstract":"","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124086812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
One to Rule them All? A First Look at DNS over QUIC 一人统治众民?通过QUIC了解DNS
Pub Date : 2022-02-07 DOI: 10.1007/978-3030-98785-5_24
Mike Kosek, T. Doan, Malte Granderath, Vaibhav Bajpai
{"title":"One to Rule them All? A First Look at DNS over QUIC","authors":"Mike Kosek, T. Doan, Malte Granderath, Vaibhav Bajpai","doi":"10.1007/978-3030-98785-5_24","DOIUrl":"https://doi.org/10.1007/978-3030-98785-5_24","url":null,"abstract":"","PeriodicalId":103587,"journal":{"name":"Passive and Active Network Measurement Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Passive and Active Network Measurement Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1