A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Domain name system security and privacy: A contemporary survey
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …
today's Internet, and is the standard naming convention between human-readable domain …
All things considered: An analysis of {IoT} devices on home networks
D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …
Global measurement of {DNS} manipulation
Despite the pervasive nature of Internet censorship and the continuous evolution of how and
where censorship is applied, measurements of censorship remain comparatively sparse …
where censorship is applied, measurements of censorship remain comparatively sparse …
An end-to-end, large-scale measurement of dns-over-encryption: How far have we come?
DNS packets are designed to travel in unencrypted form through the Internet based on its
initial standard. Recent discoveries show that real-world adversaries are actively exploiting …
initial standard. Recent discoveries show that real-world adversaries are actively exploiting …
[PDF][PDF] TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets
DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it
presents are endless. While the fundamental rules of DNS are straightforward, DNS …
presents are endless. While the fundamental rules of DNS are straightforward, DNS …
On the origin of scanning: The impact of location on internet-wide scans
Fast IPv4 scanning has enabled researchers to answer a wealth of security and networking
questions. Yet, despite widespread use, there has been little validation of the methodology's …
questions. Yet, despite widespread use, there has been little validation of the methodology's …
All your dns records point to us: Understanding the security threats of dangling dns records
In a dangling DNS record (Dare), the resources pointed to by the DNS record are invalid, but
the record itself has not yet been purged from DNS. In this paper, we shed light on a largely …
the record itself has not yet been purged from DNS. In this paper, we shed light on a largely …
Dns cache poisoning attack: Resurrections with side channels
DNS is one of the fundamental and ancient protocols on the Internet that supports many
network applications and services. Unfortunately, DNS was designed without security in …
network applications and services. Unfortunately, DNS was designed without security in …
DNS privacy in practice and preparation
C Deccio, J Davis - Proceedings of the 15th International Conference on …, 2019 - dl.acm.org
An increased demand for privacy in Internet communications has resulted in privacy-centric
enhancements to the Domain Name System (DNS), including the use of Transport Layer …
enhancements to the Domain Name System (DNS), including the use of Transport Layer …