A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Measuring and modeling the label dynamics of online {Anti-Malware} engines

S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song… - 29th USENIX Security …, 2020 - usenix.org
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …

[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …

Inferring phishing intention via webpage appearance and dynamics: A deep vision based approach

R Liu, Y Lin, X Yang, SH Ng, DM Divakaran… - 31st USENIX Security …, 2022 - usenix.org
Explainable phishing detection approaches are usually based on references, ie, they
compare a suspicious webpage against a reference list of commonly targeted legitimate …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages

Y Lin, R Liu, DM Divakaran, JY Ng, QZ Chan… - 30th USENIX Security …, 2021 - usenix.org
Recent years have seen the development of phishing detection and identification
approaches to defend against phishing attacks. Phishing detection solutions often report …

Malbertv2: Code aware bert-based model for malware identification

A Rahali, MA Akhloufi - Big Data and Cognitive Computing, 2023 - mdpi.com
To proactively mitigate malware threats, cybersecurity tools, such as anti-virus and anti-
malware software, as well as firewalls, require frequent updates and proactive …

Scam pandemic: How attackers exploit public fear through phishing

M Bitaab, H Cho, A Oest, P Zhang, Z Sun… - … on Electronic Crime …, 2020 - ieeexplore.ieee.org
As the COVID-19 pandemic started triggering widespread lockdowns across the globe,
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …

Challenges in decentralized name management: the case of ENS

P **a, H Wang, Z Yu, X Liu, X Luo, G Xu… - Proceedings of the 22nd …, 2022 - dl.acm.org
DNS has often been criticized for inherent design flaws, which make the system vulnerable
to attack. Further, domain names are not fully controlled by users, meaning that they can …

ASdb: a system for classifying owners of autonomous systems

M Ziv, L Izhikevich, K Ruth, K Izhikevich… - Proceedings of the 21st …, 2021 - dl.acm.org
While Autonomous Systems (ASes) are crucial for routing Internet traffic, organizations that
own them are little understood. Regional Internet Registries (RIRs) inconsistently collect …