[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
QuePaxa: Escaping the tyranny of timeouts in consensus
Leader-based consensus algorithms are fast and efficient under normal conditions, but lack
robustness to adverse conditions due to their reliance on timeouts for liveness. We present …
robustness to adverse conditions due to their reliance on timeouts for liveness. We present …
Profiling BGP serial hijackers: capturing persistent misbehavior in the global routing table
BGP hijacks remain an acute problem in today's Internet, with widespread consequences.
While hijack detection systems are readily available, they typically rely on a priori prefix …
While hijack detection systems are readily available, they typically rely on a priori prefix …
Network-level adversaries in federated learning
Federated learning is a popular strategy for training models on distributed, sensitive data,
while preserving data privacy. Prior work identified a range of security threats on federated …
while preserving data privacy. Prior work identified a range of security threats on federated …
Three birds with one stone: Efficient partitioning attacks on interdependent cryptocurrency networks
M Saad, D Mohaisen - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
The biased distribution of cryptocurrency nodes across Autonomous Systems (ASes)
increases the risk of spatial partitioning attacks, allowing an adversary to isolate nodes by …
increases the risk of spatial partitioning attacks, allowing an adversary to isolate nodes by …
Man-in-the-middle attacks without rogue AP: when WPAs meet ICMP redirects
Modern Wi-Fi networks are commonly protected by the security mechanisms, eg, WPA,
WPA2 or WPA3, and thus it is difficult for an attacker (a malicious supplicant) to hijack the …
WPA2 or WPA3, and thus it is difficult for an attacker (a malicious supplicant) to hijack the …
A System to Detect {Forged-Origin}{BGP} Hijacks
Despite global efforts to secure Internet routing, attackers still successfully exploit the lack of
strong BGP security mechanisms. This paper focuses on an attack vector that is frequently …
strong BGP security mechanisms. This paper focuses on an attack vector that is frequently …
{Off-Path} Network Traffic Manipulation via Revitalized {ICMP} Redirect Attacks
ICMP redirect is a mechanism that allows an end host to dynamically update its routing
decisions for particular destinations. Previous studies show that ICMP redirect may be …
decisions for particular destinations. Previous studies show that ICMP redirect may be …
Multidomain SDN‐Based Gateways and Border Gateway Protocol
HS Alotaibi, MA Gregory, S Li - Journal of Computer Networks …, 2022 - Wiley Online Library
The Internet consists of distributed and interconnected autonomous systems (ASs). The
flexibility afforded by the Internet architecture ensures that timely changes to the network …
flexibility afforded by the Internet architecture ensures that timely changes to the network …