首页 > 最新文献

2013 APWG eCrime Researchers Summit最新文献

英文 中文
Monitoring a fast flux botnet using recursive and passive DNS: A case study 使用递归和被动DNS监控快速流量僵尸网络:一个案例研究
Pub Date : 2013-09-01 DOI: 10.1109/ECRS.2013.6805783
Dhia Mahjoub
Fast flux, an evasion technique that has been around for years, continues to be widely used by cybercriminals today. In this case study, we describe a real-time monitoring and detection system that leverages recursive and passive DNS to track the Kelihos fast flux botnet. We track how the botnet grows its population of infected hosts, and detect, in real-time, the newest Kelihos fast flux domains that are being hosted by the botnet. Our analysis will present results on various components and attributes of the infrastructure leveraged by the Kelihos fast flux botnet. These include: domain TLD distribution, botnet geo-distribution, botnet daily cycles, distribution of operating systems used by the botnet machines, daily-discovered fast flux domains, domain and IP lifetime distribution, as well as specific examples of usage that highlight malicious campaigns.
快速流量是一种已经存在多年的逃避技术,今天仍然被网络犯罪分子广泛使用。在本案例研究中,我们描述了一个实时监控和检测系统,该系统利用递归和被动DNS来跟踪Kelihos快速通量僵尸网络。我们跟踪僵尸网络如何增加其受感染主机的数量,并实时检测由僵尸网络托管的最新Kelihos快速通量域。我们的分析将展示Kelihos快速通量僵尸网络利用的基础设施的各种组件和属性的结果。这些包括:域名TLD分布,僵尸网络地理分布,僵尸网络每日周期,僵尸网络机器使用的操作系统分布,每日发现的快速通量域,域名和IP生命周期分布,以及突出恶意活动的特定使用示例。
{"title":"Monitoring a fast flux botnet using recursive and passive DNS: A case study","authors":"Dhia Mahjoub","doi":"10.1109/ECRS.2013.6805783","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805783","url":null,"abstract":"Fast flux, an evasion technique that has been around for years, continues to be widely used by cybercriminals today. In this case study, we describe a real-time monitoring and detection system that leverages recursive and passive DNS to track the Kelihos fast flux botnet. We track how the botnet grows its population of infected hosts, and detect, in real-time, the newest Kelihos fast flux domains that are being hosted by the botnet. Our analysis will present results on various components and attributes of the infrastructure leveraged by the Kelihos fast flux botnet. These include: domain TLD distribution, botnet geo-distribution, botnet daily cycles, distribution of operating systems used by the botnet machines, daily-discovered fast flux domains, domain and IP lifetime distribution, as well as specific examples of usage that highlight malicious campaigns.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122516430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Honor among thieves: A common's analysis of cybercrime economies 盗贼之间的荣誉:一个普通人对网络犯罪经济的分析
Pub Date : 1900-01-01 DOI: 10.1109/ECRS.2013.6805778
Sadia Afroz, Vaibhav Garg, Damon McCoy, R. Greenstadt
Underground forums enable technical innovation among criminals as well as allow for specialization, thereby making cybercrime economically efficient. The success of these forums is contingent on collective action twixt a variety of stakeholders. What distinguishes sustainable forums from those that fail? We begin to address these questions by examining underground forums under an economic framework that has been used to prescribe institutional choices in other domains, such as fisheries and forests. This framework examines the sustainability of cybercrime forums given a self governance model for a common-pool resource. We analyze five distinct forums: AntiChat (AC), BadHackerZ (BH), BlackhatWorld (BW), Carders (CC), and L33tCrew (LC). Our analyses indicate that successful/sustainable forums: 1) have easy/cheap community monitoring, 2) show moderate increase in new members, 3) do not witness reduced connectivity as the network size increases, 4) limit privileged access, and 5) enforce bans or fines on offending members. We define success as forums demonstrating small world effect.
地下论坛使犯罪分子能够进行技术创新,并允许专业化,从而使网络犯罪具有经济效益。这些论坛的成功取决于各利益攸关方之间的集体行动。可持续论坛与失败论坛的区别是什么?我们开始通过审查在经济框架下的地下论坛来解决这些问题,这种经济框架曾被用来规定渔业和森林等其他领域的体制选择。该框架考察了网络犯罪论坛的可持续性,并给出了一个公共资源池的自我管理模型。我们分析了五个不同的论坛:AntiChat (AC)、BadHackerZ (BH)、BlackhatWorld (BW)、Carders (CC)和L33tCrew (LC)。我们的分析表明,成功/可持续的论坛:1)有简单/廉价的社区监控,2)新成员适度增加,3)随着网络规模的增加,连接不会减少,4)限制特权访问,5)对违规成员实施禁令或罚款。我们把成功定义为展示小世界效应的论坛。
{"title":"Honor among thieves: A common's analysis of cybercrime economies","authors":"Sadia Afroz, Vaibhav Garg, Damon McCoy, R. Greenstadt","doi":"10.1109/ECRS.2013.6805778","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805778","url":null,"abstract":"Underground forums enable technical innovation among criminals as well as allow for specialization, thereby making cybercrime economically efficient. The success of these forums is contingent on collective action twixt a variety of stakeholders. What distinguishes sustainable forums from those that fail? We begin to address these questions by examining underground forums under an economic framework that has been used to prescribe institutional choices in other domains, such as fisheries and forests. This framework examines the sustainability of cybercrime forums given a self governance model for a common-pool resource. We analyze five distinct forums: AntiChat (AC), BadHackerZ (BH), BlackhatWorld (BW), Carders (CC), and L33tCrew (LC). Our analyses indicate that successful/sustainable forums: 1) have easy/cheap community monitoring, 2) show moderate increase in new members, 3) do not witness reduced connectivity as the network size increases, 4) limit privileged access, and 5) enforce bans or fines on offending members. We define success as forums demonstrating small world effect.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program Folex:草药和假冒奢侈品联盟计划的分析
Pub Date : 1900-01-01 DOI: 10.1109/ECRS.2013.6805782
Mohammad Karami, Shiva Ghaemi, Damon McCoy
The profitability of the underground criminal business of counterfeit or unauthorized products is a major funding source that drives the illegal online advertisement industry. While it is clear that underground online affiliate-based programs are profitable for their owners, the precise business operations of such organizations are unknown to a large extent. In this study, we present the results of our analysis of a replica and herbal supplements affiliate program based on leaked ground truth data. The dataset covers a period of over two years and includes more than $6 million in sale records for an affiliate program known as Tower of Power (TowPow) focusing on the herbal supplements and counterfeit luxury goods market. In this paper we provide a detailed empirical analysis of the participating affiliates, sales dynamics, revenue sharing, domain usage patterns and conversion rates.
假冒或未经授权产品的地下犯罪业务的利润是推动非法网络广告行业的主要资金来源。虽然很明显,地下网络附属项目对其所有者来说是有利可图的,但这些组织的确切商业运作在很大程度上是未知的。在这项研究中,我们提出了我们的分析结果的副本和草药补充剂附属计划基于泄露的地面真相数据。该数据集涵盖了两年多的时间,其中包括一个名为Tower of Power (TowPow)的附属项目的600多万美元的销售记录,该项目专注于草药补充剂和假冒奢侈品市场。在本文中,我们提供了一个详细的实证分析,参与子公司,销售动态,收入分享,域名使用模式和转化率。
{"title":"Folex: An analysis of an herbal and counterfeit luxury goods affiliate program","authors":"Mohammad Karami, Shiva Ghaemi, Damon McCoy","doi":"10.1109/ECRS.2013.6805782","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805782","url":null,"abstract":"The profitability of the underground criminal business of counterfeit or unauthorized products is a major funding source that drives the illegal online advertisement industry. While it is clear that underground online affiliate-based programs are profitable for their owners, the precise business operations of such organizations are unknown to a large extent. In this study, we present the results of our analysis of a replica and herbal supplements affiliate program based on leaked ground truth data. The dataset covers a period of over two years and includes more than $6 million in sale records for an affiliate program known as Tower of Power (TowPow) focusing on the herbal supplements and counterfeit luxury goods market. In this paper we provide a detailed empirical analysis of the participating affiliates, sales dynamics, revenue sharing, domain usage patterns and conversion rates.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114656298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Password advice shouldn't be boring: Visualizing password guessing attacks 密码建议不应该是无聊的:可视化密码猜测攻击
Pub Date : 1900-01-01 DOI: 10.1109/ECRS.2013.6805770
L. Zhang-Kennedy, S. Chiasson, R. Biddle
Users are susceptible to password guessing attacks when they create weak passwords. Despite an abundance of text-based password advice, it appears insufficient to help home users create strong memorable passwords. We propose that users would be empowered to make better password choices if they understood how password guessing attacks work through visual communication. We created three infographic posters and an online educational comic to help users to learn about the threats. We conducted two studies to assess their effectiveness. All four methods led to superior learning outcomes than the text-alone approach. Our pre-test questionnaires also highlighted that users' understanding of password guessing attacks is limited to a “target” mental model. One week after viewing our materials, the majority of users created strong sample passwords, and correctly described all three attacks: targeted, dictionary, and brute-force.
当用户创建弱密码时,他们很容易受到密码猜测攻击。尽管有大量基于文本的密码建议,但它似乎不足以帮助家庭用户创建强而难忘的密码。我们建议,如果用户了解密码猜测攻击如何通过视觉通信工作,他们将有权做出更好的密码选择。我们制作了三张信息图表海报和一个在线教育漫画,以帮助用户了解这些威胁。我们进行了两项研究来评估它们的有效性。所有四种方法都比单纯的文本学习方法取得了更好的学习效果。我们的预测问卷还强调,用户对密码猜测攻击的理解仅限于“目标”心理模型。在查看我们的资料一周后,大多数用户创建了强大的示例密码,并正确描述了所有三种攻击:目标攻击、字典攻击和暴力攻击。
{"title":"Password advice shouldn't be boring: Visualizing password guessing attacks","authors":"L. Zhang-Kennedy, S. Chiasson, R. Biddle","doi":"10.1109/ECRS.2013.6805770","DOIUrl":"https://doi.org/10.1109/ECRS.2013.6805770","url":null,"abstract":"Users are susceptible to password guessing attacks when they create weak passwords. Despite an abundance of text-based password advice, it appears insufficient to help home users create strong memorable passwords. We propose that users would be empowered to make better password choices if they understood how password guessing attacks work through visual communication. We created three infographic posters and an online educational comic to help users to learn about the threats. We conducted two studies to assess their effectiveness. All four methods led to superior learning outcomes than the text-alone approach. Our pre-test questionnaires also highlighted that users' understanding of password guessing attacks is limited to a “target” mental model. One week after viewing our materials, the majority of users created strong sample passwords, and correctly described all three attacks: targeted, dictionary, and brute-force.","PeriodicalId":110678,"journal":{"name":"2013 APWG eCrime Researchers Summit","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128367524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
期刊
2013 APWG eCrime Researchers Summit
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1