Proceedings of the Fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies 2017
DOI: 10.1145/3132465.3132467
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the effectiveness of typosquatting techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 9 publications
0
6
0
1
Order By: Relevance
“…Such attacks include various variants, i.e. typosquatting [63,64,5,65,66,67,68,69], bitsquatting [70,71,72], combosquatting [41], and soundsquatting [73]. Domain name squatting becomes popular as an attack vector to start many other types of attacks [66,65].…”
Section: Dns Threat Landscapementioning
confidence: 99%
See 1 more Smart Citation
“…Such attacks include various variants, i.e. typosquatting [63,64,5,65,66,67,68,69], bitsquatting [70,71,72], combosquatting [41], and soundsquatting [73]. Domain name squatting becomes popular as an attack vector to start many other types of attacks [66,65].…”
Section: Dns Threat Landscapementioning
confidence: 99%
“…Domain name squatting practices expose users to a variety of vulnerabilities, such as trademark infringement, monetization, malware, and scams. There exists several research works that attempted to investigate the landscape and impact of the domain squatting [65,67,41,68,66,69,72], which we define below.…”
Section: Domain Name Squattingmentioning
confidence: 99%
“…Spaulding et al [33] reviewed the typosquatting landscape, listing the models used to generate deceptive domains, the features that suggest a higher probability of typosquatting, the monetization strategies of the squatters and potential countermeasures. They also compared the effectiveness of typosquatting techniques through a user study [34]. Tahir et al [35] studied why typosquatting is effective from a human-centric perspective, predicting the likelihood of typos based on domain composition, hand anatomy and keyboard layouts.…”
Section: Related Workmentioning
confidence: 99%
“…Related to our use of network features is a line of research on traffic analysis for malware and botnet detection. Such works include [39][40][41][42][43][44], with others paying particular attention to the use of fast-flux techniques [45][46][47][48][49][50]. Support for our use of DNS features for malware analysis comes in [51][52][53].…”
Section: Related Workmentioning
confidence: 99%