A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

@ spam: the underground on 140 characters or less

C Grier, K Thomas, V Paxson, M Zhang - … of the 17th ACM conference on …, 2010 - dl.acm.org
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million
URLs posted to the site point to phishing, malware, and scams listed on popular blacklists …

[PDF][PDF] Building a dynamic reputation system for {DNS}

M Antonakakis, R Perdisci, D Dagon, W Lee… - 19th USENIX Security …, 2010 - usenix.org
Abstract The Domain Name System (DNS) is an essential protocol used by both legitimate
Internet applications and cyber attacks. For example, botnets rely on DNS to support agile …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

Method and system for detecting DGA-based malware

M Antonakakis, R Perdisci, W Lee… - US Patent …, 2018 - Google Patents
Abstract System and method for detecting a domain generation algorithm (DGA),
comprising: performing processing associated with clustering, utilizing a name-based …

Click trajectories: End-to-end analysis of the spam value chain

K Levchenko, A Pitsillidis, N Chachra… - … ieee symposium on …, 2011 - ieeexplore.ieee.org
Spam-based advertising is a business. While it has engendered both widespread antipathy
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …

Cloudy with a chance of breach: Forecasting cyber security incidents

Y Liu, A Sarabi, J Zhang, P Naghizadeh… - 24th USENIX Security …, 2015 - usenix.org
In this study we characterize the extent to which cyber security incidents, such as those
referenced by Verizon in its annual Data Breach Investigations Reports (DBIR), can be …

Rating network security posture and comparing network maliciousness

M Liu, M Bailey, M Karir, Y Liu, J Zhang - US Patent 10,038,703, 2018 - Google Patents
Embodiments are disclosed for profiling network-level malicious activity. Profiling
embodiments include observing malicious activity, representing such activity in accordance …

Method and system for determining whether domain names are legitimate or malicious

M Antonakakis, R Perdisci, D Dagon, W Lee - US Patent 9,516,058, 2016 - Google Patents
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …

Cross-layer detection of malicious websites

L Xu, Z Zhan, S Xu, K Ye - Proceedings of the third ACM conference on …, 2013 - dl.acm.org
Web threats pose the most significant cyber threat. Websites have been developed or
manipulated by attackers for use as attack tools. Existing malicious website detection …