2016
DOI: 10.1007/978-3-319-45719-2_7
|View full text |Cite
|
Sign up to set email alerts
|

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
2
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 18 publications
1
2
0
Order By: Relevance
“…Similarly, in STIX 2, each data source possesses a significant number of uniquely shared STIX objects not found in other data sources. These results are consistent with previous work showing that most data in threat intelligence feeds are unique [41], [68], [26].…”
Section: Data Duplicationsupporting
confidence: 93%
“…Similarly, in STIX 2, each data source possesses a significant number of uniquely shared STIX objects not found in other data sources. These results are consistent with previous work showing that most data in threat intelligence feeds are unique [41], [68], [26].…”
Section: Data Duplicationsupporting
confidence: 93%
“…The benefits of the sharing economy with low prices, labor flexibility, and demand-driven transactions are reflected in the opposite pole: low wages, tax evasion, lack of social security rights, and regulatory uncertainty regarding requisite insurance, food, and fire safety (Ranchordás 2016). The sharing economy can also generate internet fraud, requiring special regulation and monitoring (Thomas et al 2016). Corporations that use the sharing economy model also face obstacles.…”
Section: Cooperation and Non-cooperation In The Sharing Economymentioning
confidence: 99%
“…They show, for example, that the lists are changing quickly and that even the geographic distribution of malicious IP addresses around the world is highly nonuniform. Another characteristics are shown in [17], where authors analyze lists of IP addresses reported as malicious by various Google services. For example, they show that 1 % of the most active malign IP addresses are responsible for 48-82 % of all attacks (depending on the service attacked).…”
Section: Evaluating Reputation Of Network Entitiesmentioning
confidence: 99%