Skip to main content

Showing 1–13 of 13 results for author: Nawrocki, M

Searching in archive cs. Search in all archives.
.
  1. ReACKed QUICer: Measuring the Performance of Instant Acknowledgments in QUIC Handshakes

    Authors: Jonas Mücke, Marcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we present a detailed performance analysis of QUIC instant ACK, a standard-compliant approach to reduce waiting times during the QUIC connection setup in common CDN deployments. To understand the root causes of the performance properties, we combine numerical analysis and the emulation of eight QUIC implementations using the QUIC Interop Runner. Our experiments comprehensively cover… ▽ More

    Submitted 27 October, 2024; originally announced October 2024.

    Comments: camera-ready

    Journal ref: Proceedings of ACM Internet Measurement Conference (IMC), 2024

  2. The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments

    Authors: Raphael Hiesgen, Marcin Nawrocki, Marinho Barcellos, Daniel Kopp, Oliver Hohlfeld, Echo Chan, Roland Dobbins, Christian Doerr, Christian Rossow, Daniel R. Thomas, Mattijs Jonker, Ricky Mok, Xiapu Luo, John Kristoff, Thomas C. Schmidt, Matthias Wählisch, kc claffy

    Abstract: Motivated by the impressive but diffuse scope of DDoS research and reporting, we undertake a multistakeholder (joint industry-academic) analysis to seek convergence across the best available macroscopic views of the relative trends in two dominant classes of attacks - direct-path attacks and reflection-amplification attacks. We first analyze 24 industry reports to extract trends and (in)consistenc… ▽ More

    Submitted 21 October, 2024; v1 submitted 15 October, 2024; originally announced October 2024.

    Comments: camera-ready

    Journal ref: Proceedings of ACM Internet Measurement Conference (IMC), 2024

  3. SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots

    Authors: Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and data analysis including cautious threshold inference. We survey common amplification honeypot platforms as well as the underlying methods to infer attack detection thresholds and to extract knowledge from the data. By systematical… ▽ More

    Submitted 24 April, 2023; v1 submitted 9 February, 2023; originally announced February 2023.

    Comments: camera-ready

    Journal ref: Proceedings of the IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023

  4. On the Interplay between TLS Certificates and QUIC Performance

    Authors: Marcin Nawrocki, Pouyan Fotouhi Tehrani, Raphael Hiesgen, Jonas Mücke, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we revisit the performance of the QUIC connection setup and relate the design choices for fast and secure connections to common Web deployments. We analyze over 1M Web domains with 272k QUIC-enabled services and find two worrying results. First, current practices of creating, providing, and fetching Web certificates undermine reduced round trip times during the connection setup sinc… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: camera-ready

    Journal ref: Proc. of 18th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), pp. 204--213, New York, NY, USA: ACM, 2022

  5. arXiv:2209.00965  [pdf, other

    cs.NI

    Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments

    Authors: Jonas Mücke, Marcin Nawrocki, Raphael Hiesgen, Patrick Sattler, Johannes Zirngibl, Georg Carle, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we study the potentials of passive measurements to gain advanced knowledge about QUIC deployments. By analyzing one month backscatter traffic of the /9 CAIDA network telescope, we are able to make the following observations. First, we can identify different off-net deployments of hypergiants, using packet features such as QUIC source connection IDs (SCID), packet coalescence, and pa… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: preprint

  6. arXiv:2207.07486  [pdf, other

    cs.NI cs.CR

    Securing name resolution in the IoT: DNS over CoAP

    Authors: Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we present the design, implementation, and analysis of DNS over CoAP (DoC), a new proposal for secure and privacy-friendly name resolution of constrained IoT devices. We implement different design choices of DoC in RIOT, an open-source operating system for the IoT, evaluate performance measures in a testbed, compare with DNS over UDP and DNS over DTLS, and validate our protocol desi… ▽ More

    Submitted 27 July, 2023; v1 submitted 15 July, 2022; originally announced July 2022.

    Comments: 25 pages, 15 figures, 6 tables; presented at CoNEXT 2023

    Journal ref: Proceedings of the ACM on Networking (PACMNET), Vol. 1, CoNEXT2, Article 6 (September 2023), 25 pages

  7. arXiv:2205.02544  [pdf, other

    cs.CR

    The Race to the Vulnerable: Measuring the Log4j Shell Incident

    Authors: Raphael Hiesgen, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch

    Abstract: The critical remote-code-execution (RCE) Log4Shell is a severe vulnerability that was disclosed to the public on December 10, 2021. It exploits a bug in the wide-spread Log4j library. Any service that uses the library and exposes an interface to the Internet is potentially vulnerable. In this paper, we measure the rush of scanners during the two months after the disclosure. We use several vantag… ▽ More

    Submitted 7 June, 2022; v1 submitted 5 May, 2022; originally announced May 2022.

    Comments: Proc. of Network Traffic Measurement and Analysis Conference (TMA '22), camera ready

  8. arXiv:2110.05160  [pdf, other

    cs.CR cs.NI

    Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope

    Authors: Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Large-scale Internet scans are a common method to identify victims of a specific attack. Stateless scanning like in ZMap has been established as an efficient approach to probing at Internet scale. Stateless scans, however, need a second phase to perform the attack, which remains invisible to network telescopes that only capture the first incoming packet and is not observed as a related event by ho… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

    Comments: Proc. of 31st USENIX Security Symposium, camera-ready

  9. Transparent Forwarders: An Unnoticed Component of the Open DNS Infrastructure

    Authors: Marcin Nawrocki, Maynard Koch, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we revisit the open DNS (ODNS) infrastructure and, for the first time, systematically measure and analyze transparent forwarders, DNS components that transparently relay between stub resolvers and recursive resolvers. Our key findings include four takeaways. First, transparent forwarders contribute 26% (563k) to the current ODNS infrastructure. Unfortunately, common periodic scannin… ▽ More

    Submitted 4 November, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: Proc. of ACM CoNEXT'21, camera-ready

  10. QUICsand: Quantifying QUIC Reconnaissance Scans and DoS Flooding Events

    Authors: Marcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we present first measurements of Internet background radiation originating from the emerging transport protocol QUIC. Our analysis is based on the UCSD network telescope, correlated with active measurements. We find that research projects dominate the QUIC scanning ecosystem but also discover traffic from non-benign sources. We argue that although QUIC has been carefully designed to… ▽ More

    Submitted 5 October, 2021; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: Proc. of ACM IMC'21, camera-ready

  11. The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core

    Authors: Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we shed new light on the DNS amplification ecosystem, by studying complementary data sources, bolstered by orthogonal methodologies. First, we introduce a passive attack detection method for the Internet core, i.e., at Internet eXchange Points (IXPs). Surprisingly, IXPs and honeypots observe mostly disjoint sets of attacks: 96% of IXP-inferred attacks were invisible to a sizable hon… ▽ More

    Submitted 6 October, 2021; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: Proc. of ACM IMC'21, camera-ready

  12. arXiv:1901.04411  [pdf, other

    cs.NI cs.CR

    Uncovering Vulnerable Industrial Control Systems from the Internet Core

    Authors: Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.… ▽ More

    Submitted 23 April, 2020; v1 submitted 14 January, 2019; originally announced January 2019.

    Journal ref: Proceedings of 17th IEEE/IFIP Network Operations and Management Symposium (NOMS), 2020

  13. arXiv:1608.06249  [pdf, other

    cs.CR cs.NI

    A Survey on Honeypot Software and Data Analysis

    Authors: Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder

    Abstract: In this survey, we give an extensive overview on honeypots. This includes not only honeypot software but also methodologies to analyse honeypot data.

    Submitted 22 August, 2016; originally announced August 2016.

    ACM Class: C.2.0; C.2.2; C.2.3; C.2.6; D.4.6; K.6.5