ant.isi.edu Open in urlscan Pro
2001:1878:401::8009:1c09  Public Scan

Submitted URL: http://pinger-w4.ant.isi.edu/
Effective URL: https://ant.isi.edu/datasets/about.html
Submission Tags: falconsandbox
Submission: On November 02 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 1.  home
 2.  about
 3.  blog
 4.  people
 5.  papers
 6.  datasets
 7.  results
 8.  software
 9.  projects
 10. events
 11. privacy


INTERNET MEASUREMENTS AT USC/ISI AND COLORADO STATE

Our work is part of a research project supported by the US Department of
Homeland Security, evaluating potential technology that may support work done at
the US FCC. As a part of .gov, we encourage you consider the potential for our
measurements to support the U.S.’s need to evaluate the reliability of the
Internet. (You may contact our program manager, Ann Cox ann.cox@hq.dhs.gov if
you wish to verify our involvement as a DHS S&T research program, or Rasoul
Safavian rasoul.safavian@fcc.gov for FCC’s interests in this potential.

To conduct this research, several machines at different sites around the world
send pings (ICMP echo request messages) to hosts and routers. These probes are
very low rate—at most once every 11 minutes per address, but more often as low
as once every few days per sub-network. We apologize for any inconvenience we
may have caused you. We probe billions of IP addresses and obtaining prior
consent is impossible. We strive to keep our data collection to the lowest rate
possible so as to not interfere with active networks.

Our messages are NOT attack traffic–we minimize how much traffic we send, and
our pings can do no harm. (If your firewall or router reported us as causing a
“ping of death” (PoD) attack, please be assured we do NOT send malformed or
over-long pings. Although PoD was a problem 1995-2000, no modern OS is affected
by them. We believe some routers (such as Belkin routers) mis-classify our pings
as this ancient attack.)


PROJECT DESCRIPTION

The goal of this research is to better understand Internet topology, determine
liveness, link delays, and assess outages. We hope that this work will improve
our understanding of Internet topology, robustness, and security. If you would
like more information about our research, a summary of the project is at
https://ant.isi.edu/ or see our video at:
https://ant.isi.edu/address/video/index.html

and you may browse our maps at http://ant.isi.edu/address/browse/index.html

Detailed technical papers about the work are at https://ant.isi.edu/papers/ with
the papers “Trinocular: Understanding Internet Reliability Through Adaptive
Probing” (http://www.isi.edu/~johnh/PAPERS/Quan13c.pdf) describing our method
and why it is low-rate, and “Evaluating Externally Visible Outages”
(http://www.isi.edu/~johnh/PAPERS/Alwabel15a.pdf) evaluting our work compared to
existing FCC measurement systems.

We go to great lengths to keep our probing traffic rates low. In most cases a
target network of 256 adjacent addresses (like 192.0.2.*) will see, on average,
only 19 64-byte probes per hour. At this rate our traffic over an entire day is
less than a single query to Google on “census” followed by going to the Census
Bureau’s front page.


OPT-OUT INFORMATION

We maintain an opt-out list and do not probe those addresses.

Before opting out, please note that experimental data is most useful when it
covers as much of the Internet as possible. Thus, we respectfully request that
you allow us include your network in our study. Rest assured that this is a
purely research project and it will never pose a security threat to your
network.

If you still want to opt-out of this project, please do the following:

 1. Determine the network block you want us to exclude. This can be in one of
    two formats: a. a prefix (e.g., 192.0.2/24) or b. a range (e.g., 192.0.2.0 -
    192.0.2.127)
 2. Please indicate if this network block is for your direct use, or for use by
    your customers. If the addresses are not for your direct use, please
    indicate why you are authorized to stop traffic to traffic to others.
 3. E-mail this information to ant-research-operators@isi.edu

We need to know your *public-facing* IP addresses. We do not probe private IPv4
addresses (10/8, 172.16/12, and 192.168/16, as specified by RFC-1918). If you
received probes on these addresses then you likely have a Network Address
Translator (NAT) with a public IP address. We need that public address (not the
private addresses) to put on our opt-out list.

Note: for your convenience, your IP address while accessing this site is:

Please allow at least one business day for your addresses to be added to the
exclude list and for probing to cease.


OPT-IN INFORMATION

If you wish to “opt-in” and whitelist our probing machines to access your sites,
please contact us and we can provide you the information you will need.

Please let us know if we can be of further assistance.

Thank you,

The ANT project team (https://ant.isi.edu) at USC/ISI and Colorado State
University, with hosting help from Keio University/WIDE and Athens University of
Economics and Business