Detecting tunneled flooding traffic via deep semantic analysis of packet length patterns

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Distributed denial-of-service (DDoS) protection services capture various flooding attacks by
analyzing traffic features. However, existing services are unable to accurately detect …

{DScope}: A {Cloud-Native} Internet Telescope

E Pauley, P Barford, P McDaniel - 32nd USENIX Security Symposium …, 2023 - usenix.org
Data from Internet telescopes that monitor routed but unused IP address space has been the
basis for myriad insights on malicious, unwanted, and unexpected behavior. However …

[PDF][PDF] Understanding the ethical frameworks of internet measurement studies

E Pauley, P McDaniel - 2nd International Workshop on Ethics …, 2023 - patrickmcdaniel.org
Measurement of network data received from or transmitted over the public Internet has
yielded a myriad of insights towards improving the security and privacy of deployed services …

{CAMP}: Compositional Amplification Attacks against {DNS}

H Duan, M Bearzi, J Vieli, D Basin, A Perrig… - 33rd USENIX Security …, 2024 - usenix.org
While DNS is often exploited by reflective DoS attacks, it can also be weaponized as a
powerful amplifier to overload itself, as evidenced by a stream of recently discovered …

Anomaly-based filtering of application-layer DDoS against DNS authoritatives

J Bushart, C Rossow - 2023 IEEE 8th European Symposium on …, 2023 - ieeexplore.ieee.org
Authoritative DNS infrastructures are at the core of the Internet ecosystem. But how resilient
are typical authoritative DNS name servers against application-layer Denial-of-Service …

DarkMor: A framework for darknet traffic detection that integrates local and spatial features

J Yang, W Liang, X Wang, S Li, X Jiang, Y Mu, S Zeng - Neurocomputing, 2024 - Elsevier
The dark web, as an integral part of the multi-layered structure of the internet, provides
anonymity and high levels of concealment absent on the surface web. Users can engage in …

DarkSim: A similarity-based time-series analytic framework for darknet traffic

M Gao, R Mok, E Carisimo, E Li, S Kulkarni… - Proceedings of the 2024 …, 2024 - dl.acm.org
Network Telescopes, often referred to as darknets, capture unsolicited traffic directed toward
advertised but unused IP spaces, enabling researchers and operators to monitor malicious …

区块链在域名系统安全中的应用进展综述.

姬婕, 岳鹏飞, 李雷孝, 杜金泽… - Journal of Computer …, 2024 - search.ebscohost.com
域名系统(domain name system, DNS) 作为互联网的核心架构之一, 面临可信度不足,
安全保护薄弱等问题, 而区块链通过多点同步, 共享, 复制数据提供了一种多中心或去中心 …

Victimization in DDoS Attacks: The Role of Popularity and Industry Sector

MYM Haq, A Affinito, A Botta, A Sperotto… - Computers & …, 2024 - research.utwente.nl
DDoS attacks could have an economic motive such as extortion, but also social and political
such as hacktivism and state-sponsored warfare. Hence, the monetary value of the targets …

Holistic Security Approach in Cybersecurity Services for Datacenters and Telecommunication Operators

K Öztoprak, YK Tuncel - 2023 IEEE International Performance …, 2023 - ieeexplore.ieee.org
This study examines and presents a resolution for Protocol Independent Switch Architecture
(PISA) to handle data at the application layer, facilitating the precise inspection of security …