Tranco: A research-oriented top sites ranking hardened against manipulation

VL Pochat, T Van Goethem… - arXiv preprint arXiv …, 2018 - arxiv.org
In order to evaluate the prevalence of security and privacy practices on a representative
sample of the Web, researchers rely on website popularity rankings such as the Alexa list …

Privacy policies over time: Curation and analysis of a million-document dataset

R Amos, G Acar, E Lucherini, M Kshirsagar… - Proceedings of the Web …, 2021 - dl.acm.org
Automated analysis of privacy policies has proved a fruitful research direction, with
developments such as automated policy summarization, question answering systems, and …

Toppling top lists: Evaluating the accuracy of popular website lists

K Ruth, D Kumar, B Wang, L Valenta… - Proceedings of the 22nd …, 2022 - dl.acm.org
Researchers rely on lists of popular websites like the Alexa Top Million both to measure the
web and to evaluate proposed protocols and systems. Prior work has questioned the …

Deployment and scalability of an inter-domain multi-path routing infrastructure

C Krähenbühl, S Tabaeiaghdaei, C Gloor… - Proceedings of the 17th …, 2021 - dl.acm.org
Path aware networking (PAN) is a promising approach that enables endpoints to participate
in end-to-end path selection. PAN unlocks numerous benefits, such as fast failover after link …

Peering only? analyzing the reachability benefits of joining large ixps today

L Prehn, F Lichtblau, C Dietzel, A Feldmann - International Conference on …, 2022 - Springer
Abstract Internet Exchange Points (IXPs) became a fundamental building block of inter-
domain routing throughout the last decade. Today, they offer their members access to …

SoK: a framework for asset discovery: systematizing advances in network measurements for protecting organizations

M Vermeer, J West, A Cuevas, S Niu… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Asset discovery is fundamental to any organization's cybersecurity efforts. Indeed, one must
accurately know which assets belong to an IT infrastructure before the infrastructure can be …

C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks

RZ Haider, B Aslam, H Abbas, Z Iqbal - International Journal of Information …, 2024 - Springer
Supply chain attacks are potent cyber attacks for widespread ramifications by compromising
supply chains. Supply chain attacks are difficult to detect as the malware is installed through …

Hunting BGP zombies in the wild

P Ongkanchana, R Fontugne, H Esaki… - Proceedings of the …, 2021 - dl.acm.org
As the key component of Internet's inter-domain routing, BGP is expected to work flawlessly.
However, a recent study has revealed the presence of BGP zombies: Withdrawn prefixes …

基于拓扑分析的区域级网络抗毁性研究

安常青, 刘玉家, 王会, 郑志延, 喻涛, 王继龙 - 通信学报, 2021 - infocomm-journal.com
为了衡量区域受到不同攻击的整体影响, 捕捉区域网络拓扑之间的抗毁性差异,
提出一种区域抗毁性评估算法. 从区域内部和区域外部出发, 分析区域内部自身抗毁性和区域之 …

Evaluating and Improving Regional Network Robustness from an AS TOPO Perspective

Y Liu, C An, T Yu, Z Zheng, Z Pei… - NOMS 2023-2023 …, 2023 - ieeexplore.ieee.org
Currently, regional networks are subject to various security attacks and threats, which can
cause the network to fail. This paper borrows the quantitative ranking idea from the fields of …