A survey on malicious domains detection through DNS data analysis
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …
@ spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million
URLs posted to the site point to phishing, malware, and scams listed on popular blacklists …
URLs posted to the site point to phishing, malware, and scams listed on popular blacklists …
[PDF][PDF] Building a dynamic reputation system for {DNS}
Abstract The Domain Name System (DNS) is an essential protocol used by both legitimate
Internet applications and cyber attacks. For example, botnets rely on DNS to support agile …
Internet applications and cyber attacks. For example, botnets rely on DNS to support agile …
Method and system for detecting malicious and/or botnet-related domain names
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
Method and system for detecting DGA-based malware
Abstract System and method for detecting a domain generation algorithm (DGA),
comprising: performing processing associated with clustering, utilizing a name-based …
comprising: performing processing associated with clustering, utilizing a name-based …
Click trajectories: End-to-end analysis of the spam value chain
Spam-based advertising is a business. While it has engendered both widespread antipathy
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …
Cloudy with a chance of breach: Forecasting cyber security incidents
In this study we characterize the extent to which cyber security incidents, such as those
referenced by Verizon in its annual Data Breach Investigations Reports (DBIR), can be …
referenced by Verizon in its annual Data Breach Investigations Reports (DBIR), can be …
Rating network security posture and comparing network maliciousness
Embodiments are disclosed for profiling network-level malicious activity. Profiling
embodiments include observing malicious activity, representing such activity in accordance …
embodiments include observing malicious activity, representing such activity in accordance …
Method and system for determining whether domain names are legitimate or malicious
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
Cross-layer detection of malicious websites
Web threats pose the most significant cyber threat. Websites have been developed or
manipulated by attackers for use as attack tools. Existing malicious website detection …
manipulated by attackers for use as attack tools. Existing malicious website detection …