Carna botnet: Difference between revisions
mNo edit summary |
Someone had misspelled Internet. |
||
Line 74: | Line 74: | ||
==External links== |
==External links== |
||
* [http://internetcensus2012.bitbucket.org/paper.html Internet Census 2012: Port scanning /0 using insecure embedded devices], Carna Botnet, June — October 2012 |
* [http://internetcensus2012.bitbucket.org/paper.html Internet Census 2012: Port scanning /0 using insecure embedded devices], Carna Botnet, June — October 2012 |
||
* All of the data can be found on [http://internetcensus2012.github.io/InternetCensus2012/ GitHub], [http://internetcensus2012.bitbucket.org/paper.html BitBucket], [http://census2012.sourceforge.net/paper.html SourceForge], and [ |
* All of the data can be found on [http://internetcensus2012.github.io/InternetCensus2012/ GitHub], [http://internetcensus2012.bitbucket.org/paper.html BitBucket], [http://census2012.sourceforge.net/paper.html SourceForge], and [[iarchive:Carna_Internet_Census|Internet Archive]]. |
||
{{IoT Malware}} |
{{IoT Malware}} |
Revision as of 15:07, 15 January 2017
The Carna botnet was a botnet of 420,000 devices created by an anonymous hacker to measure the extent of the Internet in what the creator called the “Internet Census of 2012”.
Data collection
The data was collected by infiltrating Internet devices, especially routers, that used a default password or no password at all.[1][2] It was named after Carna, "the Roman goddess for the protection of inner organs and health".[3]
It was compiled into a GIF portrait to display Internet use around the world over the course of 24 hours. The data gathered included only the IPv4 address space and not the IPv6 address space.[4][5]
The Carna Botnet creator believes that with a growing number of IPv6 hosts on the Internet, 2012 may have been the last time a census like this was possible.[3]
Results
Of the 4.3 billion possible IPv4 addresses, Carna Botnet found a total of 1.3 billion addresses in use, including 141 million that were behind a firewall and 729 million that returned reverse domain name system records. The remaining 2.3 billion IPv4 addresses are probably not used.[3][6]
An earlier first Internet census by the USDHS LANDER-study had counted 187 million visible Internet hosts in 2006.[7][8]
Number of hosts by top level domain
Amongst other, Carna Botnet counted the number of hosts with reverse DNS names observed from May to October 2012. The top 20 Top Level Domains were:
Number of hosts[9] | Top Level Domain |
---|---|
374,670,873 | .net |
199,029,228 | .com |
75,612,578 | .jp |
28,059,515 | .it |
28,026,059 | .br |
21,415,524 | .de |
20,552,228 | .cn |
17,450,093 | .fr |
17,363,363 | .au |
17,296,801 | .ru |
16,910,153 | .mx |
14,416,783 | .pl |
14,409,280 | .nl |
13,702,339 | .edu |
11,915,681 | .ar |
9,157,824 | .ca |
8,937,159 | .uk |
7,452,888 | .se |
7,243,480 | .tr |
6,878,625 | .in |
See also
References
- ^ Stöcker, Christian; Horchert, Judith (2013-03-22). "Mapping the Internet: A Hacker's Secret Internet Census". Spiegel Online.
- ^ Kleinman, Alexis (2013-03-22). "The Most Detailed, GIF-Based Map Of The Internet Was Made By Hacking 420,000 Computers". Huffington Post.
- ^ a b c Internet Census 2012: Port scanning /0 using insecure embedded devices, Carna Botnet, June - Oktober 2012
- ^ Read, Max (2013-03-21). "This Illegally Made, Incredibly Mesmerizing Animated GIF Is What the Internet Looks Like". Gawker. Archived from the original on 2013-03-24.
{{cite news}}
: Unknown parameter|deadurl=
ignored (|url-status=
suggested) (help) - ^ Thomson, Iain (2013-03-19). "Researcher sets up illegal 420,000 node botnet for IPv4 internet map". The Register.
- ^ Guerilla researcher created epic botnet to scan billions of IP addresses With 9TB of data, survey is one of the most exhaustive — and illicit — ever done. by Dan Goodin, arstechnica, Mar 20, 2013
- ^ Exploring Visible Internet Hosts through Census and Survey ("LANDER" study) by John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Joseph Bannister. USC/ISI Technical Report ISI-TR-2007-640. see also http://www.isi.edu/ant/address/ and video
- ^ Forschung mit illegalem Botnetz: Die Vermessung des Internets Christian Stöcker, Judith Horchert, Der Spiegel, 21.03.2013
- ^ Top Level Domains. Internet Census 2012
External links
- Internet Census 2012: Port scanning /0 using insecure embedded devices, Carna Botnet, June — October 2012
- All of the data can be found on GitHub, BitBucket, SourceForge, and Internet Archive.