A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Seven years in the life of Hypergiants' off-nets

P Gigis, M Calder, L Manassakis, G Nomikos… - Proceedings of the …, 2021 - dl.acm.org
Content Hypergiants deliver the vast majority of Internet traffic to end users. In recent years,
some have invested heavily in deploying services and servers inside end-user networks …

ZDNS: a fast DNS toolkit for internet measurement

L Izhikevich, G Akiwate, B Berger… - Proceedings of the …, 2022 - dl.acm.org
Active DNS measurement is fundamental to understanding and improving the DNS
ecosystem. However, the absence of an extensible, high-performance, and easy-to-use …

{LZR}: Identifying unexpected internet services

L Izhikevich, R Teixeira, Z Durumeric - 30th USENIX Security …, 2021 - usenix.org
Internet-wide scanning is a commonly used research technique that has helped uncover
real-world attacks, find cryptographic weaknesses, and understand both operator and …

Open for hire: Attack trends and misconfiguration pitfalls of iot devices

S Srinivasa, JM Pedersen… - Proceedings of the 21st …, 2021 - dl.acm.org
Mirai and its variants have demonstrated the ease and devastating effects of exploiting
vulnerable Internet of Things (IoT) devices. In many cases, the exploitation vector is not …

Cloud watching: Understanding attacks against cloud-hosted services

L Izhikevich, M Tran, M Kallitsis, A Fass… - Proceedings of the 2023 …, 2023 - dl.acm.org
Cloud computing has dramatically changed service deployment patterns. In this work, we
analyze how attackers identify and target cloud services in contrast to traditional enterprise …

The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core

M Nawrocki, M Jonker, TC Schmidt… - Proceedings of the 21st …, 2021 - dl.acm.org
In this paper, we shed new light on the DNS amplification ecosystem, by studying
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …

Open to a fault: On the passive compromise of {TLS} keys via transient errors

GA Sullivan, J Sippe, N Heninger… - 31st USENIX Security …, 2022 - usenix.org
It is well known in the cryptographic literature that the most common digital signature
schemes used in practice can fail catastrophically in the presence of faults during …

6Search: A reinforcement learning-based traceroute approach for efficient IPv6 topology discovery

N Liu, C Jia, B Hou, C Hou, Y Chen, Z Cai - Computer Networks, 2023 - Elsevier
Topology discovery can infer the interconnection relationship between network entities. A
complete network topology is of great significance for network security analysis, application …