A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Examining mirai's battle over the internet of things

H Griffioen, C Doerr - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Using hundreds of thousands of compromised IoT devices, the Mirai botnet emerged in late
2016 as a game changing threat actor, capable of temporarily taking down major Internet …

A haystack full of needles: Scalable detection of iot devices in the wild

SJ Saidi, AM Mandalari, R Kolcun, H Haddadi… - Proceedings of the …, 2020 - dl.acm.org
Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich
and diverse functionalities, from voice assistants to home appliances. These functionalities …

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild

MS Pour, A Mangino, K Friday, M Rathbun… - Computers & …, 2020 - Elsevier
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in
consumer and critical infrastructures. The highly heterogeneous nature of IoT devices and …

Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices

T Sasaki, A Fujita, CH Gañán… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Geographically distributed infrastructures, such as buildings, dams, and solar power plants,
are commonly maintained via Internet-connected remote management devices. Previous …

IXP scrubber: learning from blackholing traffic for ML-driven DDoS detection at scale

M Wichtlhuber, E Strehle, D Kopp, L Prepens… - Proceedings of the …, 2022 - dl.acm.org
Distributed Denial of Service (DDoS) attacks are among the most critical cybersecurity
threats, jeopardizing the stability of even the largest networks and services. The existing …

United we stand: Collaborative detection and mitigation of amplification ddos attacks at scale

D Wagner, D Kopp, M Wichtlhuber, C Dietzel… - Proceedings of the …, 2021 - dl.acm.org
Amplification Distributed Denial of Service (DDoS) attacks' traffic and harm are at an all-time
high. To defend against such attacks, distributed attack mitigation platforms, such as traffic …

Dominance as a new trusted computing primitive for the internet of things

M Xu, M Huber, Z Sun, P England… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly emerging as one of the dominant computing
paradigms of this decade. Applications range from in-home entertainment to large-scale …