The Internet is built on top of intertwined network services, e.g., email, DNS, and content distribution networks operated by private or governmental organizations. Recent events have shown that these organizations may, knowingly or unknowingly, be part of global-scale security incidents including state-sponsored mass surveillance programs and large-scale DDoS attacks. For example, in March 2015 the Great Cannon attack has shown that an Internet service provider can weaponize millions of Web browsers and turn them into DDoS bots by injecting malicious JavaScript code into transiting TCP connections. While attack techniques and root cause vulnerabilities are routinely studied, we still lack models and algorithms to study the intricate dep...
Large-scale Internet attacks are pervasive. A broad spectrum of actors from organized gangs of crimi...
In this paper, we seek to address a simple question: “How prevalent are denial-of-service attacks in...
Malware is a major threat to security and privacy of network users. A huge variety of malware typica...
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we d...
AbstractIn this paper, we investigate cyber-threats and the underlying infrastructures. More precise...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
a b s t r a c t In this paper, we investigate cyber-threats and the underlying infrastructures. More...
Most websites, services, and applications have come to rely on Internet services (e.g., DNS, CDN, em...
The integrity of the content a user is exposed to when browsing the web relies on a plethora of non-...
The amount of people and devices connected through the Internet has been growing at a rapid pace; as...
Abstract—Malicious Web activities continue to be a major threat to the safety of online Web users. D...
<p>Internet-based services routinely contend with a range of malicious activity (e.g., spam, scans, ...
The success of the Internet has brought out extraordinary benefits to our society. Current Internet ...
The Internet is an evolving, robust system with built in redundancy to ensure the flow of informatio...
In this short paper, we take a first step towards empirically assessing Internet-wide malicious acti...
Large-scale Internet attacks are pervasive. A broad spectrum of actors from organized gangs of crimi...
In this paper, we seek to address a simple question: “How prevalent are denial-of-service attacks in...
Malware is a major threat to security and privacy of network users. A huge variety of malware typica...
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we d...
AbstractIn this paper, we investigate cyber-threats and the underlying infrastructures. More precise...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
a b s t r a c t In this paper, we investigate cyber-threats and the underlying infrastructures. More...
Most websites, services, and applications have come to rely on Internet services (e.g., DNS, CDN, em...
The integrity of the content a user is exposed to when browsing the web relies on a plethora of non-...
The amount of people and devices connected through the Internet has been growing at a rapid pace; as...
Abstract—Malicious Web activities continue to be a major threat to the safety of online Web users. D...
<p>Internet-based services routinely contend with a range of malicious activity (e.g., spam, scans, ...
The success of the Internet has brought out extraordinary benefits to our society. Current Internet ...
The Internet is an evolving, robust system with built in redundancy to ensure the flow of informatio...
In this short paper, we take a first step towards empirically assessing Internet-wide malicious acti...
Large-scale Internet attacks are pervasive. A broad spectrum of actors from organized gangs of crimi...
In this paper, we seek to address a simple question: “How prevalent are denial-of-service attacks in...
Malware is a major threat to security and privacy of network users. A huge variety of malware typica...