Analysis & Research

What the data tells us

Academic publications, operational findings, and field notes from years of passive observation. Our data doesn't just sit in feeds - it drives research that advances the field.

Protocol:
Dataplane.org Analysis

Deep-dive signal analysis

In-depth analyses written by the Dataplane.org team based directly on observed feed data - covering threats, countermeasures, and Internet measurement findings.

TCP FingerprintingPrivacyResearch
2023

Ephemeral Source Port Selection Strategy

An examination of how operating systems and network stacks select ephemeral source ports for outbound connections - and what the distribution of those choices reveals about host fingerprinting, NAT traversal, and privacy implications for Internet-wide scanning data.

Read analysis
SSH SecurityCountermeasuresCredentials
2022

SSH Password Authentication: Threats and Countermeasures

A comprehensive analysis of SSH password authentication threats observed across Dataplane.org sensors. Covers credential distributions, attack patterns, botnet behavior, and practical defensive countermeasures for operators protecting SSH infrastructure.

Read analysis
VNC SecurityCountermeasuresRemote Access
2022

VNC Threats and Countermeasures

Analysis of VNC (Virtual Network Computing) scanning and authentication attack patterns observed in Dataplane.org RFB signal data. Examines attack sources, authentication bypass attempts, and defensive strategies for protecting VNC deployments.

Read analysis
DNS SpoofingInvestigation
March 2024

Destination-Adjacent Source Address Spoofing

Investigation into a pattern of source-spoofed DNS queries where packets appear to originate from IPs topologically adjacent to the intended target - what the traffic looks like and what it indicates about reflector-abuse techniques.

Read analysis
RPKI BGPMeasurement
2022-2024

Aging RPKI Relying Party Clients

Examination of RPKI relying party client software versions observed fetching validation data. Analysis of which implementations are current vs. falling behind, and implications for BGP route origin validation reliability.

Read analysis
Academic Publications

Peer-reviewed research & standards

Papers, RFCs, and standards work authored or co-authored by the Dataplane.org team. Research that directly uses Dataplane.org signal data is marked with a sensor icon.

2025
USENIX Sec.
Assessing the Aftermath: the Effects of a Global Takedown against DDoS-for-hire Services
Anh V. Vu, Ben Collier, Daniel R. Thomas, John Kristoff, Richard Clayton, Alice Hutchings
USENIX Security Symposium, 2025
2024
IMC 2024
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments
Raphael Hiesgen, Marcin Nawrocki, Marinho Barcellos, Daniel Kopp, Oliver Hohlfeld, Echo Chan, Roland Dobbins, Christian Doer, Christian Rossow, Daniel R. Thomas, Mattijs Jonker, Ricky Mok, Xiapu Luo, John Kristoff, Thomas C. Schmidt, Matthias Wählisch, KC Claffy
ACM Internet Measurement Conference (IMC), 2024
FOCI 2024
Internet Sanctions on Russian Media: Actions and Effects
John Kristoff, Moritz Müller, Arturo Filastò, Max Resing, Chris Kanich, Niels ten Oever
Free and Open Communications on the Internet (FOCI), 2024
Journal
Sanctions and Infrastructural Ideologies: Assessing the Material Shaping of EU Digital Sovereignty in Response to the War in Ukraine
Niels ten Oever, Clement Perarnaud, John Kristoff, Moritz Müller, Max Resing, Arturo Filastò, Chris Kanich
Policy & Internet, 2024
2022
RFC 9210
DNS Transport over TCP - Operational Requirements (BCP 235)
John Kristoff, Duane Wessels
IETF RFC 9210 / BCP 235 • March 2022
2021
PAM 2021
Plight at the End of the Tunnel: Legacy IPv6 Transition Mechanisms in the Wild
John Kristoff, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis
Passive and Active Measurement Conference (PAM), 2021
2020
IMC 2020
On Measuring RPKI Relying Parties
John Kristoff, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer, Thomas C. Schmidt, Matthias Wählisch
ACM Internet Measurement Conference (IMC), 2020

Complete publication list at dataplane.org/jtk/publications/

Findings from the Field

What we're seeing in the data

Operational findings and signal analyses published in our newsletter - shorter-form research notes grounded in current feed data.

Year in Review Q1 2025

New NTP feeds, SSH password trends, and DNS radiation

2025 review covering newly added NTP signal feeds, an analysis of evolving SSH credential patterns, and observations of unsolicited DNS traffic reaching sensors from unexpected source ranges.

Read in newsletter
DNS Mar 2024

Source-spoofed DNS queries appearing to originate from a target's neighbor

Investigation into a pattern of source-spoofed DNS queries observed across sensors - where packets appeared to originate from IP addresses topologically adjacent to the intended target, suggesting a novel probing or reflector abuse technique.

Read investigation
SSH 2023

RPKI measurement & an SSH mystery

A dual-topic note: new findings from ongoing RPKI relying-party measurement, plus an unexpected anomaly in SSH authentication traffic that defied easy explanation - and what further investigation revealed.

Read newsletter
SSH Q4 2023

Apache Struts NETINT, and the year in SSH passwords

An analysis of observed activity following the Apache Struts exploit (NETINT) and a year-end retrospective of SSH credential data: password lengths ranged from 1 to 358 characters, with a median of 8. Top attempts included "guest," "changeme," and "raspberry."

Read newsletter
DNS Q3 2023

New DNS type-name signal and SSH id/password pair feed

Announcing two new signal feeds: dnstypename (daily DNS IN-class query types from globally diverse sensors) and sshpwauthpairs (daily SSH credential pairs observed in the wild), plus early findings from each.

Read newsletter
Year in Review 2022

2022 Year in Review: sensor expansion and data highlights

A retrospective of 2022 activity across Dataplane.org feeds, covering sensor network growth, notable traffic patterns observed across DNS, SSH, and NTP, and organizational updates including the BCP 235 RFC publication.

Read newsletter
Using Our Data

Built your research on our signals?

Dataplane.org signal feeds are freely available for academic research, operational analysis, and threat intelligence. If you've used our data in published work, we'd love to know - it helps justify continued operation and guides what we build next.

Tell us about your research Browse signal feeds
Citation guidance

When citing Dataplane.org data in academic work, please reference the organization and the specific feed(s) used, including the date range of the data.

Dataplane.org NFP. "[Feed name] signal feed."
https://dataplane.org/[feedname].txt
Accessed [date range].
# Example:
Dataplane.org NFP. "SSH password
authentication (sshpwauth) signal feed."
https://dataplane.org/sshpwauth.txt
Accessed Jan–Dec 2024.

Stay Current

New findings go to the newsletter first

Operational analysis, signal anomalies, new feed announcements, and research notes - delivered when we have something worth saying. No filler.