IPFS and friends: A qualitative comparison of next generation peer-to-peer data networks

E Daniel, F Tschorsch - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Decentralized, distributed storage offers a way to reduce the impact of data silos as often
fostered by centralized cloud storage. While the intentions of this trend are not new, the topic …

DynamIPs: Analyzing address assignment practices in IPv4 and IPv6

R Padmanabhan, JP Rula, P Richter… - Proceedings of the 16th …, 2020 - dl.acm.org
IP addresses are commonly used to identify hosts or properties of hosts. The address
assigned to a host may change, however, and the extent to which these changes occur in …

Encrypted traffic classification: the QUIC case

J Luxemburk, K Hynek, T Čejka - 2023 7th Network Traffic …, 2023 - ieeexplore.ieee.org
The QUIC protocol is a new reliable and secure transport protocol that is an alternative to
TLS over TCP. However, compared to TLS, QUIC obfuscates the connection hand-shake …

Warmonger: inflicting denial-of-service via serverless functions in the cloud

J Xiong, M Wei, Z Lu, Y Liu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
We debut the Warmonger attack, a novel attack vector that can cause denial-of-service
between a serverless computing platform and an external content server. The Warmonger …

Blocklist babel: On the transparency and dynamics of open source blocklisting

Á Feal, P Vallina, J Gamba, S Pastrana… - … on Network and …, 2021 - ieeexplore.ieee.org
Blocklists constitute a widely-used Internet security mechanism to filter undesired network
traffic based on IP/domain reputation and behavior. Many blocklists are distributed in open …

[PDF][PDF] Interaction mechanism between blockchain and IPFS

F Yang, Z Ding, Y Yu, Y Sun - Blockchain, 2023 - elsp-homepage.oss-cn-hongkong …
Blockchains can provide integrity and authenticity, but their limited storage capacity can be a
challenge when it comes to storing large amounts of data. To address this issue, off-chain …

FlowDNS: correlating Netflow and DNS streams at scale

A Maghsoudlou, O Gasser, I Poese… - Proceedings of the 18th …, 2022 - dl.acm.org
Knowing customer's interests, eg which Video-On-Demand (VoD) or Social Network
services they are using, helps telecommunication companies with better network planning to …

Warmonger Attack: A Novel Attack Vector in Serverless Computing

J Xiong, M Wei, Z Lu, Y Liu - IEEE/ACM Transactions on …, 2024 - ieeexplore.ieee.org
We debut the Warmonger attack, a novel attack vector that can cause denial-of-service
between a serverless computing platform and an external content server. The Warmonger …

Towards identifying networks with Internet clients using public data

W Jiang, T Luo, T Koch, Y Zhang… - Proceedings of the 21st …, 2021 - dl.acm.org
Does an outage impact any users? Can a geolocation database known to be good at
locating users and bad at infrastructure be trusted for a particular prefix? Is a content-heavy …

Cloud computing security: a taxonomy, threat detection and mitigation techniques

P Rani, S Singh, K Singh - International Journal of Computers and …, 2024 - Taylor & Francis
Cloud Computing is a rapidly growing emerging technology in the IT environment. Internet-
based computing provides services like sharing resources eg network, storage, applications …