A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

被引:46
作者
Pour, Morteza Safaei [1 ]
Naderb, Christelle [2 ]
Friday, Kurt [2 ]
Bou-Harb, Elias [2 ]
机构
[1] San Diego State Univ, San Diego, CA 92182 USA
[2] Univ Texas San Antonio, Cyber Ctr Secur & Analyt, San Antonio, TX USA
基金
美国国家科学基金会;
关键词
Internet measurement; Cyber security; Large-scale analysis; Security threats; BOTNET DETECTION; DNS; NETWORK; ATTACK;
D O I
10.1016/j.cose.2023.103123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet has transformed into a critical infrastructure, society has become more vulnerable to its security flaws. Despite substantial efforts to address many of these vulnerabilities by industry, gov-ernment, and academia, cyber security attacks continue to increase in intensity, diversity, and impact. Thus, it becomes intuitive to investigate the current cyber security threats, assess the extent to which corresponding defenses have been deployed, and evaluate the effectiveness of risk mitigation efforts. Ad-dressing these issues in a sound manner requires large-scale empirical data to be collected and analyzed via numerous Internet measurement techniques. Although such measurements can generate comprehen-sive and reliable insights, doing so encompasses complex procedures involving the development of novel methodologies to ensure accuracy and completeness. Therefore, a systematic examination of recently developed Internet measurement approaches for cyber security must be conducted to enable thorough studies that employ several vantage points, correlate multiple data sources, and potentially leverage past successful techniques for more recent issues. Unfortunately, performing such an examination is challeng-ing, as the literature is highly scattered. In large part, this is due to each research effort only focusing on a small portion of the many constituent parts of the Internet measurement domain. Moreover, to the best of our knowledge, no studies have offered an in-depth examination of this critical research domain in order to promote future advancements. To bridge these gaps, we explore all pertinent facets of utiliz-ing Internet measurement techniques for cyber security, ranging from threats within specific application domains to threats themselves. We provide a taxonomy of cyber security-related Internet measurement studies across two dimensions. One dimension relates to the many vertical layers (and components) of the Internet ecosystem, while the other relates to internal normal functions vs. the negative impact of external parties in the Internet and physical world. A comprehensive comparison of the gathered studies is also offered in terms of measurement technique, scope, measurement size, vantage size, and the anal-ysis approach that was leveraged. Finally, a discussion of the roadblocks to performing effective Internet measurements and possible future research directions is elaborated.(R) 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)
引用
收藏
页数:35
相关论文
共 370 条
[1]   Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service Providers [J].
Abhishta, Abhishta ;
van Rijswijk-Deij, Roland ;
Nieuwenhuis, Lambert J. M. .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2018, 48 (05) :70-76
[2]  
Aceto G, 2018, 2018 NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA)
[3]   Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse [J].
Agten, Pieter ;
Joosen, Wouter ;
Piessens, Frank ;
Nikiforakis, Nick .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[4]  
Akcora CG, 2020, PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P4439
[5]   A Look at the ECS Behavior of DNS Resolvers [J].
Al-Dalky, Rami ;
Rabinovich, Michael ;
Schomp, Kyle .
IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE, 2019, :116-129
[6]   Adaptive Encrypted Traffic Fingerprinting With Si-Directional Dependence [J].
Al-Naami, Khaled ;
Chandra, Swarup ;
Mustafa, Ahmad ;
Khan, Latifur ;
Lin, Zhiqiang ;
Hamlen, Kevin ;
Thuraisingham, Bhavani .
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, :177-188
[7]   Phishing environments, techniques, and countermeasures: A survey [J].
Aleroud, Ahmed ;
Zhou, Lina .
COMPUTERS & SECURITY, 2017, 68 :160-196
[8]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[9]   Smart at what cost? Characterising Mobile Deep Neural Networks in the wild [J].
Almeida, Mario ;
Laskaridis, Stefanos ;
Mehrotra, Abhinav ;
Dudziak, Lukasz ;
Leontiadis, Ilias ;
Lane, Nicholas D. .
PROCEEDINGS OF THE 2021 ACM INTERNET MEASUREMENT CONFERENCE, IMC 2021, 2021, :658-672
[10]  
Alrawi O, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3505