Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis

R Perdisci, T Papastergiou, O Alrawi… - 2020 IEEE european …, 2020 - ieeexplore.ieee.org
Being able to enumerate potentially vulnerable IoT devices across the Internet is important,
because it allows for assessing global Internet risks and enables network operators to check …

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem

M Jonker, A King, J Krupp, C Rossow… - Proceedings of the …, 2017 - dl.acm.org
Denial-of-Service attacks have rapidly increased in terms of frequency and intensity, steadily
becoming one of the biggest threats to Internet stability and reliability. However, a rigorous …

Scanning the scanners: Sensing the internet from a massively distributed network telescope

P Richter, A Berger - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
Scanning of hosts on the Internet to identify vulnerable devices and services is a key
component in many of today's cyberattacks. Tracking this scanning activity, in turn, provides …

Stable hierarchical routing for operational leo networks

Y Li, L Liu, H Li, W Liu, Y Chen, W Zhao, J Wu… - Proceedings of the 30th …, 2024 - dl.acm.org
Low Earth Orbit (LEO) satellite mega-constellations promise ubiquitous network services to"
unconnected" users. But their upcoming global routing for Earth will be unstable due to …

Internet performance from facebook's edge

B Schlinker, I Cunha, YC Chiu, S Sundaresan… - Proceedings of the …, 2019 - dl.acm.org
We examine the current state of user network performance and opportunities to improve it
from the vantage point of Facebook, a global content provider. Facebook serves over 2 …

Scanning the internet for liveness

S Bano, P Richter, M Javed, S Sundaresan… - ACM SIGCOMM …, 2018 - dl.acm.org
Internet-wide scanning depends on a notion of liveness: does a target IP address respond to
a probe packet? However, the interpretation of such responses, or lack of them, is nuanced …

A primer on IPv4 scarcity

P Richter, M Allman, R Bush, V Paxson - ACM SIGCOMM Computer …, 2015 - dl.acm.org
With the ongoing exhaustion of free address pools at the registries serving the global
demand for IPv4 address space, scarcity has become reality. Networks in need of address …

Who Squats IPv4 Addresses?

L Salamatian, T Arnold, Í Cunha, J Zhu… - ACM SIGCOMM …, 2023 - dl.acm.org
To mitigate IPv4 exhaustion, IPv6 provides expanded address space, and NAT allows a
single public IPv4 address to suffice for many devices assigned private IPv4 address space …

Beyond counting: new perspectives on the active IPv4 address space

P Richter, G Smaragdakis, D Plonka… - Proceedings of the 2016 …, 2016 - dl.acm.org
In this study, we report on techniques and analyses that enable us to capture Internet-wide
activity at individual IP address-level granularity by relying on server logs of a large …

Xatu: Boosting existing DDoS detection systems using auxiliary signals

Z Xu, S Ramanathan, A Rush, J Mirkovic… - Proceedings of the 18th …, 2022 - dl.acm.org
Traditional DDoS attack detection monitors volumetric traffic features to detect attack onset.
To reduce false positives, such detection is often conservative---raising an alert only after a …