[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

QuePaxa: Escaping the tyranny of timeouts in consensus

P Tennage, C Basescu, L Kokoris-Kogias… - Proceedings of the 29th …, 2023 - dl.acm.org
Leader-based consensus algorithms are fast and efficient under normal conditions, but lack
robustness to adverse conditions due to their reliance on timeouts for liveness. We present …

Profiling BGP serial hijackers: capturing persistent misbehavior in the global routing table

C Testart, P Richter, A King, A Dainotti… - Proceedings of the …, 2019 - dl.acm.org
BGP hijacks remain an acute problem in today's Internet, with widespread consequences.
While hijack detection systems are readily available, they typically rely on a priori prefix …

Network-level adversaries in federated learning

G Severi, M Jagielski, G Yar, Y Wang… - … IEEE Conference on …, 2022 - ieeexplore.ieee.org
Federated learning is a popular strategy for training models on distributed, sensitive data,
while preserving data privacy. Prior work identified a range of security threats on federated …

Three birds with one stone: Efficient partitioning attacks on interdependent cryptocurrency networks

M Saad, D Mohaisen - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
The biased distribution of cryptocurrency nodes across Autonomous Systems (ASes)
increases the risk of spatial partitioning attacks, allowing an adversary to isolate nodes by …

Man-in-the-middle attacks without rogue AP: when WPAs meet ICMP redirects

X Feng, Q Li, K Sun, Y Yang… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Modern Wi-Fi networks are commonly protected by the security mechanisms, eg, WPA,
WPA2 or WPA3, and thus it is difficult for an attacker (a malicious supplicant) to hijack the …

A System to Detect {Forged-Origin}{BGP} Hijacks

T Holterbach, T Alfroy, A Phokeer, A Dainotti… - … USENIX Symposium on …, 2024 - usenix.org
Despite global efforts to secure Internet routing, attackers still successfully exploit the lack of
strong BGP security mechanisms. This paper focuses on an attack vector that is frequently …

{Off-Path} Network Traffic Manipulation via Revitalized {ICMP} Redirect Attacks

X Feng, Q Li, K Sun, Z Qian, G Zhao, X Kuang… - 31st USENIX Security …, 2022 - usenix.org
ICMP redirect is a mechanism that allows an end host to dynamically update its routing
decisions for particular destinations. Previous studies show that ICMP redirect may be …

Multidomain SDN‐Based Gateways and Border Gateway Protocol

HS Alotaibi, MA Gregory, S Li - Journal of Computer Networks …, 2022 - Wiley Online Library
The Internet consists of distributed and interconnected autonomous systems (ASs). The
flexibility afforded by the Internet architecture ensures that timely changes to the network …