A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis

R Perdisci, T Papastergiou, O Alrawi… - 2020 IEEE european …, 2020 - ieeexplore.ieee.org
Being able to enumerate potentially vulnerable IoT devices across the Internet is important,
because it allows for assessing global Internet risks and enables network operators to check …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018 - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

Clusters in the expanse: Understanding and unbiasing IPv6 hitlists

O Gasser, Q Scheitle, P Foremski, Q Lone… - Proceedings of the …, 2018 - dl.acm.org
Network measurements are an important tool in understanding the Internet. Due to the
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …

Rusty clusters? Dusting an IPv6 research foundation

J Zirngibl, L Steger, P Sattler, O Gasser… - Proceedings of the 22nd …, 2022 - dl.acm.org
The long-running IPv6 Hitlist service is an important foundation for IPv6 measurement
studies. It helps to overcome infeasible, complete address space scans by collecting …

6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning

T Yang, B Hou, Z Cai, K Wu, T Zhou, C Wang - Computer Networks, 2022 - Elsevier
IPv6 target generation is critical in fast IPv6 scanning for Internet-wide surveys and
cybersecurity analysis. However, existing techniques generally suffer from low hit rates …

In the IP of the beholder: Strategies for active IPv6 topology discovery

R Beverly, R Durairajan, D Plonka… - Proceedings of the …, 2018 - dl.acm.org
Existing methods for active topology discovery within the IPv6 Internet largely mirror those of
IPv4. In light of the large and sparsely populated address space, in conjunction with …

Ipv6 hitlists at scale: Be careful what you wish for

E Rye, D Levin - Proceedings of the ACM SIGCOMM 2023 Conference, 2023 - dl.acm.org
Today's network measurements rely heavily on Internet-wide scanning, employing tools like
ZMap that are capable of quickly iterating over the entire IPv4 address space. Unfortunately …

One bad apple can spoil your IPv6 privacy

SJ Saidi, O Gasser, G Smaragdakis - ACM SIGCOMM Computer …, 2022 - dl.acm.org
IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that
have already been installed at home. Unfortunately, we find that the privacy of a substantial …