Award Abstract # 1518921
TWC: TTP Option: Large: Collaborative: Internet-Wide Vulnerability Measurement, Assessment, and Notification

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: INTERNATIONAL COMPUTER SCIENCE INSTITUTE
Initial Amendment Date: July 1, 2015
Latest Amendment Date: September 15, 2019
Award Number: 1518921
Award Instrument: Continuing Grant
Program Manager: Daniela Oliveira
doliveir@nsf.gov
 (703)292-0000
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2015
End Date: August 31, 2021 (Estimated)
Total Intended Award Amount: $619,985.00
Total Awarded Amount to Date: $619,985.00
Funds Obligated to Date: FY 2015 = $133,155.00
FY 2016 = $103,341.00

FY 2017 = $147,410.00

FY 2018 = $236,079.00
History of Investigator:
  • Mark Allman (Principal Investigator)
    mallman@icir.org
  • Vern Paxson (Former Principal Investigator)
Recipient Sponsored Research Office: International Computer Science Institute
2150 SHATTUCK AVE
BERKELEY
CA  US  94704-1345
(510)666-2900
Sponsor Congressional District: 12
Primary Place of Performance: International Computer Science Institute
CA  US  94704-1159
Primary Place of Performance
Congressional District:
12
Unique Entity Identifier (UEI): GSRMP1QCXU74
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001516DB NSF RESEARCH & RELATED ACTIVIT
01001617DB NSF RESEARCH & RELATED ACTIVIT

01001718DB NSF RESEARCH & RELATED ACTIVIT

01001819DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 7434, 7925, 9102
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

This project aims to reduce the impact of software vulnerabilities in Internet-connected systems by developing data-driven techniques for vulnerability measurement, assessment, and notification. Recent advances in Internet-wide scanning make it possible to conduct network surveys of the full public IPv4 address space in minutes. These advances, in turn, offer the promise of truly effective community responses: when new vulnerabilities are announced, the Internet security community can comprehensively identify the systems that suffer from these vulnerabilities and automatically take steps to help affected system operators correct the problems. This project seeks to directly impact the availability and reliability of the Internet and provide the security community with tools, platforms, and comprehensive vulnerability measurement data.

To achieve this vision, this project develops new techniques for vulnerability measurement, including creating improved security measurement techniques that function at global scale, in the presence of heterogeneous network systems, and in a timely, accurate, complete, and ethical manner. The investigators create new vulnerability assessment methods that lower the barriers faced by researchers seeking to access and analyze vulnerability measurement data, in order to maximize security benefits. The project explores new notification mechanisms that achieve targeted and effective notification of affected organizations, and that can be delivered and acted upon quickly in response to the emergence of new threats.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Austin Murdock, Frank Li, Paul Bramsen, Zakir Durumeric, Vern Paxson "Target Generation for IPv6 Scanning" Proceedings of the ACM Internet Measurement Conference , 2017
F. Li, G. Ho, E. Kuan, Y. Niu, L. Ballard, K. Thomas, E. Bursztein, and V. Paxson "Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension" Proceedings of the 25th World Wide Web Conference , 2016
Frank Li and Vern Paxson "A Large-Scale Empirical Study of Security Patches" Proceedings of ACM Computer and Communications Security (CCS) , 2017
Frank Li and Vern Paxson "A Large-Scale Empirical Study of Security Patches" USENIX ;login: , v.43 , 2018
Shehar Bano, Philipp Richter, Mobin Javed, Srikanth Sundaresan, Zakir Durumeric, Steven Murdoch, Richard Mortier, and Vern Paxson "Scanning the Internet for Liveness" ACM SIGCOMM Computer Communication Review , v.48 , 2018

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Advances in Internet-wide scanning make it possible to conductnetwork surveys of the full public IPv4 address space in minutes.In this project, we leverage and expand on this capability todiscover the breadth of Internet security issues as suchvulnerabilities are discovered.  Our work breaks down into threebasic categories, as follows.


Methodology: We built on the basic ZMap technique and tool that canscan the entire IPv4 Internet in minutes.  We built the Censyssystem which systematically captures a large number of continuousZMap scans and provides a ready query interface such thatresearchers can readily analyze the significant amount of data scansgenerate.  Further, we conducted some of the first IPv6 scanningwork.  Since the IPv6 address space is so immense it cannot becomprehensively scanned.  We developed methods to generate so-called"hit lists" of in-use IPv6 addresses that could then be scanned andshowed our methods were reasonable comprehensive of the portions ofthe IPv6 address space being used.  

Vulnerability Scans: The next portion of our project used the abovemethodological advances to both show their efficacy and highlightcurrent security issues on the Internet.  For instance, in oneproject we studied the prevalence of HTTPS interception.  WhileHTTPS is meant to be cryptographically secure interceptors canhijack certain portions of the transmission to gain access to theentire data stream.  Our ability to measure the entire Internetallowed us to find this behavior to be much more prevalent thanpreviously thought (happening in 4--11% of the sessions).  Welikewise were able to shed light on security issues involvingeverything from old and forgotten protocols (e.g., FTP) to emergingthreats (e.g., the Mirai botnet as it was discovered).  We were alsoable to use our techniques to better understand the use andprevalence of a diverse set of network components, such as SCADA(industrial control systems) devices and censorship systems.

Notifications: A final aspect of the project was studying how wemight better effect patching of vulnerable systems and networks.  Wefound that directly communicating with operators such as webmasterswas fairly effective at getting many vulnerabilities fixed (around50%).  Additionally, we found that browser alerts aimed at informingusers of vulnerabilities resulted in faster action on the part ofoperators.

 


Last Modified: 02/17/2022
Modified by: Mark Allman

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page