Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild

K Izhikevich, GM Voelker, S Savage… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
In this work, we analyze to what extent actors target poorly-secured cloud storage buckets
for attack. We deployed hundreds of AWS S3 honeybuckets with different names and …

Unveiling the weak links: exploring DNS infrastructure vulnerabilities and fortifying defenses

Y Nosyk, O Hureau, S Fernandez… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
In the past decades, DNS has gradually risen into one of the most important systems on the
Internet. Malicious actors have long misused it in reflection and amplification DDoS attacks …

Everything in Its Right Place: Improving DNS resilience

R Sommese - 2023 - research.utwente.nl
Abstract In 2023, the Domain Name System (DNS) will celebrate 40 years since its creation.
Despite the passing of four decades, the DNS continues to play a fundamental role in …