Pages
- 1
- 2
- document
-
Oosthoek, K. (author), van Staalduinen, Mark (author), Smaragdakis, G. (author)The Dark Web, primarily Tor, has evolved to protect user privacy and freedom of speech through anonymous routing. However, Tor also facilitates cybercriminal actors who utilize it for illicit activities. Quantifying the size and nature of such activity is challenging, as Tor complicates indexing by design. This paper proposes a methodology to...journal article 2023
- document
-
Munteanu, Cristian (author), Saidi, Said Jawad (author), Gasser, Oliver (author), Smaragdakis, G. (author), Feldmann, Anja (author)Honeypots have been used for decades to detect, monitor, and understand attempts of unauthorized use of information systems. Previous studies focused on characterizing the spread of malware, e.g., Mirai and other attacks, or proposed stealthy and interactive architectures to improve honeypot efficiency.<br/><br/>In this paper, we present...conference paper 2023
- document
-
Albakour, Taha (author), Gasser, Oliver (author), Smaragdakis, G. (author)In this paper, we show that utilizing multiple protocols offers a unique opportunity to improve IP alias resolution and dual-stack inference substantially. Our key observation is that prevalent protocols, e.g., SSH and BGP, reply to unsolicited requests with a set of values that can be combined to form a unique device identifier. More...conference paper 2023
- document
-
Wagner, Daniel (author), Ranadive, Sahil Ashish (author), Griffioen, H.J. (author), Kallitsis, Michalis (author), Dainotti, Alberto (author), Smaragdakis, G. (author), Feldmann, Anja (author)Unsolicited traffic sent to advertised network space that does not host active services provides insights about misconfigurations as well as potentially malicious activities, including the spread of Botnets, DDoS campaigns, and exploitation of vulnerabilities. Network telescopes have been used for many years to monitor such unsolicited traffic....conference paper 2023
- document
-
Albakour, Taha (author), Gasser, Oliver (author), Beverly, Robert (author), Smaragdakis, G. (author)<br/><br/>The Internet architecture has facilitated a multi-party, distributed, and heterogeneous physical infrastructure where routers from different vendors connect and inter-operate via IP. Such vendor heterogeneity can have important security and policy implications. For example, a security vulnerability may be specific to a particular...conference paper 2023
- document
-
Moura, Giovane C. M. (author), Davids, Marco (author), Schutijser, Caspar (author), Hesselman, Cristian (author), Heidemann, John (author), Smaragdakis, G. (author)Time synchronization is crucial on the Internet, and the Network Time Protocol<br/>(NTP) serves as the primary synchronization protocol. The NTP Pool, a<br/>volunteer-driven project introduced 20 years ago, connects clients with NTP servers. Our analysis of Root DNS queries reveals the NTP Pool's widespread use as the most popular time service....report 2023
- document
-
Shukla, Apoorv (author), Hudemann, Kevin (author), Vagi, Zsolt (author), Hugerich, Lily (author), Smaragdakis, G. (author), Hecker, Artur (author), Schmid, Stefan (author), Feldmann, Anja (author)We introduce a runtime verification framework for programmable switches that complements static analysis. To evaluate our approach, we design and develop P6, a runtime verification system that automatically detects, localizes, and patches software bugs in P4 programs. Bugs are reported via a violation of pre-specified expected behavior that...journal article 2023
- document
-
Stocker, Volker (author), Lehr, William (author), Smaragdakis, G. (author)The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and...book chapter 2023
- document
-
Chu, Tianyue (author), Garcia-Recuero, Alvaro (author), Iordanou, Costas (author), Smaragdakis, G. (author), Laoutaris, Nikolaos (author)We present a Federated Learning (FL) based solution for building a distributed classifier capable of detecting URLs containing sensitive content, i.e., content related to categories such as health, political beliefs, sexual orientation, etc. Although such a classifier addresses the limitations of previous offline/centralised classifiers, it is...conference paper 2023
- document
-
Munteanu, Cristian (author), Gasser, Oliver (author), Poese, Ingmar (author), Smaragdakis, G. (author), Feldmann, Anja (author)Today, there is an increasing number of peering agreements between Hypergiants and networks that benefit millions of end-user. However, the majority of Autonomous Systems do not currently enjoy the benefit of interconnecting directly with Hypergiants to optimally select the path for delivering Hypergiant traffic to their users. In this paper,...conference paper 2023
- document
-
Oosthoek, K. (author), Cable, Jack (author), Smaragdakis, G. (author)A data-driven, follow-the-money approach to characterize the ransomware ecosystem uncovers two parallel ransomware criminal markets: commodity ransomware and Ransomware as a Service (RaaS).journal article 2023
- document
-
Ozcan, Selim (author), Livadariu, Ioana (author), Smaragdakis, G. (author), Griwodz, Carsten (author)During the last decades, public and private investments contributed to building the Internet infrastructure, including undersea cables, long-distance fiber links, broadband networks, and satellite constellations to reduce end-to-end delay. In this study, we measure the inter-city delays over the last six years, considering 17 major metropolitan...conference paper 2023
- document
-
Saidi, Said Jawad (author), Gasser, Oliver (author), Smaragdakis, G. (author)IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that have already been installed at home. Unfortunately, we find that the privacy of a substantial fraction of end-users is still at risk, despite the efforts by ISPs and electronic vendors to improve end-user security, e.g., by adopting prefix rotation...journal article 2022
- document
-
Saidi, Said Jawad (author), Matic, Srdjan (author), Gasser, Oliver (author), Smaragdakis, G. (author), Feldmann, Anja (author)Internet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud companies operate IoT backendsÐthe focus of this paper. We propose a methodology to identify and locate them...conference paper 2022
- document
-
Mostafaei, Habib (author), Smaragdakis, G. (author), Zinner, Thomas (author), Feldmann, Anja (author)Big data analytics platforms have played a critical role in the unprecedented success of data-driven applications. However, real-time and streaming data applications, and recent legislation, e.g., GDPR in Europe, have posed constraints on exchanging and analyzing data, especially personal data, across geographic regions. To address such...journal article 2022
- document
-
Gotze, Matthias (author), Matic, Srdjan (author), Iordanou, Costas (author), Smaragdakis, G. (author), Laoutaris, Nikolaos (author)In recent years, governments worldwide have moved their services online to better serve their citizens. Benefits aside, this choice increases the danger of tracking via such sites. This is of great concern as governmental websites increasingly become the only interaction point with the government. In this paper, we investigate popular...conference paper 2022
- document
-
Krenc, Thomas (author), Beverly, Robert (author), Smaragdakis, G. (author)BGP communities are a popular mechanism used by network operators for traffic engineering, blackholing, and to realize network policies and business strategies. In recent years, many research works have contributed to our understanding of how BGP communities are utilized, as well as how they can reveal secondary insights into real-world...conference paper 2021
- document
-
Wagner, Daniel (author), Kopp, Daniel (author), Wichtlhuber, Matthias (author), DIetzel, Christoph (author), Hohlfeld, Oliver (author), Smaragdakis, G. (author), Feldmann, Anja (author)Amplification Distributed Denial of Service (DDoS) attacks' traffic and harm are at an all-time high. To defend against such attacks, distributed attack mitigation platforms, such as traffic scrubbing centers that operate in peering locations, e.g., Internet Exchange Points (IXP), have been deployed in the Internet over the years. These...conference paper 2021
- document
-
Albakour, Taha (author), Gasser, Oliver (author), Beverly, Robert (author), Smaragdakis, G. (author)In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a unique - -but likely unintended - -opportunity for remotely fingerprinting network infrastructure in the wild. Specifically, by sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed information about the configuration and...conference paper 2021
- document
-
Becker, Leonard (author), Hohlfeld, Oliver (author), Smaragdakis, G. (author)With the increasing cloud usage for access to fast and well-connected computational power, cloud outages have also become a growing risk for businesses and individuals alike. We derive a method to analyze publicly available BGP data to measure the visibility of cloud providers' outages on the Internet control plane. We then utilize this...conference paper 2021
Pages
- 1
- 2