2016 IEEE Symposium on Security and Privacy (SP) 2016
DOI: 10.1109/sp.2016.50
|View full text |Cite
|
Sign up to set email alerts
|

Cloak of Visibility: Detecting When Machines Browse a Different Web

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
23
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 61 publications
(27 citation statements)
references
References 17 publications
3
23
0
1
Order By: Relevance
“…Other cloaking strategies rely on anti-fraud protections provided by MaxMind and FraudLabs Pro that detect proxies or anonymous access-in this case re-purposed to flag inorganic users accessing phishing pages. Overall, the cloaking strategies of kits match those reported by Invernizzi et al as popular among blackhat search engine optimization [22], indicating a common core of blackhat technologies.…”
Section: Web Cloakingsupporting
confidence: 71%
“…Other cloaking strategies rely on anti-fraud protections provided by MaxMind and FraudLabs Pro that detect proxies or anonymous access-in this case re-purposed to flag inorganic users accessing phishing pages. Overall, the cloaking strategies of kits match those reported by Invernizzi et al as popular among blackhat search engine optimization [22], indicating a common core of blackhat technologies.…”
Section: Web Cloakingsupporting
confidence: 71%
“…For our study, we deployed the platform on two computers at a European university to ensure a European origin of our generated web traffic. We chose not to use a scalable web service (e. g., Amazon EC2) to automate our measurement since it is easier for a website to detect such automated crawls [28]. Additionally, we conducted two additional measurements using US-based IP addresses using a VPN service to validate the effects of geolocation.…”
Section: Measurement Frameworkmentioning
confidence: 99%
“…While we have a similar goal to Mentor of detecting benign domains within presumably malicious domains, we avoid including features that require us to actively connect to domains. Malicious actors are namely known to detect active scanning and respond differently to appear more benign ('cloaking') [46], and could thus mislead our classification. More broadly, such probes could alert them of efforts to investigate and disrupt malicious infrastructures, allowing attackers to shift their approach or hide any traces to avoid repercussions [3].…”
Section: A) Individual Registration and Configuration Patternsmentioning
confidence: 99%