Skip to main content
Top

2019 | OriginalPaper | Chapter

Hidden Treasures – Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane

Authors : Jan Rüth, Torsten Zimmermann, Oliver Hohlfeld

Published in: Passive and Active Measurement

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet-wide scans are a common active measurement approach to study the Internet, e.g., studying security properties or protocol adoption. They involve probing large address ranges (IPv4 or parts of IPv6) for specific ports or protocols. Besides their primary use for probing (e.g., studying protocol adoption), we show that—at the same time—they provide valuable insights into the Internet control plane informed by ICMP responses to these probes—a currently unexplored secondary use. We collect one week of ICMP responses (637.50M messages) to several Internet-wide ZMap scans covering multiple TCP and UDP ports as well as DNS-based scans covering >50% of the domain name space. This perspective enables us to study the Internet’s control plane as a by-product of Internet measurements. We receive ICMP messages from \(\sim \)171M different IPs in roughly 53K different autonomous systems. Additionally, we uncover multiple control plane problems, e.g., we detect a plethora of outdated and misconfigured routers and uncover the presence of large-scale persistent routing loops in IPv4.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Please note that we do not have a fully IPv6-capable measurement infrastructure and thus focus on IPv4 only.
 
2
To reduce the capture size, our packet capture caps packets at 98 byte allowing no further investigation, we find 67% having the maximum capture size.
 
3
With reachable we actually mean not unreachable, i.e., we do not get ICMP unreachable messages, which must not mean that this host was reached by the scan.
 
4
This is basically a precaution against bad load balancers traded against the required TTL.
 
5
Our dataset excludes TTL exceeded messages generated by these traceroutes.
 
Literature
1.
go back to reference Augustin, B., et al.: Avoiding traceroute anomalies with Paris traceroute. In: ACM IMC (2006) Augustin, B., et al.: Avoiding traceroute anomalies with Paris traceroute. In: ACM IMC (2006)
2.
go back to reference Baker, F.: Requirements for IP Version 4 Routers. RFC 1812, RFC Editor (1995) Baker, F.: Requirements for IP Version 4 Routers. RFC 1812, RFC Editor (1995)
3.
go back to reference Bano, S., et al.: Scanning the internet for liveness. SIGCOMM CCR 48(2), 2–9 (2018)CrossRef Bano, S., et al.: Scanning the internet for liveness. SIGCOMM CCR 48(2), 2–9 (2018)CrossRef
4.
go back to reference Braden, R.: Requirements for Internet Hosts - Communication Layers. RFC 1122, RFC Editor (1989) Braden, R.: Requirements for Internet Hosts - Communication Layers. RFC 1122, RFC Editor (1989)
7.
go back to reference Custura, A., Fairhurst, G., Learmonth, I.: Exploring usable Path MTU in the Internet. In: IFIP Network Traffic Measurement and Analysis Conference (2018) Custura, A., Fairhurst, G., Learmonth, I.: Exploring usable Path MTU in the Internet. In: IFIP Network Traffic Measurement and Analysis Conference (2018)
8.
go back to reference Donnet, B., Luckie, M., Mérindol, P., Pansiot, J.-J.: Revealing MPLS Tunnels obscured from traceroute. SIGCOMM CCR 42(2), 87–93 (2012)CrossRef Donnet, B., Luckie, M., Mérindol, P., Pansiot, J.-J.: Revealing MPLS Tunnels obscured from traceroute. SIGCOMM CCR 42(2), 87–93 (2012)CrossRef
9.
go back to reference Durumeric, Z., et al.: The matter of heartbleed. In: ACM IMC (2014) Durumeric, Z., et al.: The matter of heartbleed. In: ACM IMC (2014)
10.
go back to reference Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: USENIX Security (2013) Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: USENIX Security (2013)
11.
go back to reference Edeline, K., Kühlewind, M., Trammell, B., Donnet, B.: copycat: Testing differential treatment of new transport protocols in the wild. In: Proceedings of the Applied Networking Research Workshop (ANRW) (2017) Edeline, K., Kühlewind, M., Trammell, B., Donnet, B.: copycat: Testing differential treatment of new transport protocols in the wild. In: Proceedings of the Applied Networking Research Workshop (ANRW) (2017)
12.
go back to reference Finn, G.G.: A connectionless congestion control algorithm. SIGCOMM CCR 19(5), 12–31 (1989)CrossRef Finn, G.G.: A connectionless congestion control algorithm. SIGCOMM CCR 19(5), 12–31 (1989)CrossRef
14.
go back to reference Francois, P., Bonaventure, O.: Avoiding transient loops during the convergence of link-state routing protocols. IEEE/ACM Trans. Netw. 15, 1280–1292 (2007)CrossRef Francois, P., Bonaventure, O.: Avoiding transient loops during the convergence of link-state routing protocols. IEEE/ACM Trans. Netw. 15, 1280–1292 (2007)CrossRef
15.
go back to reference Gill, S.: ICMP redirects are ba’ad, mkay? Technical report, Team Cymru Inc. (2002) Gill, S.: ICMP redirects are ba’ad, mkay? Technical report, Team Cymru Inc. (2002)
16.
go back to reference Gont, F.: ICMP Attacks Against TCP. RFC 5927, RFC Editor (2010) Gont, F.: ICMP Attacks Against TCP. RFC 5927, RFC Editor (2010)
17.
go back to reference Gont, F.: Deprecation of ICMP Source Quench Messages. RFC 6633, RFC Editor (2012) Gont, F.: Deprecation of ICMP Source Quench Messages. RFC 6633, RFC Editor (2012)
20.
go back to reference Hengartner, U., Moon, S., Mortier, R., Diot, C.: Detection and analysis of routing loops in packet traces. In: ACM SIGCOMM Workshop on Internet Measurement (2002) Hengartner, U., Moon, S., Mortier, R., Diot, C.: Detection and analysis of routing loops in packet traces. In: ACM SIGCOMM Workshop on Internet Measurement (2002)
23.
28.
go back to reference Postel, J.: Internet Control Message Protocol. RFC 792, RFC Editor (1981) Postel, J.: Internet Control Message Protocol. RFC 792, RFC Editor (1981)
29.
go back to reference Reynolds, J., Postel, J.: Assigned Numbers. RFC 1700, RFC Editor (1994) Reynolds, J., Postel, J.: Assigned Numbers. RFC 1700, RFC Editor (1994)
30.
go back to reference Rüth, J., Bormann, C., Hohlfeld, O.: Large-scale scanning of TCP’s initial window. In: ACM IMC (2017) Rüth, J., Bormann, C., Hohlfeld, O.: Large-scale scanning of TCP’s initial window. In: ACM IMC (2017)
32.
go back to reference Sridharan, A., Moon, S., Diot, C.: On the correlation between route dynamics and routing loops. In: ACM IMC (2003) Sridharan, A., Moon, S., Diot, C.: On the correlation between route dynamics and routing loops. In: ACM IMC (2003)
34.
go back to reference Wang, F., Qiu, J., Gao, L., Wang, J.: On understanding transient interdomain routing failures (2009) Wang, F., Qiu, J., Gao, L., Wang, J.: On understanding transient interdomain routing failures (2009)
35.
go back to reference Xia, J., Gao, L., Fei, T.: Flooding attacks by exploiting persistent forwarding loops. In: ACM IMC (2005) Xia, J., Gao, L., Fei, T.: Flooding attacks by exploiting persistent forwarding loops. In: ACM IMC (2005)
36.
go back to reference Xia, J., Gao, L., Fei, T.: A measurement study of persistent forwarding loops on the internet. Comput. Netw. 51, 4780–4796 (2007)CrossRef Xia, J., Gao, L., Fei, T.: A measurement study of persistent forwarding loops on the internet. Comput. Netw. 51, 4780–4796 (2007)CrossRef
37.
go back to reference Zimmermann, T., Rüth, J., Wolters, B., Hohlfeld, O.: How HTTP/2 pushes the web: an empirical study of HTTP/2 server push. In: IFIP Networking Conference (2017) Zimmermann, T., Rüth, J., Wolters, B., Hohlfeld, O.: How HTTP/2 pushes the web: an empirical study of HTTP/2 server push. In: IFIP Networking Conference (2017)
Metadata
Title
Hidden Treasures – Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane
Authors
Jan Rüth
Torsten Zimmermann
Oliver Hohlfeld
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-15986-3_4

Premium Partner