[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

ShamFinder: An automated framework for detecting IDN homographs

H Suzuki, D Chiba, Y Yoneya, T Mori… - Proceedings of the Internet …, 2019 - dl.acm.org
The internationalized domain name (IDN) is a mechanism that enables us to use Unicode
characters in domain names. The set of Unicode characters contains several pairs of …

Assessing browser-level defense against {IDN-based} phishing

H Hu, STK Jan, Y Wang, G Wang - 30th USENIX Security Symposium …, 2021 - usenix.org
Internationalized Domain Names (IDN) allow people around the world to use their native
languages for domain names. Unfortunately, because characters from different languages …

Unravelling ariadne's thread: Exploring the threats of decentralised dns

C Patsakis, F Casino, N Lykousas, V Katos - IEEE Access, 2020 - ieeexplore.ieee.org
The current landscape of the core Internet technologies shows considerable centralisation
with the big tech companies controlling the vast majority of traffic and services. This situation …

PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names

T Koide, N Fukushi, H Nakano, D Chiba - Proceedings of the 39th …, 2023 - dl.acm.org
Domain squatting is a technique used by attackers to create domain names for phishing
sites. In recent phishing attempts, we have observed many domain names that use multiple …

Be the phisher--understanding users' perception of malicious domains

F Quinkert, M Degeling, J Blythe, T Holz - Proceedings of the 15th ACM …, 2020 - dl.acm.org
Attackers use various domain squatting techniques to convince users that their services are
legitimate. Previous work has shown that methods liketyposquatting, where single …

PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network

M Wang, X Zang, J Cao, B Zhang, S Li - Computers & Security, 2024 - Elsevier
Phishing is one of the significant threats to cybersecurity today, especially when attackers
create Internationalized Domain Names (IDN) homographs to engage in phishing activities …

A case of identity: Detection of suspicious IDN homograph domains using active DNS measurements

R Yazdani, O van der Toorn… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
The possibility to include Unicode characters in domain names allows users to deal with
domains in their regional languages. This is done by introducing Internationalized Domain …

SoK: a framework for asset discovery: systematizing advances in network measurements for protecting organizations

M Vermeer, J West, A Cuevas, S Niu… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Asset discovery is fundamental to any organization's cybersecurity efforts. Indeed, one must
accurately know which assets belong to an IT infrastructure before the infrastructure can be …