Reading the tea leaves: A comparative analysis of threat intelligence
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
Delving into internet DDoS attacks by botnets: characterization and analysis
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend
against, partially due to the volatility of the attacking methods and patterns used by attackers …
against, partially due to the volatility of the attacking methods and patterns used by attackers …
Scanning the scanners: Sensing the internet from a massively distributed network telescope
Scanning of hosts on the Internet to identify vulnerable devices and services is a key
component in many of today's cyberattacks. Tracking this scanning activity, in turn, provides …
component in many of today's cyberattacks. Tracking this scanning activity, in turn, provides …
Spoki: Unveiling a new wave of scanners through a reactive network telescope
Large-scale Internet scans are a common method to identify victims of a specific attack.
Stateless scanning like in ZMap has been established as an efficient approach to probing at …
Stateless scanning like in ZMap has been established as an efficient approach to probing at …
DarkVec: Automatic analysis of darknet traffic with word embeddings
Darknets are passive probes listening to traffic reaching IP addresses that host no services.
Traffic reaching them is unsolicited by nature and often induced by scanners, malicious …
Traffic reaching them is unsolicited by nature and often induced by scanners, malicious …
Advancing the art of internet edge outage detection
Measuring reliability of edge networks in the Internet is difficult due to the size and
heterogeneity of networks, the rarity of outages, and the difficulty of finding vantage points …
heterogeneity of networks, the rarity of outages, and the difficulty of finding vantage points …
i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis
Darknets are probes listening to traffic reaching IP addresses that host no services. Traffic
reaching a darknet results from the actions of internet scanners, botnets, and possibly …
reaching a darknet results from the actions of internet scanners, botnets, and possibly …
Detecting and interpreting changes in scanning behavior in large network telescopes
Network telescopes or “Darknets” received unsolicited Internet-wide traffic, thus providing a
unique window into macroscopic Internet activities associated with malware propagation …
unique window into macroscopic Internet activities associated with malware propagation …
Ensemble Voting for Enhanced Robustness in DarkNet Traffic Detection
The increasing prevalence of DarkNet traffic poses significant challenges for network
security. Despite improvements in machine learning techniques, most of the existing studies …
security. Despite improvements in machine learning techniques, most of the existing studies …
Chocolatine: Outage detection for internet background radiation
The Internet is a complex ecosystem composed of thousands of Autonomous Systems (ASs)
operated by independent organizations; each AS having a very limited view outside its own …
operated by independent organizations; each AS having a very limited view outside its own …