Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterNovember 2024
Poster: Investigating Autonomous Systems Recurrently Causing Unexplained (Sub)MOAS Events
IMC '24: Proceedings of the 2024 ACM on Internet Measurement ConferencePages 765–766https://doi.org/10.1145/3646547.3689669The Border Gateway Protocol (BGP) is the de facto routing protocol of the Internet. In BGP, networks (Autonomous Systems, ASes) advertise to neighboring ASes the IP address blocks (IP prefixes) they host and the ones hosted by other ASes towards which ...
- short-paperNovember 2024
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
- Enze Liu,
- George Kappos,
- Eric Mugnier,
- Luca Invernizzi,
- Stefan Savage,
- David Tao,
- Kurt Thomas,
- Geoffrey M. Voelker,
- Sarah Meiklejohn
IMC '24: Proceedings of the 2024 ACM on Internet Measurement ConferencePages 704–712https://doi.org/10.1145/3646547.3689005The Internet's combination of low communication cost, global reach, and functional anonymity has allowed fraudulent scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach ...
- research-articleOctober 2022
Illuminating large-scale IPv6 scanning in the internet
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 410–418https://doi.org/10.1145/3517745.3561452While scans of the IPv4 space are ubiquitous, today little is known about scanning activity in the IPv6 Internet. In this work, we present a longitudinal and detailed empirical study on large-scale IPv6 scanning behavior in the Internet, based on ...
- extended-abstractJuly 2020
Cyber security education for children through gamification: research plan and perspectives
IDC '20: Proceedings of the 2020 ACM Interaction Design and Children Conference: Extended AbstractsPages 9–13https://doi.org/10.1145/3397617.3398030With the advancement of technology and the development of new tools, games, applications and social media sites, it is getting difficult every day to keep up with threats and vulnerabilities associated with these tools, apps or websites, especially for ...
- surveyJanuary 2017
Abuse Reporting and the Fight Against Cybercrime
ACM Computing Surveys (CSUR), Volume 49, Issue 4Article No.: 68, Pages 1–27https://doi.org/10.1145/3003147Cybercriminal activity has exploded in the past decade, with diverse threats ranging from phishing attacks to botnets and drive-by-downloads afflicting millions of computers worldwide. In response, a volunteer defense has emerged, led by security ...
-
- research-articleJanuary 2017
Parallel phishing attack recognition using software agents
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 32, Issue 5Pages 3273–3284https://doi.org/10.3233/JIFS-169270Internet phishing has become a continual threat that keeps growing day by day. Phishing takes advantage of the user’s trust and use social engineering techniques to deceive them. Despite having several anti-phishing strategies, the threat of phishing is ...
- short-paperOctober 2016
Poisoning the Well: Exploring the Great Firewall's Poisoned DNS Responses
WPES '16: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic SocietyPages 95–98https://doi.org/10.1145/2994620.2994636One of the primary filtering methods that the Great Firewall of China (GFW) relies on is poisoning DNS responses for certain domains. When a DNS request is poisoned by the GFW, multiple DNS responses are received - both legitimate and poisoned ...
- invited-talkMay 2016
It's Time for An Internet-wide Recommitment to Measurement: And Here's How We Should Do It
WTMC '16: Proceedings of the 2016 ACM International on Workshop on Traffic Measurements for CybersecurityPages 1–2https://doi.org/10.1145/2903185.2903186There has never been a greater need for comprehensive Internet metrics than now. Even basic security-critical facts about the Internet, such as "How many systems are botted?" or "What networks still don't do Source Address Validation?" remain murky and ...
- abstractMay 2016
User Disbelief in Privacy Paradox: Heuristics that determine Disclosure
CHI EA '16: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing SystemsPages 2837–2843https://doi.org/10.1145/2851581.2892413We conducted a series of in-depth focus groups wherein users provided rationales for their own online privacy behaviors. Our data suggest that individuals often take action with little thought or evaluation, even showing surprise when confronted with ...
- ArticleDecember 2014
Event Pattern Discovery on IDS Traces of Cloud Services
BDCLOUD '14: Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud ComputingPages 25–32https://doi.org/10.1109/BDCloud.2014.92The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse the complex data patterns appearing therein as based on the pre-defined intrusion 'detection' rule sets. As IDS traces monitor large groups of servers, ...
- ArticleNovember 2014
Internet Security Protection in Personal Sensitive Information
CIS '14: Proceedings of the 2014 Tenth International Conference on Computational Intelligence and SecurityPages 628–632https://doi.org/10.1109/CIS.2014.129At the present, personal sensitive information protection is faced with serious situation. In order to solve the problems in personal sensitive information protection in internet, the model of security protection in personal sensitive information is ...
- research-articleOctober 2014
IP fast hopping protocol design
CEE-SECR '14: Proceedings of the 10th Central and Eastern European Software Engineering Conference in RussiaArticle No.: 11, Pages 1–5https://doi.org/10.1145/2687233.2687238Denial-of-Service attacks are the largest threat to Internet and the Internet of Things despite the fact that a large number of defense approaches has been proposed by the research community. In this paper we introduce IP Fast Hopping, effective network ...
- research-articleSeptember 2014
The secure and trustable distributed name system pattern
PLoP '14: Proceedings of the 21st Conference on Pattern Languages of ProgramsArticle No.: 16, Pages 1–7A directory is a mapping from names to values. Directories include systems like DNS, a hierarchical distributed naming system for resources connected to the Internet. DNS associates addresses with domain names assigned to each of the participating ...
- research-articleAugust 2013
Spatio-temporal mining of software adoption & penetration
ASONAM '13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 878–885https://doi.org/10.1145/2492517.2500244How does malware propagate? Does it form spikes over time? Does it resemble the propagation pattern of benign files, such as software patches? Does it spread uniformly over countries? How long does it take for a URL that distributes malware to be ...
- articleMarch 2013
An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking Attacks
Information Security Journal: A Global Perspective (ISJGP), Volume 22, Issue 2Pages 55–67https://doi.org/10.1080/19393555.2013.783952The HTTP protocol is designed for stateless transactions, but many Web applications require a session to be maintained between a Web browser and a server creating a stateful environment. Each Web application decides how its session is managed and needs ...
- research-articleJanuary 2013
Anatomy of drive-by download attack
AISC '13: Proceedings of the Eleventh Australasian Information Security Conference - Volume 138Pages 49–58Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques ...
- ArticleNovember 2011
Mapping from student domain into website category
ICONIP'11: Proceedings of the 18th international conference on Neural Information Processing - Volume Part IIPages 11–17https://doi.org/10.1007/978-3-642-24958-7_2The existing e-learning environments focus on the reusability of learning resources not adaptable to suit learners' needs [1]. Previous research shows that users' personalities have impact on their Internet behaviours and preferences. This study ...
- ArticleOctober 2011
Hybrid feature selection for phishing email detection
Phishing emails are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. Through an analysis of a number of phishing and ham email collected, this paper focused on ...
- ArticleApril 2011
Observation and Analysis on Spam Sending Behavior
CMC '11: Proceedings of the 2011 Third International Conference on Communications and Mobile ComputingPages 19–22https://doi.org/10.1109/CMC.2011.128Due to Internet, people prefer using emails instead of traditional post mails, because of its simple and easy to use. Meanwhile unsolicited emails (spam) become a serious problem, as sending bulk emails are almost cost free in terms of time and money. ...
- research-articleFebruary 2011
Communication based vulnerabilities and script based solvabilities
ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & SecurityPages 477–482https://doi.org/10.1145/1947940.1948039World trade and related business ventures are more or less dependent on communication. Information content of communication is to be protected as miscommunication or incorrect information may ruin any business prospect. Communication using Internet or ...