Internet outages are inevitable, frequent, opaque, and expensive. To make things worse, they are poorly understood, while a deep understanding of them is essential for …
The term" threat intelligence" has swiftly become a staple buzzword in the computer security industry. The entirely reasonable premise is that, by compiling up-to-date information about …
In the first months of 2011, Internet communications were disrupted in several North African countries in response to civilian protests and threats of civil war. In this paper we analyze …
While it is widely known that port scanning is widespread, neither the scanning landscape nor the defensive reactions of network operators have been measured at Internet scale. In …
M Vrable, J Ma, J Chen, D Moore, E Vandekieft… - Proceedings of the …, 2005 - dl.acm.org
The rapid evolution of large-scale worms, viruses and bot-nets have made Internet malware a pressing concern. Such infections are at the root of modern scourges including DDoS …
A Wang, W Chang, S Chen… - IEEE/ACM Transactions …, 2018 - ieeexplore.ieee.org
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend against, partially due to the volatility of the attacking methods and patterns used by attackers …
K Xu, ZL Zhang, S Bhattacharyya - ACM SIGCOMM Computer …, 2005 - dl.acm.org
Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can extract, and …
The continued growth and diversification of the Internet has been accompanied by an increasing prevalence of attacks and intrusions [40]. It can be argued, however, that a …
MD Bailey, E Cooke, F Jahanian, J Nazario, D Watson - NDSS, 2005 - foo.be
As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while …