2014
DOI: 10.1007/978-3-319-11379-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Paint It Black: Evaluating the Effectiveness of Malware Blacklists

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0
2

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 109 publications
(73 citation statements)
references
References 18 publications
0
69
0
2
Order By: Relevance
“…1-20) had more contributions and higher GI scores than both rIP features (Nos. [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38] 4.1 did not contain such easy-toanswer domain names. As a result, the importance of these TVP features using Alexa1k and Alexa10k is relatively low.…”
Section: Effectiveness Of Each Featurementioning
confidence: 99%
See 3 more Smart Citations
“…1-20) had more contributions and higher GI scores than both rIP features (Nos. [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38] 4.1 did not contain such easy-toanswer domain names. As a result, the importance of these TVP features using Alexa1k and Alexa10k is relatively low.…”
Section: Effectiveness Of Each Featurementioning
confidence: 99%
“…Another reason behind the longer lifespan is the sinkhole operation. A sinkholed domain name is an originally malicious domain name that is treated and then controlled by security organizations [24,36]. In such a case, an IP address is continuously associated with a domain name; thus, the lifespan of the domain name is long.…”
Section: Lifespan Of Detected Domain Namesmentioning
confidence: 99%
See 2 more Smart Citations
“…Thakore [5] provided a set of metrics such as coverage, redundancy, confidence, and cost to quantitatively evaluate monitor deployments. Kührer et al [6] focused on the effectiveness of malware blacklists and showed that the current blacklist is insufficient to protect against the variety of malware threats. There are other studies focused on evaluating the strength of IDS or other security products [7,8], strength of user password [9,10], and so on.…”
Section: Related Workmentioning
confidence: 99%