Proceedings of the 31st Annual Computer Security Applications Conference 2015
DOI: 10.1145/2818000.2818010
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing and Modeling Longitudinal Security Data

Abstract: Many cybersecurity problems occur on a worldwide scale, but we lack rigorous methods for determining how best to intervene and mitigate damage globally, both short-and long-term. Analysis of longitudinal security data can provide insight into the effectiveness and differential impacts of security interventions on a global level. In this paper we consider the example of spam, studying a large high-resolution data set of messages sent from 260 ISPs in 60 countries over the course of a decade. The statistical ana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
10
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 37 publications
2
10
0
Order By: Relevance
“…Our approach extends previous work [4, 2, 16] in its adoption of an analysis of spam from an age-comparative perspective. This perspective allowed us to determine the extent to which spammers in today’s spam emails target young vs older users differently, based on their particular vulnerabilities [17].…”
Section: Introductionmentioning
confidence: 52%
See 1 more Smart Citation
“…Our approach extends previous work [4, 2, 16] in its adoption of an analysis of spam from an age-comparative perspective. This perspective allowed us to determine the extent to which spammers in today’s spam emails target young vs older users differently, based on their particular vulnerabilities [17].…”
Section: Introductionmentioning
confidence: 52%
“…Spam is usually sent by botnets, hired by spammers for their spam campaigns. Thus, many studies have focused on analyzing (i) the operation of such botnets [12, 3]; (ii) how the botnets automatically generate content for spam campaigns [2]; and (iii) the statistical features of large corpuses of spam [16].…”
Section: Related Workmentioning
confidence: 99%
“…A variety of methods could be used to construct a mapping of IP space to organizations, but it is crucial to make this mapping as accurate as possible. Given the heavy tailed nature of security incidents [23,24], misc attribution of a security incident could alter the assessment of an organization.…”
Section: Identifying An Organizations Network Footprintmentioning
confidence: 99%
“…For example Stone-Gross et al focused on ISPs with persistent malicious behavior [61]. Edwards et al studied the concentration of spam sending IP addresses within Internet Service providers, and examined some risk vectors(including economic, geographic, and connectivity) for high levels of spam concentrations [24]. Other work has focused identifying high concentrations of infected IP addresses in certain parts of the Internet [47,53,13].…”
Section: Related Workmentioning
confidence: 99%
“…They found, that many cybersecurity problems occur at a global scale, involving nations, corporations, or individuals whose actions have impact around the world [10]. Another security problem is related to insecure sharing data.…”
Section: Fig 1 Blended Threaths Bypassing Traditional Security Contmentioning
confidence: 99%