首页 > 最新文献

2013 APWG eCrime Researchers Summit最新文献

英文 中文
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter #波士顿马拉松#为波士顿祈祷:分析推特上的虚假内容
Pub Date : 2013-10-20 DOI: 10.1109/ECRS.2013.6805772
Aditi Gupta, Hemank Lamba, P. Kumaraguru
Online social media has emerged as one of the prominent channels for dissemination of information during real world events. Malicious content is posted online during events, which can result in damage, chaos and monetary losses in the real world. We analyzed one such media i.e. Twitter, for content generated during the event of Boston Marathon Blasts, that occurred on April, 15th, 2013. A lot of fake content and malicious profiles originated on Twitter network during this event. The aim of this work is to perform in-depth characterization of what factors influenced in malicious content and profiles becoming viral. Our results showed that 29% of the most viral content on Twitter, during the Boston crisis were rumors and fake content; while 51% was generic opinions and comments; and rest was true information.We found that large number of users with high social reputation and verified accounts were responsible for spreading the fake content. Next, we used regression prediction model, to verify that, overall impact of all users who propagate the fake content at a given time, can be used to estimate the growth of that content in future. Many malicious accounts were created on Twitter during the Boston event, that were later suspended by Twitter. We identified over six thousand such user profiles, we observed that the creation of such profiles surged considerably right after the blasts occurred. We identified closed community structure and star formation in the interaction network of these suspended profiles amongst themselves.
在线社交媒体已经成为现实世界事件中信息传播的重要渠道之一。恶意内容在活动期间发布在网上,这可能导致现实世界中的破坏、混乱和金钱损失。我们分析了一个这样的媒体,即Twitter,在2013年4月15日发生的波士顿马拉松爆炸事件期间产生的内容。在这次事件中,Twitter网络上出现了大量虚假内容和恶意档案。这项工作的目的是对影响恶意内容和配置文件成为病毒的因素进行深入表征。我们的研究结果显示,在波士顿危机期间,Twitter上最具病毒性的内容中有29%是谣言和虚假内容;51%是一般性意见和评论;其余的都是真实的信息。我们发现,大量拥有高社会声誉和认证账户的用户负责传播虚假内容。接下来,我们使用回归预测模型来验证,在给定时间内传播虚假内容的所有用户的总体影响,可以用来估计该内容在未来的增长。在波士顿事件期间,推特上创建了许多恶意账户,后来被推特暂停。我们确定了超过6000个这样的用户配置文件,我们观察到,在爆炸发生后,这样的配置文件的创建大幅增加。我们在这些悬空剖面之间的相互作用网络中确定了封闭的群落结构和恒星形成。
{"title":"$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter","authors":"Aditi Gupta, Hemank Lamba, P. Kumaraguru","doi":"10.1109/ECRS.2013.6805772","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805772","url":null,"abstract":"Online social media has emerged as one of the prominent channels for dissemination of information during real world events. Malicious content is posted online during events, which can result in damage, chaos and monetary losses in the real world. We analyzed one such media i.e. Twitter, for content generated during the event of Boston Marathon Blasts, that occurred on April, 15th, 2013. A lot of fake content and malicious profiles originated on Twitter network during this event. The aim of this work is to perform in-depth characterization of what factors influenced in malicious content and profiles becoming viral. Our results showed that 29% of the most viral content on Twitter, during the Boston crisis were rumors and fake content; while 51% was generic opinions and comments; and rest was true information.We found that large number of users with high social reputation and verified accounts were responsible for spreading the fake content. Next, we used regression prediction model, to verify that, overall impact of all users who propagate the fake content at a given time, can be used to estimate the growth of that content in future. Many malicious accounts were created on Twitter during the Boston event, that were later suspended by Twitter. We identified over six thousand such user profiles, we observed that the creation of such profiles surged considerably right after the blasts occurred. We identified closed community structure and star formation in the interaction network of these suspended profiles amongst themselves.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130549657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
10v3.c0ns 10 v3.c0ns
Pub Date : 2013-09-01 DOI: 10.1109/ecrs.2013.6805773
Aunshul Rege
The US online dating sector is worth $2billion and has 5.5 million active registered users. This successful industry, however, is plagued by several cybercrimes that pose serious problems for dating service providers and users worldwide. Most research has addressed online scams and identity theft, which are just some of the cybercrimes occurring at dating sites. This paper moves beyond this limited scope and examines seven crimes: scams, identity theft, extortion, bot fraud, hacking, bogus dating sites, and fraudulent dating sites. The theoretical framework for this paper borrows from individual, environmental, and organizational criminological theories. Document analysis is conducted on 72 documents collected from dating sites, news and media sites, anti-scam commissions, law enforcement agencies, and government agencies, from 2000 to 2013. The paper examines 18 case studies of online dating crimes and uses a criminological approach to examine organizational dynamics, modus operandi, techniques, routines, skills, and motivations. The paper concludes by examining the problems in several existing online dating security, introduces a criminological approach to cybersecurity policy, and offers suggestions for further research.
美国在线约会行业价值20亿美元,拥有550万活跃注册用户。然而,这个成功的行业受到了一些网络犯罪的困扰,这些犯罪给全球的约会服务提供商和用户带来了严重的问题。大多数研究都针对在线诈骗和身份盗窃,这只是约会网站上发生的一些网络犯罪。本文超越了这个有限的范围,研究了七种犯罪:诈骗、身份盗窃、勒索、机器人欺诈、黑客攻击、虚假约会网站和欺诈性约会网站。本文的理论框架借鉴了个人、环境和组织犯罪学理论。论文分析了2000年至2013年间从交友网站、新闻媒体网站、反诈骗委员会、执法机关、政府机关收集的72份文件。本文研究了18个在线约会犯罪案例,并使用犯罪学方法来研究组织动态、作案手法、技术、惯例、技能和动机。最后,本文考察了几个现有的在线约会安全问题,介绍了网络安全政策的犯罪学方法,并提出了进一步研究的建议。
{"title":"10v3.c0ns","authors":"Aunshul Rege","doi":"10.1109/ecrs.2013.6805773","DOIUrl":"https://doi.org/10.1109/ecrs.2013.6805773","url":null,"abstract":"The US online dating sector is worth $2billion and has 5.5 million active registered users. This successful industry, however, is plagued by several cybercrimes that pose serious problems for dating service providers and users worldwide. Most research has addressed online scams and identity theft, which are just some of the cybercrimes occurring at dating sites. This paper moves beyond this limited scope and examines seven crimes: scams, identity theft, extortion, bot fraud, hacking, bogus dating sites, and fraudulent dating sites. The theoretical framework for this paper borrows from individual, environmental, and organizational criminological theories. Document analysis is conducted on 72 documents collected from dating sites, news and media sites, anti-scam commissions, law enforcement agencies, and government agencies, from 2000 to 2013. The paper examines 18 case studies of online dating crimes and uses a criminological approach to examine organizational dynamics, modus operandi, techniques, routines, skills, and motivations. The paper concludes by examining the problems in several existing online dating security, introduces a criminological approach to cybersecurity policy, and offers suggestions for further research.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115324532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Favicon - a clue to phishing sites detection Favicon -一个线索,以钓鱼网站检测
Pub Date : 2013-09-01 DOI: 10.1109/ECRS.2013.6805775
Guanggang Geng, Xiaodong Lee, Wei Wang, S. Tseng
Phishing is a type of scam designed to steal user's identity. Typically, anti-phishing methods either use blacklists or recognize the phishing pattern with statistical learning. This paper focuses on a tiny but powerful visual element-favicon, which is widely used by phishers but ignored by anti-phishing researchers. Indeed, only some lowest-quality phishing campaigns do not use such favicons. By analyzing the characteristic of favicon in phishing sites, an alternative phishing detection method is proposed. Favicon detection and recognition locates the suspicious brand sites, including legitimate and fake brands sites, and then PageRank and DNS filtering algorithm discriminates the sites with branding rights from fake brands sites. To validate the effectiveness of the proposed method, we carried out two different experiments. One is collecting a diverse spectrum of corpora containing 3642 phishing cases containing favicons from PhishTank, and 19585 legitimate Web pages from DMOZ and Google; experimental evaluations on the data set show that the proposed method achieved over 99.50% TPR and 0.15% FPR. The other is validating the method in the real Web query environment; a total of 517 unique phishing URLs were found and reported to the Anti-Phishing Alliance of China in a month. The experimental results demonstrate the competitive performances of favicon detection and recognition method for anti-phishing in practice.
网络钓鱼是一种旨在窃取用户身份的骗局。通常,反网络钓鱼方法要么使用黑名单,要么通过统计学习识别网络钓鱼模式。本文关注的是一个微小但功能强大的视觉元素——图标,它被网络钓鱼者广泛使用,但却被反网络钓鱼研究人员所忽视。事实上,只有一些低质量的网络钓鱼活动不使用这样的图标。通过分析网络钓鱼网站图标的特征,提出了一种替代的网络钓鱼检测方法。Favicon检测和识别定位可疑品牌网站,包括正版和假冒品牌网站,然后通过PageRank和DNS过滤算法区分具有品牌权的网站和假冒品牌网站。为了验证所提出方法的有效性,我们进行了两个不同的实验。一个是收集各种各样的语料库,其中包含3642个网络钓鱼案例,其中包含来自PhishTank的favicons,以及来自DMOZ和Google的19585个合法网页;实验结果表明,该方法的TPR和FPR分别达到99.50%和0.15%以上。二是在真实的Web查询环境中验证该方法;在一个月内,共有517个独特的网络钓鱼网址被发现并报告给中国反网络钓鱼联盟。实验结果表明,该方法在反网络钓鱼中具有较好的性能。
{"title":"Favicon - a clue to phishing sites detection","authors":"Guanggang Geng, Xiaodong Lee, Wei Wang, S. Tseng","doi":"10.1109/ECRS.2013.6805775","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805775","url":null,"abstract":"Phishing is a type of scam designed to steal user's identity. Typically, anti-phishing methods either use blacklists or recognize the phishing pattern with statistical learning. This paper focuses on a tiny but powerful visual element-favicon, which is widely used by phishers but ignored by anti-phishing researchers. Indeed, only some lowest-quality phishing campaigns do not use such favicons. By analyzing the characteristic of favicon in phishing sites, an alternative phishing detection method is proposed. Favicon detection and recognition locates the suspicious brand sites, including legitimate and fake brands sites, and then PageRank and DNS filtering algorithm discriminates the sites with branding rights from fake brands sites. To validate the effectiveness of the proposed method, we carried out two different experiments. One is collecting a diverse spectrum of corpora containing 3642 phishing cases containing favicons from PhishTank, and 19585 legitimate Web pages from DMOZ and Google; experimental evaluations on the data set show that the proposed method achieved over 99.50% TPR and 0.15% FPR. The other is validating the method in the real Web query environment; a total of 517 unique phishing URLs were found and reported to the Anti-Phishing Alliance of China in a month. The experimental results demonstrate the competitive performances of favicon detection and recognition method for anti-phishing in practice.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122764668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Voice of the customer 顾客的声音
Pub Date : 2013-09-01 DOI: 10.1109/ECRS.2013.6805771
Brad Wardman, Lisa Kelly, M. Weideman
Phishers continue to target customers of all factions of the Internet industry in an attempt to gain personal information that can be used for profit. Typical organizational responses to these attacks are the removal of the malicious content through website takedown and user education. The latter response is extremely important as it is the organization's direct communication to the customer about these attacks. The purpose of this study is to survey a number of organizations that are highly targeted in phishing attacks and measure their effectiveness in communication to their customers. This study performs an evaluation of seven organizations', across a variety of industry sectors, communication through website content, customer service phone calls, and email abuse reporting. The outcomes of this study are suggestions that can be incorporated by all of the organizations to provide a better customer experience.
网络钓鱼者继续瞄准互联网行业的所有派别的客户,试图获取可用于盈利的个人信息。典型的组织应对这些攻击是通过网站关闭和用户教育来删除恶意内容。后一种响应非常重要,因为这是组织与客户就这些攻击进行的直接沟通。本研究的目的是调查一些在网络钓鱼攻击中具有高度针对性的组织,并衡量他们与客户沟通的有效性。本研究评估了7家机构在不同行业的沟通方式,包括网站内容、客户服务电话和电子邮件滥用报告。这项研究的结果是所有组织都可以采纳的建议,以提供更好的客户体验。
{"title":"Voice of the customer","authors":"Brad Wardman, Lisa Kelly, M. Weideman","doi":"10.1109/ECRS.2013.6805771","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805771","url":null,"abstract":"Phishers continue to target customers of all factions of the Internet industry in an attempt to gain personal information that can be used for profit. Typical organizational responses to these attacks are the removal of the malicious content through website takedown and user education. The latter response is extremely important as it is the organization's direct communication to the customer about these attacks. The purpose of this study is to survey a number of organizations that are highly targeted in phishing attacks and measure their effectiveness in communication to their customers. This study performs an evaluation of seven organizations', across a variety of industry sectors, communication through website content, customer service phone calls, and email abuse reporting. The outcomes of this study are suggestions that can be incorporated by all of the organizations to provide a better customer experience.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129309248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 682
A notation for describing the steps in indicator expansion 描述指示符展开步骤的符号
Pub Date : 2013-09-01 DOI: 10.1109/ECRS.2013.6805774
Jonathan M. Spring
Indicator expansion is a process of using one or more data sources to obtain more indicators of malicious activity by identifying those related to currently known indicators. Due to the many variables in how the process is carried out, it quickly becomes difficult to capture the process that leads to an expanded set of data. Keeping track of this process is important for description to other analysts. A compact description of the process is even necessary just for the analysts doing the work to keep track of their own process and which paths have been investigated, particularly in naming files. This paper proposes a method of succinctly capturing the process of indicator expansion in a deterministic yet flexible and extensible manner. The target audience is analysts and investigators engaged in indicator expansion or directly consuming results therefrom.
指标扩展是利用一个或多个数据源,通过识别与当前已知指标相关的指标,获得更多恶意活动指标的过程。由于流程的执行方式存在许多变量,因此很难捕获导致扩展数据集的流程。跟踪此过程对于向其他分析人员描述非常重要。一个紧凑的过程描述甚至是必要的,只是为了让分析人员跟踪他们自己的过程和研究了哪些路径,特别是在命名文件中。本文提出了一种以确定性、灵活和可扩展的方式简洁地捕捉指标展开过程的方法。目标受众是从事指标扩展或直接消费结果的分析师和调查人员。
{"title":"A notation for describing the steps in indicator expansion","authors":"Jonathan M. Spring","doi":"10.1109/ECRS.2013.6805774","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805774","url":null,"abstract":"Indicator expansion is a process of using one or more data sources to obtain more indicators of malicious activity by identifying those related to currently known indicators. Due to the many variables in how the process is carried out, it quickly becomes difficult to capture the process that leads to an expanded set of data. Keeping track of this process is important for description to other analysts. A compact description of the process is even necessary just for the analysts doing the work to keep track of their own process and which paths have been investigated, particularly in naming files. This paper proposes a method of succinctly capturing the process of indicator expansion in a deterministic yet flexible and extensible manner. The target audience is analysts and investigators engaged in indicator expansion or directly consuming results therefrom.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116998103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An inquiry into money laundering tools in the Bitcoin ecosystem 对比特币生态系统中洗钱工具的调查
Pub Date : 2013-09-01 DOI: 10.1109/ECRS.2013.6805780
Malte Möser, Rainer Böhme, Dominic Breuker
We provide a first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet. Our starting point is the observation that Bitcoin attracts criminal activity as many say it is an anonymous transaction system. While this claim does not stand up to scrutiny, several services offering increased transaction anonymization have emerged in the Bitcoin ecosystem - such as Bitcoin Fog, BitLaundry, and the Send Shared functionality of Blockchain.info. Some of these services routinely handle the equivalent of 6-digit dollar amounts. In a series of experiments, we use reverse-engineering methods to understand the mode of operation and try to trace anonymized transactions back to our probe accounts. While Bitcoin Fog and Blockchain.info successfully anonymize our test transactions, we can link the input and output transactions of BitLaundry. Against the backdrop of these findings, it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system. Hence, we sketch alternative AML strategies accounting for imperfect knowledge of true identities but exploiting public information in the transaction graph, and discuss the implications for Bitcoin as a decentralized currency.
我们首次系统地介绍了比特币反洗钱(AML)的机会和局限性,比特币是一种在互联网上扩散的分散加密货币。我们的出发点是观察到比特币吸引了犯罪活动,因为许多人说它是一个匿名交易系统。虽然这种说法经不起推想,但在比特币生态系统中已经出现了几种提供增强交易匿名化的服务,例如Bitcoin Fog、BitLaundry和Blockchain.info的Send Shared功能。其中一些服务通常处理的金额相当于6位数的美元。在一系列实验中,我们使用逆向工程方法来了解操作模式,并尝试将匿名交易追溯到我们的探测账户。虽然Bitcoin Fog和Blockchain.info成功地将我们的测试交易匿名化,但我们可以将BitLaundry的输入和输出交易链接起来。在这些发现的背景下,“了解你的客户”原则似乎不太可能在比特币系统中实施。因此,我们概述了替代的反洗钱策略,考虑到对真实身份的不完全了解,但利用交易图中的公共信息,并讨论了比特币作为一种去中心化货币的影响。
{"title":"An inquiry into money laundering tools in the Bitcoin ecosystem","authors":"Malte Möser, Rainer Böhme, Dominic Breuker","doi":"10.1109/ECRS.2013.6805780","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805780","url":null,"abstract":"We provide a first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet. Our starting point is the observation that Bitcoin attracts criminal activity as many say it is an anonymous transaction system. While this claim does not stand up to scrutiny, several services offering increased transaction anonymization have emerged in the Bitcoin ecosystem - such as Bitcoin Fog, BitLaundry, and the Send Shared functionality of Blockchain.info. Some of these services routinely handle the equivalent of 6-digit dollar amounts. In a series of experiments, we use reverse-engineering methods to understand the mode of operation and try to trace anonymized transactions back to our probe accounts. While Bitcoin Fog and Blockchain.info successfully anonymize our test transactions, we can link the input and output transactions of BitLaundry. Against the backdrop of these findings, it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system. Hence, we sketch alternative AML strategies accounting for imperfect knowledge of true identities but exploiting public information in the transaction graph, and discuss the implications for Bitcoin as a decentralized currency.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129370100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 331
Modeling malicious domain name take-down dynamics: Why eCrime pays 恶意域名删除动态建模:为什么eCrime付钱
Pub Date : 2013-09-01 DOI: 10.1109/ECRS.2013.6805779
Jonathan M. Spring
Domain names drive the ubiquitous use of the Internet. Criminals and adversaries also use domain names for their enterprise. Defenders compete to remove or block such malicious domains. This is a complicated space on the Internet to measure comprehensively, as the malicious actors attempt to hide, the defenders do not like to share data or methods, and what data is public is not consistently formatted. This paper derives an ad hoc model of this competition on large, decentralized networks using a modification of Lanchester's equations for combat. The model is applied to what is known of the current state of malicious domain activity on the Internet. The model aligns with currently published research, and provides a more comprehensive description of possible strategies and limitations based on the general dynamics of the model. When taken with the economic realities and physical laws to which the Internet is bound, the model demonstrates that the current approach to removing malicious domain names is unsustainable and destined for obsolescence. However, there are technical, policy, and legal modifications to the current approach that would be effective, such as preemptively populating watch lists, limits on a registrant's registrations, and international cooperation. The results indicate that the defenders should not expect to eliminate or significantly reduce malicious domain name usage without employing new digital tactics and deploying new rules in the physical world.
域名推动了互联网的普遍使用。犯罪分子和对手也会将域名用于他们的企业。防御者竞相删除或阻止此类恶意域名。这是互联网上一个复杂的空间,难以综合衡量,因为恶意行为者试图隐藏,防御者不喜欢共享数据或方法,并且公开的数据格式不一致。本文通过对兰彻斯特战斗方程的修改,导出了大型分散网络上这种竞争的特别模型。该模型应用于已知的Internet上恶意域活动的当前状态。该模型与当前发表的研究保持一致,并根据模型的一般动态对可能的策略和局限性提供了更全面的描述。当考虑到互联网所受的经济现实和物理定律时,该模型表明,目前清除恶意域名的方法是不可持续的,注定要过时。然而,在技术、政策和法律上对目前的方法进行一些有效的修改,例如预先填充观察名单、限制注册人的注册以及开展国际合作。结果表明,如果不采用新的数字策略并在物理世界中部署新的规则,防御者不应期望消除或显着减少恶意域名的使用。
{"title":"Modeling malicious domain name take-down dynamics: Why eCrime pays","authors":"Jonathan M. Spring","doi":"10.1109/ECRS.2013.6805779","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805779","url":null,"abstract":"Domain names drive the ubiquitous use of the Internet. Criminals and adversaries also use domain names for their enterprise. Defenders compete to remove or block such malicious domains. This is a complicated space on the Internet to measure comprehensively, as the malicious actors attempt to hide, the defenders do not like to share data or methods, and what data is public is not consistently formatted. This paper derives an ad hoc model of this competition on large, decentralized networks using a modification of Lanchester's equations for combat. The model is applied to what is known of the current state of malicious domain activity on the Internet. The model aligns with currently published research, and provides a more comprehensive description of possible strategies and limitations based on the general dynamics of the model. When taken with the economic realities and physical laws to which the Internet is bound, the model demonstrates that the current approach to removing malicious domain names is unsustainable and destined for obsolescence. However, there are technical, policy, and legal modifications to the current approach that would be effective, such as preemptively populating watch lists, limits on a registrant's registrations, and international cooperation. The results indicate that the defenders should not expect to eliminate or significantly reduce malicious domain name usage without employing new digital tactics and deploying new rules in the physical world.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"622 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115828026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An exploration of the factors affecting the advertised price for stolen data 对影响被盗数据广告价格的因素的探讨
Pub Date : 2013-09-01 DOI: 10.1109/ECRS.2013.6805781
T. Holt, Y. Chua, O. Smirnova
A growing body of research has developed exploring the ways that data thieves dispose of information acquired through phishing, hacking, and mass data breaches. These studies suggest a range of products are sold in forums and IRC channels at a fraction of its true value. There is also substantial risk for participants as they may be cheated by vendors who may not deliver products or simply provide invalid data. These conditions have led researchers to question the nature of the market, in that the actual price for data is much higher than what is advertised based on the risk of repeatedly purchasing bad data. As a result, there may be multiple markets for data operating with different pricing based on the prevalence of unreliable vendors. In order to explore these issues, this study utilizes a sample of threads from 13 Russian and English language forums involved in the sale of stolen data to consider the influence of various social conditions on the advertised price for dumps and eBay and PayPal credentials. The findings suggest that prices are lower in markets where vendors may cheat customers, and higher in markets that appear more organized and legitimate. The implications of this study for future research are examined in depth.
越来越多的研究已经开始探索数据窃贼如何处理通过网络钓鱼、黑客攻击和大规模数据泄露获得的信息。这些研究表明,一系列产品在论坛和IRC渠道上以其真实价值的一小部分出售。参与者也有很大的风险,因为他们可能被可能不交付产品或只是提供无效数据的供应商欺骗。这些情况导致研究人员质疑市场的本质,因为数据的实际价格远远高于基于反复购买不良数据的风险而宣传的价格。因此,根据不可靠供应商的普遍程度,可能会有多个数据市场以不同的定价运行。为了探讨这些问题,本研究利用了13个涉及销售被盗数据的俄语和英语论坛的帖子样本,以考虑各种社会条件对转储和eBay和PayPal凭证的广告价格的影响。研究结果表明,在供应商可能欺骗消费者的市场,价格较低,而在看起来更有组织、更合法的市场,价格较高。本研究对未来研究的意义进行了深入探讨。
{"title":"An exploration of the factors affecting the advertised price for stolen data","authors":"T. Holt, Y. Chua, O. Smirnova","doi":"10.1109/ECRS.2013.6805781","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805781","url":null,"abstract":"A growing body of research has developed exploring the ways that data thieves dispose of information acquired through phishing, hacking, and mass data breaches. These studies suggest a range of products are sold in forums and IRC channels at a fraction of its true value. There is also substantial risk for participants as they may be cheated by vendors who may not deliver products or simply provide invalid data. These conditions have led researchers to question the nature of the market, in that the actual price for data is much higher than what is advertised based on the risk of repeatedly purchasing bad data. As a result, there may be multiple markets for data operating with different pricing based on the prevalence of unreliable vendors. In order to explore these issues, this study utilizes a sample of threads from 13 Russian and English language forums involved in the sale of stolen data to consider the influence of various social conditions on the advertised price for dumps and eBay and PayPal credentials. The findings suggest that prices are lower in markets where vendors may cheat customers, and higher in markets that appear more organized and legitimate. The implications of this study for future research are examined in depth.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Empirical analysis of factors affecting malware URL detection 恶意软件URL检测影响因素实证分析
Pub Date : 2013-09-01 DOI: 10.1109/ECRS.2013.6805776
Marie Vasek, T. Moore
Many organizations, from antivirus companies to motivated volunteers, maintain blacklists of URLs suspected of distributing malware in order to protect users. Detection rates can vary widely, but it is not known why. We posit that much variation can be explained by differences in the type of malware and differences in the blacklists themselves. To that end, we conducted an empirical analysis of 722 malware URLs submitted to the Malware Domain List (MDL) over 6 months in 2012-2013. We ran each URL through VirusTotal, a tool that allowed us to check each URL against 38 different malware URL blacklists, within an hour from when they were first blacklisted by the MDL. We followed up on each for two weeks following. We then ran logisitic regressions and Cox proportional hazard models to identify factors affecting blacklist accuracy and speed. We find that URLs belonging to known exploit kits such as Blackhole and Styx were more likely to be blacklisted and blacklisted quicker. We also found that blacklists that are used to actively block URLs are more effective than those that do not, and furthermore that paid services are more effective than free ones.
许多组织,从反病毒公司到积极的志愿者,都维护着涉嫌传播恶意软件的url黑名单,以保护用户。检出率差异很大,但原因尚不清楚。我们认为,许多变化可以通过恶意软件类型的差异和黑名单本身的差异来解释。为此,我们对2012-2013年6个月内提交到恶意软件域列表(MDL)的722个恶意软件url进行了实证分析。我们通过VirusTotal对每个URL进行了测试,该工具允许我们在一个小时内将每个URL与38个不同的恶意软件URL黑名单进行比对。我们对每个人都进行了两周的跟踪调查。然后,我们运行逻辑回归和Cox比例风险模型来确定影响黑名单准确性和速度的因素。我们发现,属于已知漏洞利用工具包(如Blackhole和Styx)的url更有可能被列入黑名单,而且被列入黑名单的速度更快。我们还发现,用于主动阻止url的黑名单比那些不这样做的黑名单更有效,而且付费服务比免费服务更有效。
{"title":"Empirical analysis of factors affecting malware URL detection","authors":"Marie Vasek, T. Moore","doi":"10.1109/ECRS.2013.6805776","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805776","url":null,"abstract":"Many organizations, from antivirus companies to motivated volunteers, maintain blacklists of URLs suspected of distributing malware in order to protect users. Detection rates can vary widely, but it is not known why. We posit that much variation can be explained by differences in the type of malware and differences in the blacklists themselves. To that end, we conducted an empirical analysis of 722 malware URLs submitted to the Malware Domain List (MDL) over 6 months in 2012-2013. We ran each URL through VirusTotal, a tool that allowed us to check each URL against 38 different malware URL blacklists, within an hour from when they were first blacklisted by the MDL. We followed up on each for two weeks following. We then ran logisitic regressions and Cox proportional hazard models to identify factors affecting blacklist accuracy and speed. We find that URLs belonging to known exploit kits such as Blackhole and Styx were more likely to be blacklisted and blacklisted quicker. We also found that blacklists that are used to actively block URLs are more effective than those that do not, and furthermore that paid services are more effective than free ones.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127201459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Phish-Net: Investigating phish clusters using drop email addresses 网络钓鱼:使用丢弃的电子邮件地址调查网络钓鱼集群
Pub Date : 2013-09-01 DOI: 10.1109/ECRS.2013.6805777
Shams Zawoad, A. Dutta, A. Sprague, Ragib Hasan, Jason Britt, Gary Warner
The most common approach to collect users' secret credentials from phishing websites is to email the credentials to criminals' email addresses which we call drop email addresses. We propose a clustering algorithm, which is based on the assumption that if there is a common drop email address found in the phishing kits from two different phishing websites, then these two websites are directly related. Based on obfuscated and plain-text drop email addresses, we produce two types of clusters: one is called phishing kit creator cluster and another is kit user cluster. Clustering related phishing websites using our proposed approach will allow phishing investigators to focus their investigative efforts on important phishing attacks rather than random attacks. For example, in January 2013, 1475 phishing websites are hosted by only 317 groups of phishers (who we will call kit users). Our scheme will thus help investigators to narrow investigation to pervasive phishing criminals. By analyzing the clusters generated using our clustering approach, we can determine the strongest and most pervasive phishers, and phishing kit creators, relationships between phishing kit creators and phishing kit users, and the most dominant phisher of one group. These findings have real-life implication in phishing investigation paradigm.
从钓鱼网站收集用户秘密凭证的最常见方法是将凭证通过电子邮件发送到犯罪分子的电子邮件地址,我们称之为删除电子邮件地址。我们提出了一种聚类算法,该算法基于这样的假设:如果在来自两个不同的网络钓鱼网站的网络钓鱼工具包中发现了一个共同的drop电子邮件地址,那么这两个网站就直接相关。基于模糊和纯文本丢弃的电子邮件地址,我们产生了两种类型的集群:一种称为钓鱼工具包创建者集群,另一种称为工具包用户集群。使用我们提出的方法聚类相关的网络钓鱼网站将允许网络钓鱼调查人员将他们的调查工作集中在重要的网络钓鱼攻击上,而不是随机攻击上。例如,2013年1月,1475个网络钓鱼网站由317个网络钓鱼组织(我们称之为工具包用户)托管。因此,我们的方案将帮助调查人员将调查范围缩小到无处不在的网络钓鱼罪犯。通过分析使用我们的聚类方法生成的聚类,我们可以确定最强和最普遍的网络钓鱼者、网络钓鱼工具包创建者、网络钓鱼工具包创建者和网络钓鱼工具包用户之间的关系,以及一组中最主要的网络钓鱼者。这些发现对网络钓鱼调查范式具有现实意义。
{"title":"Phish-Net: Investigating phish clusters using drop email addresses","authors":"Shams Zawoad, A. Dutta, A. Sprague, Ragib Hasan, Jason Britt, Gary Warner","doi":"10.1109/ECRS.2013.6805777","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805777","url":null,"abstract":"The most common approach to collect users' secret credentials from phishing websites is to email the credentials to criminals' email addresses which we call drop email addresses. We propose a clustering algorithm, which is based on the assumption that if there is a common drop email address found in the phishing kits from two different phishing websites, then these two websites are directly related. Based on obfuscated and plain-text drop email addresses, we produce two types of clusters: one is called phishing kit creator cluster and another is kit user cluster. Clustering related phishing websites using our proposed approach will allow phishing investigators to focus their investigative efforts on important phishing attacks rather than random attacks. For example, in January 2013, 1475 phishing websites are hosted by only 317 groups of phishers (who we will call kit users). Our scheme will thus help investigators to narrow investigation to pervasive phishing criminals. By analyzing the clusters generated using our clustering approach, we can determine the strongest and most pervasive phishers, and phishing kit creators, relationships between phishing kit creators and phishing kit users, and the most dominant phisher of one group. These findings have real-life implication in phishing investigation paradigm.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132698295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2013 APWG eCrime Researchers Summit
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1