This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1092
Heartbleed Vulnerability
External Dataset
External Data Source
Internet-Wide Scan Data Repository
Unknown
Unknown
55 (lowest rank is 55)

Category & Restrictions

Other
unsolicited emails, application layer security, honeypots, network data, address space status data
Unrestricted
Unknown

Description


Regular daily scans of IPv4 and the Alexa Top 1 Million domains on HTTPS and SMTP+StartTLS for the Heartbleed vulnerability.

This dataset is composed of five scan collections: https-full, https-samples, https-alexa, smtp-alexa, and smtp-samples, and PCAPs of the attacks we observed at an Amazon EC2 honeypot. The scan files contain parsed TLS handshakes as well as heartbeat support and heartbleed vulnerability status. All files are in JSON format; an example record can be seen in sample.json. Our scan methodology is described in detail in the study listed above. The banner grab tool we used for all experiments is available at https://github.com/zmap/zgrab . Full HTTPS scans cover the public IPv4 address space excluding networks that have requested removal from University of Michigan network studies. Samples are composed of 1% scans of the public IPv4 address space (addresses selected using ZMap's randomization algorithm). ; hearbleed-team@umuch.edu

Additional Details

N/A
false
false
internet mail protocols, universities and colleges in michigan, heartbleed, spamming, public university systems in the united states, cryptographic protocol, communication protocol, application layer protocols, data serialization formats, transport layer security, external data source, address space, ipv4, computer architecture, json, internet protocol, flagship universities in the united states, university of michigan, communication, email, uniform resource identifier, github, hypertext transfer protocol, simple mail transfer protocol, heartbeat network, inferlink corporation, internet security, big ten conference schools, opportunistic tls, public universities in michigan, 1092, secure communication, amazon, honeypot, history of computing, schools of public health in the united states, heartbleed vulnerability