Michael Patrick Collins, Alefiya Hussain, S. Schwab
{"title":"Identifying and Differentiating Acknowledged Scanners in Network Traffic","authors":"Michael Patrick Collins, Alefiya Hussain, S. Schwab","doi":"10.1109/EuroSPW59978.2023.00069","DOIUrl":null,"url":null,"abstract":"Acknowledged scanners are Internet scanners which engage with the community as a whole through, at the minimum through a public website. These scanners may provide a service, whether as an education institution, corporation, nonprofit or other organization and may engage in good citizen behaviors such as opt–out lists and by publishing their sources. In this paper, we describe the behavior and population of acknowledged scanners and demonstrate the difference between acknowledged scanners and other (unacknowledged) scanners. We quantitatively show acknowledged scanners, scan from a limited set of addresses, scan predictably, and most importantly the ports (and assumed vulnerabilities) that they scan for differ significantly from the targets of unacknowledged scanners. Failing to differentiate acknowledged and unacknowledged scanners impacts both research and operations, calling into question research results categorizing scanners and overloading operators in false positives. We show the differences between these two scanner classes based on a 30 day sample of darkspace data collected from the USC-ISI network that can be widely shared. We have also maintained an open access acknowledged scanner repository, a whitelist of 40+ acknowledged scanner entities and their IP addresses for the last three years. These acknowledged scanners are researchers, internet public health organizations, and threat intelligence companies. More than 12 unique security organizations track the whitelist to include into their threat assessments.","PeriodicalId":220415,"journal":{"name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EuroSPW59978.2023.00069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Acknowledged scanners are Internet scanners which engage with the community as a whole through, at the minimum through a public website. These scanners may provide a service, whether as an education institution, corporation, nonprofit or other organization and may engage in good citizen behaviors such as opt–out lists and by publishing their sources. In this paper, we describe the behavior and population of acknowledged scanners and demonstrate the difference between acknowledged scanners and other (unacknowledged) scanners. We quantitatively show acknowledged scanners, scan from a limited set of addresses, scan predictably, and most importantly the ports (and assumed vulnerabilities) that they scan for differ significantly from the targets of unacknowledged scanners. Failing to differentiate acknowledged and unacknowledged scanners impacts both research and operations, calling into question research results categorizing scanners and overloading operators in false positives. We show the differences between these two scanner classes based on a 30 day sample of darkspace data collected from the USC-ISI network that can be widely shared. We have also maintained an open access acknowledged scanner repository, a whitelist of 40+ acknowledged scanner entities and their IP addresses for the last three years. These acknowledged scanners are researchers, internet public health organizations, and threat intelligence companies. More than 12 unique security organizations track the whitelist to include into their threat assessments.