Tranco: A research-oriented top sites ranking hardened against manipulation

VL Pochat, T Van Goethem… - arxiv preprint arxiv …, 2018 - arxiv.org
In order to evaluate the prevalence of security and privacy practices on a representative
sample of the Web, researchers rely on website popularity rankings such as the Alexa list …

Privacy policies over time: Curation and analysis of a million-document dataset

R Amos, G Acar, E Lucherini, M Kshirsagar… - Proceedings of the Web …, 2021 - dl.acm.org
Automated analysis of privacy policies has proved a fruitful research direction, with
developments such as automated policy summarization, question answering systems, and …

Toppling top lists: Evaluating the accuracy of popular website lists

K Ruth, D Kumar, B Wang, L Valenta… - Proceedings of the 22nd …, 2022 - dl.acm.org
Researchers rely on lists of popular websites like the Alexa Top Million both to measure the
web and to evaluate proposed protocols and systems. Prior work has questioned the …

Deployment and scalability of an inter-domain multi-path routing infrastructure

C Krähenbühl, S Tabaeiaghdaei, C Gloor… - Proceedings of the 17th …, 2021 - dl.acm.org
Path aware networking (PAN) is a promising approach that enables endpoints to participate
in end-to-end path selection. PAN unlocks numerous benefits, such as fast failover after link …

SoK: a framework for asset discovery: systematizing advances in network measurements for protecting organizations

M Vermeer, J West, A Cuevas, S Niu… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Asset discovery is fundamental to any organization's cybersecurity efforts. Indeed, one must
accurately know which assets belong to an IT infrastructure before the infrastructure can be …

Peering only? analyzing the reachability benefits of joining large ixps today

L Prehn, F Lichtblau, C Dietzel, A Feldmann - International Conference on …, 2022 - Springer
Abstract Internet Exchange Points (IXPs) became a fundamental building block of inter-
domain routing throughout the last decade. Today, they offer their members access to …

C2-DNSWatch: Endpoint framework for detecting command and control (C2) connection of advanced persistent threats (APTs)

RZ Haider, B Aslam, H Abbas… - 2024 13th International …, 2024 - ieeexplore.ieee.org
Advance Persistent Threats (APTs) are sophisti-cated cyber weapons for launching cyber
offensive against adversaries. APTs implement state-of-the-art techniques and proceed in …

C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks

RZ Haider, B Aslam, H Abbas, Z Iqbal - International Journal of Information …, 2024 - Springer
Supply chain attacks are potent cyber attacks for widespread ramifications by compromising
supply chains. Supply chain attacks are difficult to detect as the malware is installed through …

Hunting BGP zombies in the wild

P Ongkanchana, R Fontugne, H Esaki… - Proceedings of the …, 2021 - dl.acm.org
As the key component of Internet's inter-domain routing, BGP is expected to work flawlessly.
However, a recent study has revealed the presence of BGP zombies: Withdrawn prefixes …

Evaluating and Improving Regional Network Robustness from an AS TOPO Perspective

Y Liu, C An, T Yu, Z Zheng, Z Pei… - NOMS 2023-2023 …, 2023 - ieeexplore.ieee.org
Currently, regional networks are subject to various security attacks and threats, which can
cause the network to fail. This paper borrows the quantitative ranking idea from the fields of …