[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Security data collection and data analytics in the internet: A survey

X Jing, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

{ZMap}: Fast internet-wide scanning and its security applications

Z Durumeric, E Wustrow, JA Halderman - 22nd USENIX Security …, 2013 - usenix.org
Internet-wide network scanning has numerous security applications, including exposing new
vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire …

Characteristics of internet background radiation

R Pang, V Yegneswaran, P Barford, V Paxson… - Proceedings of the 4th …, 2004 - dl.acm.org
Monitoring any portion of the Internet address space reveals incessant activity. This holds
even when monitoring traffic sent to unused addresses, which we term" background …

Cyber security data sources for dynamic network research

AD Kent - Dynamic Networks and Cyber-Security, 2016 - World Scientific
The importance of using real-world data to enable and validate dynamic network research
for the purposes of cyber security cannot be understated. Unfortunately, the use of real-world …

[PDF][PDF] Vulnerabilities of Passive Internet Threat Monitors.

Y Shinoda, K Ikai, M Itoh - USENIX Security Symposium, 2005 - usenix.org
Passive Internet monitoring is a powerful tool for measuring and characterizing interesting
network activity like worms or distributed denial of service attacks. By employing statistical …

Legal issues surrounding monitoring during network research

DC Sicker, P Ohm, D Grunwald - Proceedings of the 7th ACM SIGCOMM …, 2007 - dl.acm.org
This work was motivated by a discussion that two of the coauthors (computer science
professors) had with the other coauthor (a law professor and a former computer crime Trial …

Internet traffic measurement

C Williamson - IEEE internet computing, 2001 - ieeexplore.ieee.org
The Internet's evolution over the past 30 years (1971-2001), has been accompanied by the
development of various network applications. These applications range from early text …

[图书][B] Network security assessment: know your network

C McNab - 2007 - books.google.com
How secure is your network? The best way to find out is to attack it. Network Security
Assessment provides you with the tricks and tools professional security consultants use to …

Scanning the scanners: Sensing the internet from a massively distributed network telescope

P Richter, A Berger - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
Scanning of hosts on the Internet to identify vulnerable devices and services is a key
component in many of today's cyberattacks. Tracking this scanning activity, in turn, provides …