A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
Authors
Keywords
-
Journal
COMPUTERS & SECURITY
Volume -, Issue -, Pages 103123
Publisher
Elsevier BV
Online
2023-01-28
DOI
10.1016/j.cose.2023.103123
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment
- (2022) Ali AlSabeh et al. Computer Networks
- Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR 2021) final report
- (2021) KC Claffy et al. ACM SIGCOMM Computer Communication Review
- Ethna: Analyzing the Underlying Peer-to-Peer Network of Ethereum Blockchain
- (2021) Taotao Wang et al. IEEE Transactions on Network Science and Engineering
- Down for failure: Active power status monitoring
- (2021) Niloofar Bayat et al. Future Generation Computer Systems-The International Journal of eScience
- The Ransomware-as-a-Service Economy within the Darknet
- (2020) Per Håkon Meland et al. COMPUTERS & SECURITY
- Workshop on Internet Economics (WIE 2019) report
- (2020) kc claffy et al. ACM SIGCOMM Computer Communication Review
- A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices
- (2020) Binbin Zhao et al. IEEE Transactions on Dependable and Secure Computing
- Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers
- (2019) Abhishta Abhishta et al. ACM SIGCOMM Computer Communication Review
- Issues and Challenges in DNS based Botnet Detection: A Survey
- (2019) Manmeet Singh et al. COMPUTERS & SECURITY
- The 11th workshop on active internet measurements (AIMS-11) workshop report
- (2019) K C Claffy et al. ACM SIGCOMM Computer Communication Review
- On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
- (2019) Morteza Safaei Pour et al. COMPUTERS & SECURITY
- A Survey on Malicious Domains Detection through DNS Data Analysis
- (2018) Yury Zhauniarovich et al. ACM COMPUTING SURVEYS
- Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems
- (2018) Sadegh Torabi et al. IEEE Communications Surveys and Tutorials
- Robust Smartphone App Identification via Encrypted Network Traffic Analysis
- (2018) Vincent F. Taylor et al. IEEE Transactions on Information Forensics and Security
- A survey on network data collection
- (2018) Donghao Zhou et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- On the economic significance of ransomware campaigns: A Bitcoin transactions perspective
- (2018) Mauro Conti et al. COMPUTERS & SECURITY
- Detection of Malicious and Low Throughput Data Exfiltration Over the DNS Protocol
- (2018) Asaf Nadler et al. COMPUTERS & SECURITY
- Security Data Collection and Data Analytics in the Internet: A Survey
- (2018) Xuyang Jing et al. IEEE Communications Surveys and Tutorials
- Towards automatic fingerprinting of IoT devices in the cyberspace
- (2018) Kai Yang et al. Computer Networks
- Securing android applications via edge assistant third-party library detection
- (2018) Zhushou Tang et al. COMPUTERS & SECURITY
- Another look at TLS ecosystems in networked devices vs. Web servers
- (2018) Nayanamana Samarasinghe et al. COMPUTERS & SECURITY
- ARTEMIS: Neutralizing BGP Hijacking Within a Minute
- (2018) Pavlos Sermpezis et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis
- (2018) An Wang et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Detecting Malicious Activity With DNS Backscatter Over Time
- (2017) Kensuke Fukuda et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures
- (2017) Aziz Mohaisen et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes
- (2017) Mingwei Zhang et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- PsyBoG: A scalable botnet detection method for large-scale DNS traffic
- (2016) Jonghoon Kwon et al. Computer Networks
- Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
- (2016) Claude Fachkha et al. IEEE Communications Surveys and Tutorials
- A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements
- (2016) Roland van Rijswijk-Deij et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- HEAP: Reliable Assessment of BGP Hijacking Attacks
- (2016) Johann Schlamp et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- The Rise of Social Botnets: Attacks and Countermeasures
- (2016) Jinxue Zhang et al. IEEE Transactions on Dependable and Secure Computing
- Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks
- (2016) Babak Rahbarinia et al. ACM Transactions on Privacy and Security
- On the ground truth problem of malicious DNS traffic analysis
- (2015) Matija Stevanovic et al. COMPUTERS & SECURITY
- Spam campaign detection, analysis, and investigation
- (2015) Son Dinh et al. Digital Investigation
- A Survey on Internet Performance Measurement Platforms and Related Standardization Efforts
- (2015) Vaibhav Bajpai et al. IEEE Communications Surveys and Tutorials
- Cyber Scanning: A Comprehensive Survey
- (2013) Elias Bou-Harb et al. IEEE Communications Surveys and Tutorials
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started