A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Exploring dark web crawlers: a systematic literature review of dark web crawlers and their implementation

J Bergman, OB Popov - IEEE Access, 2023 - ieeexplore.ieee.org
Strong encryption algorithms and reliable anonymity routing have made cybercrime
investigation more challenging. Hence, one option for law enforcement agencies (LEAs) is …

A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018 - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

Crimebb: Enabling cybercrime research on underground forums at scale

S Pastrana, DR Thomas, A Hutchings… - Proceedings of the 2018 …, 2018 - dl.acm.org
Underground forums allow criminals to interact, exchange knowledge, and trade in products
and services. They also provide a pathway into cybercrime, tempting the curious to join …

[PDF][PDF] Measuring the Deployment of Network Censorship Filters at Global Scale.

RS Raman, A Stoll, J Dalek, R Ramesh, W Scott… - NDSS, 2020 - pdfs.semanticscholar.org
Measuring the Deployment of Network Censorship Filters at Global Scale Page 1 Measuring the
Deployment of Network Censorship Filters at Global Scale Ram Sundara Raman1, Adrian …

It's not what it looks like: Manipulating perceptual hashing based applications

Q Hao, L Luo, STK Jan, G Wang - … of the 2021 ACM SIGSAC Conference …, 2021 - dl.acm.org
Perceptual hashing is widely used to search or match similar images for digital forensics and
cybercrime study. Unfortunately, the robustness of perceptual hashing algorithms is not well …

Explaining the technology use behavior of privacy-enhancing technologies: The case of Tor and JonDonym

D Harborth, S Pape, K Rannenberg - Proceedings on Privacy …, 2020 - petsymposium.org
Today's environment of data-driven business models relies heavily on collecting as much
personal data as possible. Besides being protected by governmental regulation, internet …

403 forbidden: a global view of CDN geoblocking

A McDonald, M Bernhard, L Valenta… - Proceedings of the …, 2018 - dl.acm.org
We report the first wide-scale measurement study of server-side geographic restriction, or
geoblocking, a phenomenon in which server operators intentionally deny access to users …

An empirical study of the i2p anonymity network and its censorship resistance

NP Hoang, P Kintis, M Antonakakis… - Proceedings of the …, 2018 - dl.acm.org
Tor and I2P are well-known anonymity networks used by many individuals to protect their
online privacy and anonymity. Tor's centralized directory services facilitate the …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …