2013 IEEE Symposium on Security and Privacy 2013
DOI: 10.1109/sp.2013.18
|View full text |Cite
|
Sign up to set email alerts
|

Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures

Abstract: Malicious Web activities continue to be a major threat to the safety of online Web users. Despite the plethora forms of attacks and the diversity of their delivery channels, in the back end, they are all orchestrated through malicious Web infrastructures, which enable miscreants to do business with each other and utilize others' resources. Identifying the linchpins of the dark infrastructures and distinguishing those valuable to the adversaries from those disposable are critical for gaining an upper hand in th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…1-20) had more contributions and higher GI scores than both rIP features (Nos. [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38] 4.1 did not contain such easy-toanswer domain names. As a result, the importance of these TVP features using Alexa1k and Alexa10k is relatively low.…”
Section: Effectiveness Of Each Featurementioning
confidence: 99%
See 2 more Smart Citations
“…1-20) had more contributions and higher GI scores than both rIP features (Nos. [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38] 4.1 did not contain such easy-toanswer domain names. As a result, the importance of these TVP features using Alexa1k and Alexa10k is relatively low.…”
Section: Effectiveness Of Each Featurementioning
confidence: 99%
“…One reason is parking services. A parking domain name is mainly used for displaying advertisements [4,26,45]. Domain names abused in cyber-attacks tend to use such parking services later to monetize the malicious traffic from malware-infected hosts [26].…”
Section: Lifespan Of Detected Domain Namesmentioning
confidence: 99%
See 1 more Smart Citation
“…Graph is a structured data representation with nodes and edges, where nodes denote the entities and edges denote the relationship between them. Graph has been widely used in cybersecurity applications, such as code property graph for code vulnerability detection [1], APIcall graph for Android malware detection [2], and website network for malicious website detection [3].…”
Section: Introductionmentioning
confidence: 99%
“…However, the inherent feature of content-sharing on the Web is also an Achilles heel when it comes to security. Advertising networks, as one example, have emerged as an important vector for adversaries to distribute attacks to a wide audience [71,72,92,114,130]. Moreover, users are more susceptible to malvertising in the presence of ad injection [54,117,127].…”
Section: Chapter 1 Introductionmentioning
confidence: 99%