Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning

A Habibi Lashkari, G Kaur, A Rahali - 2020 the 10th international …, 2020 - dl.acm.org
Darknet traffic classification is significantly important to categorize real-time applications.
Although there are notable efforts to classify darknet traffic which rely heavily on existing …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

DarkVec: Automatic analysis of darknet traffic with word embeddings

L Gioacchini, L Vassio, M Mellia, I Drago… - Proceedings of the 17th …, 2021 - dl.acm.org
Darknets are passive probes listening to traffic reaching IP addresses that host no services.
Traffic reaching them is unsolicited by nature and often induced by scanners, malicious …

Amplification and DRDoS attack defense--a survey and new perspectives

FJ Ryba, M Orlinski, M Wählisch, C Rossow… - arXiv preprint arXiv …, 2015 - arxiv.org
The severity of amplification attacks has grown in recent years. Since 2013 there have been
at least two attacks which involved over 300Gbps of attack traffic. This paper offers an …

i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis

L Gioacchini, L Vassio, M Mellia, I Drago… - ACM Transactions on …, 2023 - dl.acm.org
Darknets are probes listening to traffic reaching IP addresses that host no services. Traffic
reaching a darknet results from the actions of internet scanners, botnets, and possibly …

An enhanced mechanism for detection of Domain Name System‐based distributed reflection denial of service attacks depending on modified metaheuristic algorithms …

S Manickam, R Rahef Nuiaa, A Hakem Alsaeedi… - IET …, 2022 - Wiley Online Library
The rapid growth of the number of devices connected to the Internet and the increasing
demand for electronic services have led to a huge growth in the number of cyberattacks …

[HTML][HTML] Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes

M Kallitsis, R Prajapati, V Honavar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network telescopes or “Darknets” received unsolicited Internet-wide traffic, thus providing a
unique window into macroscopic Internet activities associated with malware propagation …