Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

A comprehensive survey on internet outages

G Aceto, A Botta, P Marchetta, V Persico… - Journal of Network and …, 2018 - Elsevier
Internet outages are inevitable, frequent, opaque, and expensive. To make things worse,
they are poorly understood, while a deep understanding of them is essential for …

Reading the tea leaves: A comparative analysis of threat intelligence

VG Li, M Dunn, P Pearce, D McCoy… - 28th USENIX security …, 2019 - usenix.org
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …

Analysis of country-wide internet outages caused by censorship

A Dainotti, C Squarcella, E Aben, KC Claffy… - Proceedings of the …, 2011 - dl.acm.org
In the first months of 2011, Internet communications were disrupted in several North African
countries in response to civilian protests and threats of civil war. In this paper we analyze …

An {Internet-Wide} view of {Internet-Wide} scanning

Z Durumeric, M Bailey, JA Halderman - 23rd USENIX Security …, 2014 - usenix.org
While it is widely known that port scanning is widespread, neither the scanning landscape
nor the defensive reactions of network operators have been measured at Internet scale. In …

Scalability, fidelity, and containment in the potemkin virtual honeyfarm

M Vrable, J Ma, J Chen, D Moore, E Vandekieft… - Proceedings of the …, 2005 - dl.acm.org
The rapid evolution of large-scale worms, viruses and bot-nets have made Internet malware
a pressing concern. Such infections are at the root of modern scourges including DDoS …

Delving into internet DDoS attacks by botnets: characterization and analysis

A Wang, W Chang, S Chen… - IEEE/ACM Transactions …, 2018 - ieeexplore.ieee.org
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend
against, partially due to the volatility of the attacking methods and patterns used by attackers …

Profiling internet backbone traffic: behavior models and applications

K Xu, ZL Zhang, S Bhattacharyya - ACM SIGCOMM Computer …, 2005 - dl.acm.org
Recent spates of cyber-attacks and frequent emergence of applications affecting Internet
traffic dynamics have made it imperative to develop effective techniques that can extract, and …

An inside look at botnets

P Barford, V Yegneswaran - Malware detection, 2007 - Springer
The continued growth and diversification of the Internet has been accompanied by an
increasing prevalence of attacks and intrusions [40]. It can be argued, however, that a …

[PDF][PDF] The internet motion sensor-a distributed blackhole monitoring system.

MD Bailey, E Cooke, F Jahanian, J Nazario, D Watson - NDSS, 2005 - foo.be
As national infrastructure becomes intertwined with emerging global data networks, the
stability and integrity of the two have become synonymous. This connection, while …