Internet-scale insecurity of consumer internet of things: An empirical measurements perspective

A Mangino, MS Pour, E Bou-Harb - ACM Transactions on Management …, 2020 - dl.acm.org
The number of Internet-of-Things (IoT) devices actively communicating across the Internet is
continually increasing, as these devices are deployed across a variety of sectors, constantly …

i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis

L Gioacchini, L Vassio, M Mellia, I Drago… - ACM Transactions on …, 2023 - dl.acm.org
Darknets are probes listening to traffic reaching IP addresses that host no services. Traffic
reaching a darknet results from the actions of internet scanners, botnets, and possibly …

Traffic classification of user behaviors in tor, i2p, zeronet, freenet

Y Hu, F Zou, L Li, P Yi - … on trust, security and privacy in …, 2020 - ieeexplore.ieee.org
In recent years, more and more anonymous network have been developed. Since user's
identity is difficult to trace in anonymous networks, many illegal activities are carried out in …

Internet of malicious things: Correlating active and passive measurements for inferring and characterizing internet-scale unsolicited iot devices

F Shaikh, E Bou-Harb, N Neshenko… - IEEE …, 2018 - ieeexplore.ieee.org
Advancements in computing, communication, and sensing technologies are making it
possible to embed, control, and gather vital information from tiny devices that are being …

WF-transformer: learning temporal features for accurate anonymous traffic identification by using transformer networks

Q Zhou, LM Wang, HJ Zhu, T Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Website Fingerprinting (WF) is a network traffic mining technique for anonymous traffic
identification, which enables a local adversary to identify the target website that an …

[HTML][HTML] Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

Inferring, characterizing, and investigating internet-scale malicious iot device activities: A network telescope perspective

S Torabi, E Bou-Harb, C Assi… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
Recent attacks have highlighted the insecurity of the Internet of Things (IoT) paradigm by
demonstrating the impacts of leveraging Internet-scale compromised IoT devices. In this …

Data-driven curation, learning and analysis for inferring evolving iot botnets in the wild

MS Pour, A Mangino, K Friday, M Rathbun… - Proceedings of the 14th …, 2019 - dl.acm.org
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in
consumer and critical infrastructure realms. Several challenges impede addressing IoT …

Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …

[PDF][PDF] A comprehensive survey of recent internet measurement techniques for cyber security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …