Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication 2015
DOI: 10.1145/2785956.2787494
|View full text |Cite
|
Sign up to set email alerts
|

ASwatch

Abstract: Bulletproof hosting Autonomous Systems (ASes)-malicious ASes fully dedicated to supporting cybercrime-provide freedom and resources for a cyber-criminal to operate. Their services include hosting a wide range of illegal content, botnet C&C servers, and other malicious resources. Thousands of new ASes are registered every year, many of which are often used exclusively to facilitate cybercrime. A natural approach to squelching bulletproof hosting ASes is to develop a reputation system that can identify them for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(4 citation statements)
references
References 20 publications
0
3
0
1
Order By: Relevance
“…Quite the contrary: data-driven policy could try to improve the factors identified as influential, e. g., require higher security standards at providers who host more popular websites. Furthermore, relative abuse metrics can, in themselves, incentivize better security [Konte et al 2015;He et al 2015]. In sum: throwing out a few rotten apples might appear more tractable, but producing a better harvest is definitely possible.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Quite the contrary: data-driven policy could try to improve the factors identified as influential, e. g., require higher security standards at providers who host more popular websites. Furthermore, relative abuse metrics can, in themselves, incentivize better security [Konte et al 2015;He et al 2015]. In sum: throwing out a few rotten apples might appear more tractable, but producing a better harvest is definitely possible.…”
Section: Discussionmentioning
confidence: 99%
“…Defender properties are then branched to two main groups: structural and security effort related properties. Relevant structural properties of defender include the size of the provider, as recognized in earlier work [Clayton et al 2015;Noroozian et al 2015;Stone-Gross et al 2009;Konte et al 2015]. Simply put, the more domains or IP addresses a provider hosts, the higher the odds of incurring an abuse incident, as there is a larger number of potential victims in the network.…”
Section: Analytical Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Mecanismos de combate ao phishing podem ser classificados em três frentes: (i) educac ¸ão e treinamento do usuário, instruindo-o a realizar verificac ¸ões simples para reconhecer tentativas de phishing e evitar golpes; (ii) mecanismos que identificam mensagens de e-mail de phishing, filtrando ou marcando o e-mail antes que o usuário seja exposto ao conteúdo da mensagem; e (iii) mecanismos de combate às páginas de phishing [Gupta et al 2017, Mason 2002, identificando e desativando servidores que hospedam páginas maliciosas. Mecanismos de identificac ¸ão de mensagens de phishing (frente ii) são frequentemente integrados à interface de e-mail de usuários devido à dificuldade de identificar e desativar servidores que hospedam páginas de phishing, seja devido a questões legais ou redes de hospedagem "à prova de bala"(bulletproof hosting) [Konte et al 2015]. O arcabouc ¸o e análise de classificadores apresentados neste artigo contribuem para o desenvolvimento de novos mecanismos de combate ao phishing.…”
Section: Trabalhos Relacionadosunclassified