Searched for: author%3A%22Lone%2C+Q.B.%22
(1 - 5 of 5)
document
Lone, Q.B. (author), Moreira Moura, G.C. (author), Van Eeten, M.J.G. (author)
ISPs form a centralized point to control botnet infections. However, they do not have enough incentives to invest in mitigation of botnets. In this paper, we propose an approach based on comparative metrics to incentivize ISPs to mitigate botnets.
conference paper 2014
document
Moreira Moura, G.C. (author), Ganan, C.H.G. (author), Lone, Q.B. (author), Poursaied, P. (author), Asghari, H. (author), Van Eeten, M.J.G. (author)
IP address counts are typically used as a surrogate metric for the number of hosts in a network, as in the case of ISP rankings based on botnet infected addresses. However, due to effects of dynamic IP address allocation, such counts tend to overestimate the number of hosts, sometimes by an order of magnitude. In the literature, the rate at...
conference paper 2015
document
Lone, Q.B. (author), Luckie, Matthew (author), Korczynski, M.T. (author), van Eeten, M.J.G. (author)
Despite source IP address spoofing being a known vulnerability for at least 25 years, and despite many efforts to shed light on the problem, spoofing remains a popular attack method for redirection, amplification, and anonymity. To defeat these attacks requires operators to ensure their networks filter packets with spoofed source IP addresses...
conference paper 2017
document
Lone, Q.B. (author), Luckie, Matthew (author), Korczyński, MacIej (author), Asghari, H. (author), Javed, Mobin (author), van Eeten, M.J.G. (author)
Internet measurement tools are used to make inferences about network policies and practices across the Internet, such as censorship, traffic manipulation, bandwidth, and security measures. Some tools must be run from vantage points within individual networks, so are dependent on volunteer recruitment. A small pool of volunteers limits the...
conference paper 2018
document
Lone, Q.B. (author), Frik, Alisa (author), Luckie, Matthew (author), Korczyński, MacIej (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
IP spoofing, sending IP packets with a false source IP address, continues to be a primary attack vector for large-scale Denial of Service attacks. To combat spoofing, various interventions have been tried to increase the adoption of source address validation (SAV) among network operators. How can SAV deployment be increased? In this work, we...
conference paper 2022
Searched for: author%3A%22Lone%2C+Q.B.%22
(1 - 5 of 5)