A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis

R Perdisci, T Papastergiou, O Alrawi… - 2020 IEEE european …, 2020 - ieeexplore.ieee.org
Being able to enumerate potentially vulnerable IoT devices across the Internet is important,
because it allows for assessing global Internet risks and enables network operators to check …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Clusters in the expanse: Understanding and unbiasing IPv6 hitlists

O Gasser, Q Scheitle, P Foremski, Q Lone… - Proceedings of the …, 2018 - dl.acm.org
Network measurements are an important tool in understanding the Internet. Due to the
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …

Investigating system operators' perspective on security misconfigurations

C Dietrich, K Krombholz, K Borgolte… - Proceedings of the 2018 …, 2018 - dl.acm.org
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …

Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis

D Schmidt, C Tagliaro, K Borgolte… - Proceedings of the 2023 …, 2023 - dl.acm.org
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …

In the IP of the beholder: Strategies for active IPv6 topology discovery

R Beverly, R Durairajan, D Plonka… - Proceedings of the …, 2018 - dl.acm.org
Existing methods for active topology discovery within the IPv6 Internet largely mirror those of
IPv4. In light of the large and sparsely populated address space, in conjunction with …

6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning

T Yang, B Hou, Z Cai, K Wu, T Zhou, C Wang - Computer Networks, 2022 - Elsevier
IPv6 target generation is critical in fast IPv6 scanning for Internet-wide surveys and
cybersecurity analysis. However, existing techniques generally suffer from low hit rates …

Ipv6 hitlists at scale: Be careful what you wish for

E Rye, D Levin - Proceedings of the ACM SIGCOMM 2023 Conference, 2023 - dl.acm.org
Today's network measurements rely heavily on Internet-wide scanning, employing tools like
ZMap that are capable of quickly iterating over the entire IPv4 address space. Unfortunately …

One bad apple can spoil your IPv6 privacy

SJ Saidi, O Gasser, G Smaragdakis - ACM SIGCOMM Computer …, 2022 - dl.acm.org
IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that
have already been installed at home. Unfortunately, we find that the privacy of a substantial …