Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

An {Internet-Wide} view of {Internet-Wide} scanning

Z Durumeric, M Bailey, JA Halderman - 23rd USENIX Security …, 2014 - usenix.org
While it is widely known that port scanning is widespread, neither the scanning landscape
nor the defensive reactions of network operators have been measured at Internet scale. In …

Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks

J Czyz, M Kallitsis, M Gharaibeh… - Proceedings of the …, 2014 - dl.acm.org
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP)
amplification, which became prominent in December 2013, have received significant global …

Scanning the scanners: Sensing the internet from a massively distributed network telescope

P Richter, A Berger - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
Scanning of hosts on the Internet to identify vulnerable devices and services is a key
component in many of today's cyberattacks. Tracking this scanning activity, in turn, provides …

6GAN: IPv6 multi-pattern target generation via generative adversarial nets with reinforcement learning

T Cui, G Gou, G **ong, C Liu, P Fu… - IEEE INFOCOM 2021 …, 2021 - ieeexplore.ieee.org
Global IPv6 scanning has always been a challenge for researchers because of the limited
network speed and computational power. Target generation algorithms are recently …

Detecting and interpreting changes in scanning behavior in large network telescopes

M Kallitsis, R Prajapati, V Honavar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network telescopes or “Darknets” received unsolicited Internet-wide traffic, thus providing a
unique window into macroscopic Internet activities associated with malware propagation …

Aggressive internet-wide scanners: Network impact and longitudinal characterization

A Anand, M Kallitsis, J Sippe, A Dainotti - Companion of the 19th …, 2023 - dl.acm.org
Aggressive network scanners, ie, ones with immoderate and persistent behaviors,
ubiquitously search the Internet to identify insecure and publicly accessible hosts. These …

Are darknets all the same? on darknet visibility for security monitoring

F Soro, I Drago, M Trevisan, M Mellia… - … symposium on local …, 2019 - ieeexplore.ieee.org
Darknets are sets of IP addresses that are advertised but do not host any client or server. By
passively recording the incoming packets, they assist network monitoring activities. Since …

Glowing in the dark: Uncovering {IPv6} address discovery and scanning strategies in the wild

HB Tanveer, R Singh, P Pearce… - 32nd USENIX Security …, 2023 - usenix.org
In this work we identify scanning strategies of IPv6 scanners on the Internet. We offer a
unique perspective on the behavior of IPv6 scanners by conducting controlled experiments …

Detecting malicious activity with DNS backscatter over time

K Fukuda, J Heidemann… - IEEE/ACM Transactions on …, 2017 - ieeexplore.ieee.org
Network-wide activity is when one computer (the originator) touches many others (the
targets). Motives for activity may be benign (mailing lists, content-delivery networks, and …