A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
Rusty clusters? Dusting an IPv6 research foundation
The long-running IPv6 Hitlist service is an important foundation for IPv6 measurement
studies. It helps to overcome infeasible, complete address space scans by collecting …
studies. It helps to overcome infeasible, complete address space scans by collecting …
It's over 9000: analyzing early QUIC deployments with the standardization on the horizon
After nearly five years and 34 draft versions, standardization of the new connection oriented
transport protocol QUIC was finalized in May 2021. Designed as a fundamental network …
transport protocol QUIC was finalized in May 2021. Designed as a fundamental network …
In the IP of the beholder: Strategies for active IPv6 topology discovery
Existing methods for active topology discovery within the IPv6 Internet largely mirror those of
IPv4. In light of the large and sparsely populated address space, in conjunction with …
IPv4. In light of the large and sparsely populated address space, in conjunction with …
6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning
IPv6 target generation is critical in fast IPv6 scanning for Internet-wide surveys and
cybersecurity analysis. However, existing techniques generally suffer from low hit rates …
cybersecurity analysis. However, existing techniques generally suffer from low hit rates …
Characterizing the VPN Ecosystem in the Wild
A Maghsoudlou, L Vermeulen, I Poese… - … Conference on Passive …, 2023 - Springer
With the increase of remote working during and after the COVID-19 pandemic, the use of
Virtual Private Networks (VPNs) around the world has nearly doubled. Therefore, measuring …
Virtual Private Networks (VPNs) around the world has nearly doubled. Therefore, measuring …
Deep dive into the IoT backend ecosystem
Internet of Things (IoT) devices are becoming increasingly ubiquitous, eg, at home, in
enterprise environments, and in production lines. To support the advanced functionalities of …
enterprise environments, and in production lines. To support the advanced functionalities of …
Ipv6 hitlists at scale: Be careful what you wish for
Today's network measurements rely heavily on Internet-wide scanning, employing tools like
ZMap that are capable of quickly iterating over the entire IPv4 address space. Unfortunately …
ZMap that are capable of quickly iterating over the entire IPv4 address space. Unfortunately …
One bad apple can spoil your IPv6 privacy
IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that
have already been installed at home. Unfortunately, we find that the privacy of a substantial …
have already been installed at home. Unfortunately, we find that the privacy of a substantial …