Measuring the changing cost of cybercrime

R Anderson, C Barton, R Böhme… - The 18th Annual …, 2019 - research.ed.ac.uk
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …

Abuse reporting and the fight against cybercrime

MH Jhaveri, O Cetin, C Gañán, T Moore… - ACM Computing Surveys …, 2017 - dl.acm.org
Cybercriminal activity has exploded in the past decade, with diverse threats ranging from
phishing attacks to botnets and drive-by-downloads afflicting millions of computers …

Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime

B Dupont - Crime, law and social change, 2017 - Springer
Botnets currently pose the most serious threat to the digital ecosystem, providing an
infrastructure that enables bank fraud, distributed denial of service attacks (DDoS), and click …

[PDF][PDF] Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.

O Çetin, C Ganán, L Altena, T Kasama, D Inoue… - NDSS, 2019 - pure.tudelft.nl
With the rise of IoT botnets, the remediation of infected devices has become a critical task.
As over 87% of these devices reside in broadband networks, this task will fall primarily to …

Mitigating Malware Threats at Small Medium Enterprise (SME) Organisation: A Review and Framework

MMA Mutalib, Z Zainol… - 2021 6th IEEE International …, 2021 - ieeexplore.ieee.org
Malware threat poses consequences, damage, and impact to businesses, resulting in
financial losses, operation interruption and reputation damage. The cybercriminal takes …

Private active cyber defense and (international) cyber security—pushing the line?

D Broeders - Journal of Cybersecurity, 2021 - academic.oup.com
Abstract Private sector Active Cyber Defence (ACD) lies on the intersection of domestic
security and international security and is a recurring subject, often under the more …

Can isps help mitigate iot malware? a longitudinal study of broadband isp security efforts

A Noroozian, ET Rodriguez… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
For the mitigation of compromised Internet of Things (IoT) devices we rely on Internet
Service Providers (ISPs) and their users. Given that devices are in the hands of their …

Who gets the boot? analyzing victimization by ddos-as-a-service

A Noroozian, M Korczyński, CH Gañan… - Research in Attacks …, 2016 - Springer
A lot of research has been devoted to understanding the technical properties of amplification
DDoS attacks and the emergence of the DDoS-as-a-service economy, especially the so …

Let me out! Evaluating the effectiveness of quarantining compromised users in walled gardens

O Çetin, C Ganán, L Altena… - … Symposium on Usable …, 2018 - usenix.org
In the fight to clean up malware-infected machines, notifications from Internet Service
Providers (ISPs) to their customers play a crucial role. Since stand-alone notifications are …

[HTML][HTML] Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure {IoT}

N Sombatruang, T Caulfield, I Becker, A Fujita… - 32nd USENIX Security …, 2023 - usenix.org
Access control configurations are gatekeepers to block unwelcome access to sensitive data.
Unfortunately, system administrators (sysadmins) sometimes over-grant permissions when …