Network telescope (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Network telescope" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
11th place
8th place
5,990th place
3,752nd place
5,893rd place
3,320th place
102nd place
76th place
2,224th place
1,900th place
low place
low place
3rd place
3rd place
low place
low place
low place
low place
low place
low place
415th place
327th place
5,099th place
3,425th place
low place
low place

akamai.com (Global: low place; English: low place)

  • Belson, David, ed. (2009-07-09). "Conficker" (PDF). Security. The State of the Internet. Vol. 2, no. 1. Akamai Technologies. p. 8. Archived (PDF) from the original on 2016-10-25. Retrieved 2019-07-29. corroborated by similar drops in observed by CAIDA's UCSD Network Telescope, which serves a function similar to the set of Akamai servers that collect attack traffic data.

books.google.com (Global: 3rd place; English: 3rd place)

  • Le Malécot, Erwan; Inoue, Daisuke (20 Mar 2014). Danger, Jean Luc; Debbabi, Mourad; Marion, Jean-Yves; Garcia-Alfaro, Joaquin; Heywood, Nur Zincir (eds.). The Carna Botnet Through the Lens of a Network Telescope. Foundations and Practice of Security: 6th International Symposium. La Rochelle, France. p. 427. ISBN 9783319053028. "network telescope that we operate presently amounts to approximately 210 thousand unused IPv4 addresses spread over the networks of a number of partner organizations (located in Japan and aboard). Those unused addresses form darknets ranging in size from a few addresses to whole /16 subnets ... the notion of a "greynet" ... composed of a mixture of used and unused IP addresses

caida.org (Global: low place; English: low place)

doi.org (Global: 2nd place; English: 2nd place)

ethz.ch (Global: 2,224th place; English: 1,900th place)

disco.ethz.ch

  • Wustrow, Eric; Karir, Manish; Bailey, Michael; Jahanian, Farnam; Houston, Geoff (2010-06-09). Internet Background Radiation Revisited (PDF). Internet Measurement Conference. Archived (PDF) from the original on 2024-01-11. Retrieved 2019-07-24. Systems that monitor unused address spaces have a variety of names, including darknets, network telescopes, blackhole monitors, network sinks, and network motion sensors. ... 1/8 ... 50/8 ... 107/8 ... 35/8

figshare.com (Global: 5,893rd place; English: 3,320th place)

handle.net (Global: 102nd place; English: 76th place)

hdl.handle.net

impactcybertrust.org (Global: low place; English: low place)

  • Merit Network. "Longitudinal Darknet 35/8". Blackhole Address Space Data, flowtuple. IMPACT Cybertrust. in the case of a TCP SYN flood attack with a spoofed source IP, the victim will reply with a TCP SYN-ACK to the spoofed IP; if the spoofed IP happened to be within the 35/8 address space, our darknet will capture the SYN-ACK replies ... Collection Starting: [2005-10-05]; ... Data collection is ongoing ... Size: 18.2TB Size is growing as more data is collected[permanent dead link]

jhalderm.com (Global: low place; English: low place)

mit.edu (Global: 415th place; English: 327th place)

people.csail.mit.edu

ripe.net (Global: low place; English: low place)

labs.ripe.net

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

tcd.ie (Global: 5,099th place; English: 3,425th place)

scss.tcd.ie

usenix.org (Global: 5,990th place; English: 3,752nd place)

  • Cheswick, Bill (August 2013). "Bill Cheswick on Firewalls" (PDF). Security. ;login: The USENIX Magazine (Interview). Vol. 38, no. 4. Interviewed by Rik Farrow. p. 21. Archived (PDF) from the original on 2024-02-09. Retrieved 2019-07-31. about this time (late 1980s) Mark Horton obtained a class A address for AT&T from the powers-that-be by simply asking. ... our Cray computer seemed to require a class A network ... took 12.0.0.0/8 and announced it to the Net, feeding the packets to a non-existent Ethernet address and running tcpdump on the traffic, which came to about 12 to 25 MB/day. Steve analyzed that traffic and wrote a fine paper. Basically, we were watching the death screams of attacked hosts that used IP address-based authentication. ... This is the first packet telescope I can remember, and I think I might even have coined the term "packet telescope," but my memory is fuzzy on that.

web.archive.org (Global: 1st place; English: 1st place)

  • Cheswick, Bill (August 2013). "Bill Cheswick on Firewalls" (PDF). Security. ;login: The USENIX Magazine (Interview). Vol. 38, no. 4. Interviewed by Rik Farrow. p. 21. Archived (PDF) from the original on 2024-02-09. Retrieved 2019-07-31. about this time (late 1980s) Mark Horton obtained a class A address for AT&T from the powers-that-be by simply asking. ... our Cray computer seemed to require a class A network ... took 12.0.0.0/8 and announced it to the Net, feeding the packets to a non-existent Ethernet address and running tcpdump on the traffic, which came to about 12 to 25 MB/day. Steve analyzed that traffic and wrote a fine paper. Basically, we were watching the death screams of attacked hosts that used IP address-based authentication. ... This is the first packet telescope I can remember, and I think I might even have coined the term "packet telescope," but my memory is fuzzy on that.
  • Wustrow, Eric; Karir, Manish; Bailey, Michael; Jahanian, Farnam; Houston, Geoff (2010-06-09). Internet Background Radiation Revisited (PDF). Internet Measurement Conference. Archived (PDF) from the original on 2024-01-11. Retrieved 2019-07-24. Systems that monitor unused address spaces have a variety of names, including darknets, network telescopes, blackhole monitors, network sinks, and network motion sensors. ... 1/8 ... 50/8 ... 107/8 ... 35/8
  • Moore, David; Shannon, Colleen; Voelker, Geoffrey M.; Savage, Stefan (April 2004). "Network Telescopes: Technical Report" (PDF). Technical Reports. Archived (PDF) from the original on 2021-02-25. Retrieved 2019-07-27. network telescopes were named as an analogy to astronomical telescopes, ... driven by the comparison of packets arriving in a portion of address space to photons arriving in the aperture of a light telescope. ... a larger aperture increases the resolution of objects by providing more positional detail; with network telescopes, having a larger address space increases the resolution of events by providing more time detail. ... to observe one or more packets from a Code-Red-like host on a /8 with 99.999% probability requires 4.9 minutes. ... Even if the attack lasted 5 minutes, there is only a 89.9% chance that a /16 telescope would see at least 1 packet. ... thank Brian Kantor, Jim Madden, and Pat Wilson of UCSD for technical support of the Network Telescope project. ... Support for this work is provided by NSF Trusted Computing Grant CCR-0311690, Cisco Systems University Research Program, DARPA FTN Contract N66001-01-1-8933, NSF Grant ANI-0221172, National Institute of Standards Grant 60NANB1D0118, and a generous gift from AT&T.
  • Durumeric, Zakir; Bailey, Michael; Halderman, J. Alex; University of Michigan (2014-08-08). An Internet-Wide View of Internet-Wide Scanning (PDF). USENIX Security Symposium. Archived (PDF) from the original on 2018-06-26. Retrieved 2019-07-30. darknet operated at Merit Network for the period from [2013-01-01] to [2014-05-01]. ... 5.5 million addresses, ... 1.4 billion packets, or 55 GB of traffic, per day.
  • Belson, David, ed. (2009-07-09). "Conficker" (PDF). Security. The State of the Internet. Vol. 2, no. 1. Akamai Technologies. p. 8. Archived (PDF) from the original on 2016-10-25. Retrieved 2019-07-29. corroborated by similar drops in observed by CAIDA's UCSD Network Telescope, which serves a function similar to the set of Akamai servers that collect attack traffic data.
  • Richter, Philipp; Berger, Arthur (July 2019). Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope. ACM Internet Measurement Conference. Amsterdam, Netherlands. Archived from the original on 2019-07-29. Retrieved 2019-07-29.
  • O'Hara, Joseph (April 2019). "Cloud-based network telescope for Internet background radiation collection" (PDF). Trinity College Dublin. p. 16. Archived (PDF) from the original on 2022-12-05. Retrieved 2019-07-29. Thank you to Eoin Kenny from HEAnet ... A traditional /16 network telescope was provided by HEAnet, Ireland's National Education and Research Network. ... /16 address space had been unused for a number of years before this research ... 256 times smaller than the CAIDA /8 ... recorded data rate was 1.25Mbps ... 95.6GB
  • Aben, Emile (2020-01-17). "The Debogonisation of 2a10::/12". Archived from the original on 2024-01-11. Retrieved 2022-01-12.