2021
DOI: 10.1007/978-3-030-72582-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Clairvoyance: Inferring Blocklist Use on the Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Oliver et al [122] investigated the usage patterns of 712 prefixes from Spamhaus' "Don't Route or Peer" (DROP) list [160], which operators frequently use to identify maliciously used address space. They found that for 32% of prefixes' IRR entries were created a month before the prefixes were added to the blocklist, highlighting the fact that the IRR is not a reliable source for filtering information since it can be easily manipulated.…”
Section: As0 Roasmentioning
confidence: 99%
“…Oliver et al [122] investigated the usage patterns of 712 prefixes from Spamhaus' "Don't Route or Peer" (DROP) list [160], which operators frequently use to identify maliciously used address space. They found that for 32% of prefixes' IRR entries were created a month before the prefixes were added to the blocklist, highlighting the fact that the IRR is not a reliable source for filtering information since it can be easily manipulated.…”
Section: As0 Roasmentioning
confidence: 99%
“…• Ensafi et al [16] made use of IP-ID variations to remotely detect censorship in a target country. In 2021, Li et al [8] used these IP-ID variations to confirm the IP blocklist used by the remote hosts.…”
Section: Background and Relevant Workmentioning
confidence: 99%
“…The process of dark web pages retrieval starts with seeds URLs, then all dark web pages under the addresses are downloaded, followed by extracting hyperlinks from the downloaded pages and including them in the list of addresses, and lastly, each link is crawled into [24]. Dark web crawling is a process that is accompanied by many limitations due to the features of TOR network, particularly, unrelated websites, whereby there is weak connection between sites, thereby making it hard for the crawler to trail [25]. Previous studies have shown that dark websites that are hosted on private encrypted networks have link addresses with a shorter lifespan than those of websites found on the surface web [26].…”
Section: Introductionmentioning
confidence: 99%