2016
DOI: 10.1109/tdsc.2015.2427847
|View full text |Cite
|
Sign up to set email alerts
|

Hacking Is Not Random: A Case-Control Study of Webserver-Compromise Risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 17 publications
2
18
0
Order By: Relevance
“…These findings confirm previous work at the level of domain names [51]. The authors have concluded that i) running popular CMS platforms (WordPress and Joomla) and ii) running up-to-date versions of WordPress increases the odds of a domain in getting compromised.…”
Section: Dead End: Direct Relation Between Security Indicators and Abusesupporting
confidence: 87%
See 2 more Smart Citations
“…These findings confirm previous work at the level of domain names [51]. The authors have concluded that i) running popular CMS platforms (WordPress and Joomla) and ii) running up-to-date versions of WordPress increases the odds of a domain in getting compromised.…”
Section: Dead End: Direct Relation Between Security Indicators and Abusesupporting
confidence: 87%
“…Next, we mark a provider as a shared hosting provider if we observe at least one IP address that hosts more than 10 domains. We adopt the same threshold used in other studies [45,51]. Using an elbow plot of domain density per IP address, we confirmed a sharp increase in density beyond a threshold of 10 to 15 domains per IP address.…”
Section: Datasupporting
confidence: 65%
See 1 more Smart Citation
“…To perform this task, the process distinguishes two phases: feature learning, and monitoring. Finally, authors in [31] computed a web-server's risk factors when cybercriminals use Apache, Nginx, or Microsoft IIS, among others. They also included the effect of running the most popular WCMS platforms with up-to-date versions on those web-servers, finding that recent versions were more compromised than less-popular WCMS platforms or outdated versions.…”
Section: Related Workmentioning
confidence: 99%
“…Chapter 6: Research design and method 56 _______________________________________________________________________________________________________________________________________________ publications by security researchers (e.g.,Walden, 2009Walden, , 2010Vasek et al 2016) and in industry reports of threats and breaches such as the Verizon 2016 Data BreachFor each of the ten vulnerabilities in the small sample, we manually examined the content of each CVE record, seeking insights to help specify variables and measures in step 7 and to inform the automated data collection of the full sample in step 8. There…”
mentioning
confidence: 99%