A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Measuring and modeling the label dynamics of online {Anti-Malware} engines
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …
used by researchers for malware annotation and system evaluation. Since different engines …
[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
Inferring phishing intention via webpage appearance and dynamics: A deep vision based approach
Explainable phishing detection approaches are usually based on references, ie, they
compare a suspicious webpage against a reference list of commonly targeted legitimate …
compare a suspicious webpage against a reference list of commonly targeted legitimate …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages
Recent years have seen the development of phishing detection and identification
approaches to defend against phishing attacks. Phishing detection solutions often report …
approaches to defend against phishing attacks. Phishing detection solutions often report …
Malbertv2: Code aware bert-based model for malware identification
To proactively mitigate malware threats, cybersecurity tools, such as anti-virus and anti-
malware software, as well as firewalls, require frequent updates and proactive …
malware software, as well as firewalls, require frequent updates and proactive …
Scam pandemic: How attackers exploit public fear through phishing
As the COVID-19 pandemic started triggering widespread lockdowns across the globe,
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …
Challenges in decentralized name management: the case of ENS
DNS has often been criticized for inherent design flaws, which make the system vulnerable
to attack. Further, domain names are not fully controlled by users, meaning that they can …
to attack. Further, domain names are not fully controlled by users, meaning that they can …
ASdb: a system for classifying owners of autonomous systems
While Autonomous Systems (ASes) are crucial for routing Internet traffic, organizations that
own them are little understood. Regional Internet Registries (RIRs) inconsistently collect …
own them are little understood. Regional Internet Registries (RIRs) inconsistently collect …