{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:08:01Z","timestamp":1776398881757,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100004439","name":"William and Flora Hewlett Foundation","doi-asserted-by":"publisher","award":["2014-1601"],"award-info":[{"award-number":["2014-1601"]}],"id":[{"id":"10.13039\/100004439","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3355369.3355595","type":"proceedings-article","created":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T12:57:15Z","timestamp":1571403435000},"page":"144-157","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["Scanning the Scanners"],"prefix":"10.1145","author":[{"given":"Philipp","family":"Richter","sequence":"first","affiliation":[{"name":"MIT \/ Akamai"}]},{"given":"Arthur","family":"Berger","sequence":"additional","affiliation":[{"name":"Akamai \/ MIT"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Best Practices and Considerations in Egress Filtering. https:\/\/insights.sei.cmu.edu\/sei_blog\/2018\/04\/best-practices-and-considerations-in-egress-filtering.html.  Best Practices and Considerations in Egress Filtering. https:\/\/insights.sei.cmu.edu\/sei_blog\/2018\/04\/best-practices-and-considerations-in-egress-filtering.html."},{"key":"e_1_3_2_1_2_1","unstructured":"CAIDA UCSD Real-time Network Telescope Data. Available via IMPACT dataset ID DS-0206. http:\/\/www.caida.org\/data\/passive\/telescope-near-real-time_dataset.xml.  CAIDA UCSD Real-time Network Telescope Data. Available via IMPACT dataset ID DS-0206. http:\/\/www.caida.org\/data\/passive\/telescope-near-real-time_dataset.xml."},{"key":"e_1_3_2_1_3_1","unstructured":"Netlab 360: Quick summary about the Port 8291 scan. https:\/\/blog.netlab.360.com\/quick-summary-port-8291-scan-en\/.  Netlab 360: Quick summary about the Port 8291 scan. https:\/\/blog.netlab.360.com\/quick-summary-port-8291-scan-en\/."},{"key":"e_1_3_2_1_4_1","unstructured":"SANS ISC InfoSec Forums: IPSEC \/ ISAKMP Vulnerability wrapup. https:\/\/isc.sans.edu\/forums\/diary\/IPSEC+ISAKMP+Vulnerability+wrapup\/852.  SANS ISC InfoSec Forums: IPSEC \/ ISAKMP Vulnerability wrapup. https:\/\/isc.sans.edu\/forums\/diary\/IPSEC+ISAKMP+Vulnerability+wrapup\/852."},{"key":"e_1_3_2_1_5_1","unstructured":"Why would a Windows machine scan for port 137? https:\/\/superuser.com\/questions\/1306406\/why-would-a-windows-machine-scan-for-port-137.  Why would a Windows machine scan for port 137? https:\/\/superuser.com\/questions\/1306406\/why-would-a-windows-machine-scan-for-port-137."},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX WOOT","author":"Adrian D.","year":"2014","unstructured":"D. Adrian , Z. Durumeric , G. Singh , and A. Halderman . Zippier Zmap: Wnternet-wide Scanning at 10 Gbps . In USENIX WOOT , 2014 . D. Adrian, Z. Durumeric, G. Singh, and A. Halderman. Zippier Zmap: Wnternet-wide Scanning at 10 Gbps. In USENIX WOOT, 2014."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298316"},{"key":"e_1_3_2_1_8_1","volume-title":"Understanding the Mirai Botnet. In USENIX Security Symposium","author":"Antonakakis M.","year":"2017","unstructured":"M. Antonakakis , T. April , M. Bailey , M. Bernhard , E. Bursztein , J. Cochran , Z. Durumeric , J. A. Halderman , L. Invernizzi , M. Kallitsis , D. Kumar , C. Lever , Z. Ma , J. Mason , D. Menscher , C. Seaman , N. Sullivan , K. Thomas , and Y. Zhou . Understanding the Mirai Botnet. In USENIX Security Symposium , 2017 . M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou. Understanding the Mirai Botnet. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_9_1","volume-title":"Scanning the Internet for Liveness. ACM CCR, 48(2)","author":"Bano S.","year":"2018","unstructured":"S. Bano , P. Richter , M. Javed , S. Sundaresan , Z. Durumeric , S. Murdoch , R. Mortier , and V. Paxson . Scanning the Internet for Liveness. ACM CCR, 48(2) , 2018 . S. Bano, P. Richter, M. Javed, S. Sundaresan, Z. Durumeric, S. Murdoch, R. Mortier, and V. Paxson. Scanning the Internet for Liveness. ACM CCR, 48(2), 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815702"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098985"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663717"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504732"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567561.2567568"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2559218"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2297678"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_1_18_1","volume-title":"An Internet-Wide View of Internet-Wide Scanning. In USENIX Security Symposium","author":"Durumeric Z.","year":"2014","unstructured":"Z. Durumeric , M. Bailey , and A. Halderman . An Internet-Wide View of Internet-Wide Scanning. In USENIX Security Symposium , 2014 . Z. Durumeric, M. Bailey, and A. Halderman. An Internet-Wide View of Internet-Wide Scanning. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security Symposium","author":"Durumeric Z.","year":"2013","unstructured":"Z. Durumeric , E. Wustrow , and J. A. Halderman . ZMap: Fast Internet-Wide Scanning and its Security Applications . In USENIX Security Symposium , 2013 . Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast Internet-Wide Scanning and its Security Applications. In USENIX Security Symposium, 2013."},{"key":"e_1_3_2_1_22_1","volume-title":"ACM IMC","author":"Glatz E.","year":"2012","unstructured":"E. Glatz and X. Dimitropoulos . Classifying Internet One-way Traffic . In ACM IMC , 2012 . E. Glatz and X. Dimitropoulos. Classifying Internet One-way Traffic. In ACM IMC, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23488"},{"key":"e_1_3_2_1_24_1","volume-title":"Reducing the Impact of Amplification DDoS Attacks. In USENIX Security Symposium","author":"K\u00fchrer M.","year":"2014","unstructured":"M. K\u00fchrer , T. Hupperich , C. Rossow , and T. Holz . Exit from Hell ? Reducing the Impact of Amplification DDoS Attacks. In USENIX Security Symposium , 2014 . M. K\u00fchrer, T. Hupperich, C. Rossow, and T. Holz. Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_25_1","volume-title":"Information Systems Research","author":"Lin M.","year":"2013","unstructured":"M. Lin , H. Lucas , and G. Shmueli . Too big to fail: Large samples and the p-value problem . Information Systems Research , 24, December 2013 . M. Lin, H. Lucas, and G. Shmueli. Too big to fail: Large samples and the p-value problem. Information Systems Research, 24, December 2013."},{"key":"e_1_3_2_1_26_1","unstructured":"NIST. CVE-2016-10372 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-10372.  NIST. CVE-2016-10372 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-10372."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"NIST. CVE-2018-14847 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-14847.  NIST. CVE-2018-14847 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-14847.","DOI":"10.5465\/AMBPP.2018.303"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663756"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987473"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2874896"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_8"}],"event":{"name":"IMC '19: ACM Internet Measurement Conference","location":"Amsterdam Netherlands","acronym":"IMC '19","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:33Z","timestamp":1750202613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355595"}},"subtitle":["Sensing the Internet from a Massively Distributed Network Telescope"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":33,"alternative-id":["10.1145\/3355369.3355595","10.1145\/3355369"],"URL":"https:\/\/doi.org\/10.1145\/3355369.3355595","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}