Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3230837
|View full text |Cite
|
Sign up to set email alerts
|

Assessing Internet-wide Cyber Situational Awareness of Critical Sectors

Abstract: In this short paper, we take a first step towards empirically assessing Internet-wide malicious activities generated from and targeted towards Internet-scale business sectors (i.e., financial, health, education, etc.) and critical infrastructure (i.e., utilities, manufacturing, government, etc.). Facilitated by an innovative and a collaborative large-scale effort, we have conducted discussions with numerous Internet entities to obtain rare and private information related to allocated IP blocks pertaining to t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 18 publications
0
8
0
2
Order By: Relevance
“…On a given day, millions of IPs are engaged in scanning behavior. Our improved models can aid cybersecurity analysts in determining which of these IPs are nefarious [50], the distribution of attacks in particular critical sectors [51], identifying spamming behavior [52], how to vacinate against computer viruses [53], obscuring web sources [54], identifying significant flow aggregates in traffic [55], and sources of rumors [56].…”
Section: Discussionmentioning
confidence: 99%
“…On a given day, millions of IPs are engaged in scanning behavior. Our improved models can aid cybersecurity analysts in determining which of these IPs are nefarious [50], the distribution of attacks in particular critical sectors [51], identifying spamming behavior [52], how to vacinate against computer viruses [53], obscuring web sources [54], identifying significant flow aggregates in traffic [55], and sources of rumors [56].…”
Section: Discussionmentioning
confidence: 99%
“…Apple Pay, PayPal, Samsung Pay, Amazon Pay, and Google Pay follow behind [32]. Although, the Department of Homeland Security classifies financial services as critical sectors [33] and the market for digital wallets becomes increasingly populated, some platforms, such as Ali Pay and WeChat Pay, are exploring the opportunity to merge the financial services with online social media features. Users can publicly post their financial transactions just like they publicly share or get the bill at the restaurant.…”
Section: Venmo: Interplay Of Privacy and Securitymentioning
confidence: 99%
“…Other researchers [7,27,46] collect their data via active Internet measurement tools, e.g., ZMap [24]. While such tools typically do not interfere with the operation of industrial equipment [13], malicious attacks can.…”
Section: Related Workmentioning
confidence: 99%