A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

[HTML][HTML] Matrix Profile data mining for BGP anomaly detection

BA Scott, MN Johnstone, P Szewczyk, S Richardson - Computer Networks, 2024 - Elsevier
Abstract The Border Gateway Protocol (BGP), acting as the communication protocol that
binds the Internet, remains vulnerable despite Internet security advancements. This is not …

On the effectiveness of bgp hijackers that evade public route collectors

A Milolidakis, T Bühler, K Wang, M Chiesa… - IEEE …, 2023 - ieeexplore.ieee.org
Routing hijack attacks have plagued the Internet for decades. After many failed mitigation
attempts, recent Internet-wide BGP monitoring infrastructures relying on distributed route …

Internet scale reverse traceroute

K Vermeulen, E Gurmericliler, I Cunha… - Proceedings of the …, 2022 - dl.acm.org
Knowledge of Internet paths allows operators and researchers to better understand the
Internet and troubleshoot problems. Paths are often asymmetric, so measuring just the …

[HTML][HTML] A survey of advanced border gateway protocol attack detection techniques

BA Scott, MN Johnstone… - Sensors (Basel …, 2024 - pmc.ncbi.nlm.nih.gov
The Internet's default inter-domain routing system, the Border Gateway Protocol (BGP),
remains insecure. Detection techniques are dominated by approaches that involve large …

Practical verifiable in-network filtering for DDoS defense

D Gong, M Tran, S Shinde, H **… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
In light of ever-increasing scale and sophistication of modern distributed denial-of-service
(DDoS) attacks, recent proposals show that in-network filtering of DDoS traffic at a handful of …

Identifying networks vulnerable to IP spoofing

O Fonseca, Í Cunha, E Fazzion, W Meira… - … on Network and …, 2021 - ieeexplore.ieee.org
The lack of authentication in the Internet's data plane allows hosts to falsify (spoof) the
source IP address in packet headers. IP source spoofing is the basis for amplification denial …

Routeinfer: Inferring interdomain paths by capturing ISP routing behavior diversity and generality

T Wu, JH Wang, J Wang, S Zhuang - International Conference on Passive …, 2022 - Springer
Accurate inference of interdomain paths between arbitrary source and destination is the
foundation for many research areas, especially for the security of the Internet routing system …

On the deployment of default routes in inter-domain routing

N Rodday, L Kaltenbach, I Cunha, R Bush… - Proceedings of the …, 2021 - dl.acm.org
In this paper, we argue that the design of a responsible Internet requires a clear
understanding of the current state of deployment. This work sheds light on default routing in …