A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Cybersecurity in the internet of things in industrial management

RJ Raimundo, AT Rosário - Applied Sciences, 2022 - mdpi.com
Nowadays, people live amidst the smart home domain, while there are business
opportunities in industrial smart cities and healthcare. However, there are concerns about …

Easing the conscience with OPC UA: An internet-wide study on insecure deployments

M Dahlmanns, J Lohmöller, IB Fink… - Proceedings of the …, 2020 - dl.acm.org
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …

Missed opportunities: Measuring the untapped TLS support in the industrial Internet of Things

M Dahlmanns, J Lohmöller, J Pennekamp… - Proceedings of the …, 2022 - dl.acm.org
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles

L Morgese Zangrandi, T Van Ede, T Booij… - Proceedings of the 38th …, 2022 - dl.acm.org
Besides coming with unprecedented benefits, the Internet of Things (IoT) suffers deficits in
security measures, leading to attacks increasing every year. In particular, network …

HoneyComb: A darknet-centric proactive deception technique for curating IoT malware forensic artifacts

MS Pour, J Khoury, E Bou-Harb - NOMS 2022-2022 IEEE/IFIP …, 2022 - ieeexplore.ieee.org
Conventional IoT honeypots are known to suffer from scalability and management issues,
while accumulating stringent costs. Further, their passive nature hinders the wide-scale …

Sanitizing the IoT cyber security posture: An operational CTI feed backed up by Internet measurements

MS Pour, D Watson, E Bou-Harb - 2021 51st Annual IEEE/IFIP …, 2021 - ieeexplore.ieee.org
The Internet-of-Things (IoT) paradigm at large continues to be compromised, hindering the
privacy, dependability, security, and safety of our nations. While the operational security …

Edge security for sip-enabled iot devices with p4

A Febro, H Xiao, J Spring, B Christianson - Computer networks, 2022 - Elsevier
The exponential growth of IoT devices poses security concerns, in part because they provide
a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 …

Analyzing IoT Hosts in the IPv6 Internet

P Jose, SJ Saidi, O Gasser - arXiv preprint arXiv:2307.09918, 2023 - arxiv.org
Users and businesses are increasingly deploying Internet of Things (IoT) devices at home,
at work, and in factories. At the same time, we see an increase in the use of IPv6 for Internet …