A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis
Being able to enumerate potentially vulnerable IoT devices across the Internet is important,
because it allows for assessing global Internet risks and enables network operators to check …
because it allows for assessing global Internet risks and enables network operators to check …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
A long way to the top: Significance, structure, and stability of internet top lists
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …
security rely on lists of target domains to be analysed; researchers make use of target lists …
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
Network measurements are an important tool in understanding the Internet. Due to the
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …
Rusty clusters? Dusting an IPv6 research foundation
The long-running IPv6 Hitlist service is an important foundation for IPv6 measurement
studies. It helps to overcome infeasible, complete address space scans by collecting …
studies. It helps to overcome infeasible, complete address space scans by collecting …
6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning
IPv6 target generation is critical in fast IPv6 scanning for Internet-wide surveys and
cybersecurity analysis. However, existing techniques generally suffer from low hit rates …
cybersecurity analysis. However, existing techniques generally suffer from low hit rates …
In the IP of the beholder: Strategies for active IPv6 topology discovery
Existing methods for active topology discovery within the IPv6 Internet largely mirror those of
IPv4. In light of the large and sparsely populated address space, in conjunction with …
IPv4. In light of the large and sparsely populated address space, in conjunction with …
Ipv6 hitlists at scale: Be careful what you wish for
Today's network measurements rely heavily on Internet-wide scanning, employing tools like
ZMap that are capable of quickly iterating over the entire IPv4 address space. Unfortunately …
ZMap that are capable of quickly iterating over the entire IPv4 address space. Unfortunately …
One bad apple can spoil your IPv6 privacy
IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that
have already been installed at home. Unfortunately, we find that the privacy of a substantial …
have already been installed at home. Unfortunately, we find that the privacy of a substantial …