A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

Clusters in the expanse: Understanding and unbiasing IPv6 hitlists

O Gasser, Q Scheitle, P Foremski, Q Lone… - Proceedings of the …, 2018 - dl.acm.org
Network measurements are an important tool in understanding the Internet. Due to the
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …

On landing and internal web pages: The strange case of jekyll and hyde in web performance measurement

W Aqeel, B Chandrasekaran, A Feldmann… - Proceedings of the …, 2020 - dl.acm.org
There is a rich body of literature on measuring and optimizing nearly every aspect of the
web, including characterizing the structure and content of web pages, devising new …

The rise of certificate transparency and its implications on the internet ecosystem

Q Scheitle, O Gasser, T Nolte, J Amann… - Proceedings of the …, 2018 - dl.acm.org
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and
explore the implications of exposing certificate DNS names from the perspective of security …

Easing the conscience with OPC UA: An internet-wide study on insecure deployments

M Dahlmanns, J Lohmöller, IB Fink… - Proceedings of the …, 2020 - dl.acm.org
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …

Certificate transparency in the wild: Exploring the reliability of monitors

B Li, J Lin, F Li, Q Wang, Q Li, J **g… - Proceedings of the 2019 …, 2019 - dl.acm.org
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …

Missed opportunities: Measuring the untapped TLS support in the industrial Internet of Things

M Dahlmanns, J Lohmöller, J Pennekamp… - Proceedings of the …, 2022 - dl.acm.org
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …

COMAR: classification of compromised versus maliciously registered domains

S Maroofi, M Korczyński, C Hesselman… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Miscreants abuse thousands of domain names every day by launching large-scale attacks
such as phishing or malware campaigns. While some domains are solely registered for …

Det: Enabling efficient probing of ipv6 active addresses

G Song, J Yang, Z Wang, L He, J Lin… - IEEE/ACM …, 2022 - ieeexplore.ieee.org
Fast IPv4 scanning significantly improves network measurement and security research.
Nevertheless, it is infeasible to perform brute-force scanning of the IPv6 address space …