Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

A tool for the generation of realistic network workload for emerging networking scenarios

A Botta, A Dainotti, A Pescapé - Computer Networks, 2012 - Elsevier
Internet workload is a mix of many and complex sources. Therefore, its accurate and realistic
replication is a difficult and challenging task. Such difficulties are exacerbated by the …

Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks

J Czyz, M Kallitsis, M Gharaibeh… - Proceedings of the …, 2014 - dl.acm.org
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP)
amplification, which became prominent in December 2013, have received significant global …

An {Internet-Wide} view of {Internet-Wide} scanning

Z Durumeric, M Bailey, JA Halderman - 23rd USENIX Security …, 2014 - usenix.org
While it is widely known that port scanning is widespread, neither the scanning landscape
nor the defensive reactions of network operators have been measured at Internet scale. In …

Delving into internet DDoS attacks by botnets: characterization and analysis

A Wang, W Chang, S Chen… - IEEE/ACM Transactions …, 2018 - ieeexplore.ieee.org
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend
against, partially due to the volatility of the attacking methods and patterns used by attackers …

Characterizing honeypot-captured cyber attacks: Statistical framework and case study

Z Zhan, M Xu, S Xu - IEEE Transactions on Information …, 2013 - ieeexplore.ieee.org
Rigorously characterizing the statistical properties of cyber attacks is an important problem.
In this paper, we propose the first statistical framework for rigorously analyzing honeypot …

Scanning the scanners: Sensing the internet from a massively distributed network telescope

P Richter, A Berger - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
Scanning of hosts on the Internet to identify vulnerable devices and services is a key
component in many of today's cyberattacks. Tracking this scanning activity, in turn, provides …

Predicting cyber attack rates with extreme values

Z Zhan, M Xu, S Xu - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
It is important to understand to what extent, and in what perspectives, cyber attacks can be
predicted. Despite its evident importance, this problem was not investigated until very …