Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
A comprehensive survey on internet outages
Internet outages are inevitable, frequent, opaque, and expensive. To make things worse,
they are poorly understood, while a deep understanding of them is essential for …
they are poorly understood, while a deep understanding of them is essential for …
Reading the tea leaves: A comparative analysis of threat intelligence
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
Analysis of country-wide internet outages caused by censorship
In the first months of 2011, Internet communications were disrupted in several North African
countries in response to civilian protests and threats of civil war. In this paper we analyze …
countries in response to civilian protests and threats of civil war. In this paper we analyze …
An {Internet-Wide} view of {Internet-Wide} scanning
While it is widely known that port scanning is widespread, neither the scanning landscape
nor the defensive reactions of network operators have been measured at Internet scale. In …
nor the defensive reactions of network operators have been measured at Internet scale. In …
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
The rapid evolution of large-scale worms, viruses and bot-nets have made Internet malware
a pressing concern. Such infections are at the root of modern scourges including DDoS …
a pressing concern. Such infections are at the root of modern scourges including DDoS …
Profiling internet backbone traffic: behavior models and applications
Recent spates of cyber-attacks and frequent emergence of applications affecting Internet
traffic dynamics have made it imperative to develop effective techniques that can extract, and …
traffic dynamics have made it imperative to develop effective techniques that can extract, and …
Delving into internet DDoS attacks by botnets: characterization and analysis
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend
against, partially due to the volatility of the attacking methods and patterns used by attackers …
against, partially due to the volatility of the attacking methods and patterns used by attackers …
An inside look at botnets
The continued growth and diversification of the Internet has been accompanied by an
increasing prevalence of attacks and intrusions [40]. It can be argued, however, that a …
increasing prevalence of attacks and intrusions [40]. It can be argued, however, that a …
[PDF][PDF] The internet motion sensor-a distributed blackhole monitoring system.
As national infrastructure becomes intertwined with emerging global data networks, the
stability and integrity of the two have become synonymous. This connection, while …
stability and integrity of the two have become synonymous. This connection, while …