2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2019
DOI: 10.1109/eurospw.2019.00055
|View full text |Cite
|
Sign up to set email alerts
|

CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile Environments

Abstract: The monitoring of underground criminal activities is often automated to maximize the data collection and to train ML models to automatically adapt data collection tools to different communities. On the other hand, sophisticated adversaries may adopt crawling-detection capabilities that may significantly jeopardize researchers' opportunities to perform the data collection, for example by putting their accounts under the spotlight and being expelled from the community. This is particularly undesirable in promine… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 30 publications
0
13
0
Order By: Relevance
“…Although the aforementioned techniques show promising results, they do not address a key aspect of the web bot detection problem, which is the identification of web bots that try to evade detection via, for example, exhibiting a browser fingerprint and a humanlike behaviour [11,20,21,27]. Based on the current detection techniques, advanced web bots could be modelled by adversaries by (i) having a browser fingerprint, and (ii) exhibiting a humanlike behaviour.…”
Section: Background and Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Although the aforementioned techniques show promising results, they do not address a key aspect of the web bot detection problem, which is the identification of web bots that try to evade detection via, for example, exhibiting a browser fingerprint and a humanlike behaviour [11,20,21,27]. Based on the current detection techniques, advanced web bots could be modelled by adversaries by (i) having a browser fingerprint, and (ii) exhibiting a humanlike behaviour.…”
Section: Background and Related Workmentioning
confidence: 99%
“…A fingerprint that is close to one of a browser can be be achieved with the use and configuration of specific browsing automation software [11,27,35], or by using regular browsers [2]. A humanlike behaviour can be achieved by time sleeps that take into account the length of text in each web page [11,27], crawling web pages at a specific time (e.g., day/night) [11,27], skipping or spending a few seconds on content that they have already visited [11], and performing human assisted [27] or automatic [11] logging in to websites. Recent research has shown that, although detecting simple bots is relatively easy, detecting more sophisticated web bots that use a browser fingerprint and/or exhibit a humanlike behaviour, including the performance of mouse movements, is much more difficult [20].…”
Section: Background and Related Workmentioning
confidence: 99%
See 3 more Smart Citations