Shujun Li*
Society has become more susceptible to security flaws in the Internet as it has become an essential infrastructure. Cyber security attacks continue to increase in intensity, variety, and impact despite substantial efforts by industry, government, and academia to address many of these vulnerabilities. As a result, it becomes easy to look into the current threats to cyber security, assess the extent to which defenses have been put in place to counter them, and assess the success of risk mitigation efforts. Large-scale empirical data must be collected and analyzed using a variety of Internet measurement methods in order to effectively address these issues. Even though these kinds of measurements can give you accurate and complete insights, they require complicated processes and the creation of new methods to make sure they are accurate and complete. Therefore, it is necessary to carry out a methodical investigation of the most recent Internet measurement approaches for cyber security in order to make it possible to carry out comprehensive studies that make use of a variety of perspectives, correlate a variety of data sources, and possibly make use of successful techniques that have been used in the past for issues that are more recent. Sadly, conducting such an investigation is difficult due to the dispersed nature of the literature. This is largely because each research effort only addresses a small subset of the Internet measurement domain's many components. In addition, we are aware of no studies that have provided an in-depth examination of this important research area in order to encourage advancements in the future. We investigate all relevant aspects of using Internet measurement techniques for cyber security, from threats within specific application domains to threats themselves, in order to fill in these gaps. Taxonomy of two-dimensional Internet measurement studies related to cyber security is provided by us. One dimension is concerned with the numerous vertical layers (and components) of the Internet ecosystem, and the other is concerned with internal normal functions as opposed to the negative effects of external parties on the Internet and the real world. In terms of measurement technique, scope, measurement size, vantage size, and the utilized analysis approach, a comprehensive comparison of the collected studies is also provided. Last but not least, a detailed discussion of the obstacles to effective Internet measurement and potential future research directions is provided.
Teile diesen Artikel