6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning

T Yang, B Hou, Z Cai, K Wu, T Zhou, C Wang - Computer Networks, 2022 - Elsevier
IPv6 target generation is critical in fast IPv6 scanning for Internet-wide surveys and
cybersecurity analysis. However, existing techniques generally suffer from low hit rates …

Don't count me out: On the relevance of IP address in the tracking ecosystem

V Mishra, P Laperdrix, A Vastel, W Rudametkin… - Proceedings of The …, 2020 - dl.acm.org
Targeted online advertising has become an inextricable part of the way Web content and
applications are monetized. At the beginning, online advertising consisted of simple ad …

6Hit: A reinforcement learning-based approach to target generation for Internet-wide IPv6 scanning

B Hou, Z Cai, K Wu, J Su… - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
Fast Internet-wide network measurement plays an important role in cybersecurity analysis
and network asset detection. The vast address space of IPv6, however, makes it infeasible to …

[PDF][PDF] Anonymity and identity online

F Ederer, P Goldsmith-Pinkham… - arXiv preprint arXiv …, 2024 - aeaweb.org
Abstract Economics Job Market Rumors (EJMR) is an online forum and clearinghouse for
information on the academic job market for economists. It also includes content that is …

DynamIPs: Analyzing address assignment practices in IPv4 and IPv6

R Padmanabhan, JP Rula, P Richter… - Proceedings of the 16th …, 2020 - dl.acm.org
IP addresses are commonly used to identify hosts or properties of hosts. The address
assigned to a host may change, however, and the extent to which these changes occur in …

6Search: A reinforcement learning-based traceroute approach for efficient IPv6 topology discovery

N Liu, C Jia, B Hou, C Hou, Y Chen, Z Cai - Computer Networks, 2023 - Elsevier
Topology discovery can infer the interconnection relationship between network entities. A
complete network topology is of great significance for network security analysis, application …

{Off-Path} Network Traffic Manipulation via Revitalized {ICMP} Redirect Attacks

X Feng, Q Li, K Sun, Z Qian, G Zhao, X Kuang… - 31st USENIX Security …, 2022 - usenix.org
ICMP redirect is a mechanism that allows an end host to dynamically update its routing
decisions for particular destinations. Previous studies show that ICMP redirect may be …

Nfv-based iot security for home networks using mud

Y Afek, A Bremler-Barr, D Hay… - NOMS 2020-2020 …, 2020 - ieeexplore.ieee.org
We present a new system to protect IoT devices in multiple premises by a single Virtual
Network Function (VNF) deployed in the ISP network. The system is based on the …

Classifying and tracking enterprise assets via dual-grained network behavioral analysis

M Lyu, HH Gharakheili, V Sivaraman - Computer Networks, 2022 - Elsevier
Enterprise networks continue to grow in scale and complexity, encompassing a wide range
of Internet-connected end-points including web servers/proxies, DNS/VPN/mail servers, and …

Quantifying the impact of blocklisting in the age of address reuse

S Ramanathan, A Hossain, J Mirkovic, M Yu… - Proceedings of the ACM …, 2020 - dl.acm.org
Blocklists, consisting of known malicious IP addresses, can be used as a simple method to
block malicious traffic. However, blocklists can potentially lead to unjust blocking of …