Part 4: SecurityInternational audienceInternet scanning is a de facto background traffic noise that is not clear if it poses a dangerous threat, i.e., what happens to scanned hosts? what is the success rate of scanning? and whether the problem is worth investing significant effort and money on mitigating it, e.g., by filtering unwanted traffic? In this work we take a first look into Internet scanning from the point of view of scan repliers using a unique combination of data sets which allows us to estimate how many hosts replied to scanners and whether they were subsequently attacked in an actual network. To contain our analysis, we focus on a specific interesting scanning event that was orchestrated by the Sality botnet during February 201...
In this paper, we seek to address a simple question: “How prevalent are denial-of-service attacks in...
Abstract—Network Intrusion Detection is, in a modern network, a useful tool to detect a wide variety...
Scans are often used by adversaries to determine the potential weaknesses in a target network or sys...
Part 4: SecurityInternational audienceInternet scanning is a de facto background traffic noise that ...
Abstract While it is widely known that port scanning is widespread, neither the scanning landscape n...
While it is widely known that port scanning is widespread, neither the scanning landscape nor the de...
Fast IPv4 scanning has enabled researchers to answer a wealth of security and networking questions. ...
Abstract—Botnets are the most common vehicle of cyber-crim-inal activity. They are used for spamming...
Fast IPv4 scanning has enabled researchers to answer a wealth of security and networking questions. ...
Unsolicited one-way Internet traffic, also called Internet background radiation (IBR), has been used...
Techniques like passive observation and random sampling let researchers understand many aspects of I...
The use of passive network sensors has in the past proven to be quite effective in monitoring and an...
In this dissertation, we evaluate the potential of unsolicited Internet traffic, called Internet Bac...
The article of record as published may be found at https://doi.org/10.1145/3319535.3354232The Spoofe...
Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Interne...
In this paper, we seek to address a simple question: “How prevalent are denial-of-service attacks in...
Abstract—Network Intrusion Detection is, in a modern network, a useful tool to detect a wide variety...
Scans are often used by adversaries to determine the potential weaknesses in a target network or sys...
Part 4: SecurityInternational audienceInternet scanning is a de facto background traffic noise that ...
Abstract While it is widely known that port scanning is widespread, neither the scanning landscape n...
While it is widely known that port scanning is widespread, neither the scanning landscape nor the de...
Fast IPv4 scanning has enabled researchers to answer a wealth of security and networking questions. ...
Abstract—Botnets are the most common vehicle of cyber-crim-inal activity. They are used for spamming...
Fast IPv4 scanning has enabled researchers to answer a wealth of security and networking questions. ...
Unsolicited one-way Internet traffic, also called Internet background radiation (IBR), has been used...
Techniques like passive observation and random sampling let researchers understand many aspects of I...
The use of passive network sensors has in the past proven to be quite effective in monitoring and an...
In this dissertation, we evaluate the potential of unsolicited Internet traffic, called Internet Bac...
The article of record as published may be found at https://doi.org/10.1145/3319535.3354232The Spoofe...
Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Interne...
In this paper, we seek to address a simple question: “How prevalent are denial-of-service attacks in...
Abstract—Network Intrusion Detection is, in a modern network, a useful tool to detect a wide variety...
Scans are often used by adversaries to determine the potential weaknesses in a target network or sys...