2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2016
DOI: 10.1109/dsn.2016.58
|View full text |Cite
|
Sign up to set email alerts
|

Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Cao et al [24] proposed an approach to distinguish organized and organic users on Twitter and found that URL shortening services were used to launch spam campaigns from strategically organized accounts. In addition to the abuse of URL shortening services on social media, Yousaf et al [25] reported that short URLs are used in the redirection chain generated by traffic exchanges, making it difficult to detect malicious sites. Also, previous studies revealed the users' perspective on security threats of URL shortening services [26], [27], [28].…”
Section: Related Workmentioning
confidence: 99%
“…Cao et al [24] proposed an approach to distinguish organized and organic users on Twitter and found that URL shortening services were used to launch spam campaigns from strategically organized accounts. In addition to the abuse of URL shortening services on social media, Yousaf et al [25] reported that short URLs are used in the redirection chain generated by traffic exchanges, making it difficult to detect malicious sites. Also, previous studies revealed the users' perspective on security threats of URL shortening services [26], [27], [28].…”
Section: Related Workmentioning
confidence: 99%
“…However, tactics are preferred by adversaries that allow them to attack a huge number of users in several minutes [4]. Most hackers today can effectively escape detection by security protocols [5], such as firewall and intrusion detection system (IDS); invaders have used techniques to spread their exploited code that include utilizing online advertisements of website pages [6], structured query language injection (SQLI), cross-site scripting (XSS) and another web scanner [7].…”
Section: Introductionmentioning
confidence: 99%