Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services

B Collier, DR Thomas, R Clayton, A Hutchings… - Policing and …, 2022 - Taylor & Francis
We document and evaluate emerging policing strategies that are resha** how centralised
law enforcement agencies deal with online cybercrime markets. The first of these we term …

[HTML][HTML] Addressing the challenges of modern DNS a comprehensive tutorial

O Van Der Toorn, M Müller, S Dickinson… - Computer Science …, 2022 - Elsevier
Abstract The Domain Name System (DNS) plays a crucial role in connecting services and
users on the Internet. Since its first specification, DNS has been extended in numerous …

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem

M Jonker, A King, J Krupp, C Rossow… - Proceedings of the …, 2017 - dl.acm.org
Denial-of-Service attacks have rapidly increased in terms of frequency and intensity, steadily
becoming one of the biggest threats to Internet stability and reliability. However, a rigorous …

Crimebb: Enabling cybercrime research on underground forums at scale

S Pastrana, DR Thomas, A Hutchings… - Proceedings of the 2018 …, 2018 - dl.acm.org
Underground forums allow criminals to interact, exchange knowledge, and trade in products
and services. They also provide a pathway into cybercrime, tempting the curious to join …

Characterizing eve: Analysing cybercrime actors in a large underground forum

S Pastrana, A Hutchings, A Caines… - Research in Attacks …, 2018 - Springer
Underground forums contain many thousands of active users, but the vast majority will be
involved, at most, in minor levels of deviance. The number who engage in serious criminal …

DDoS never dies? An IXP perspective on DDoS amplification attacks

D Kopp, C Dietzel, O Hohlfeld - … Conference on Passive and Active Network …, 2021 - Springer
DDoS attacks remain a major security threat to the continuous operation of Internet edge
infrastructures, web services, and cloud platforms. While a large body of research focuses …

Ethical issues in research using datasets of illicit origin

DR Thomas, S Pastrana, A Hutchings… - Proceedings of the …, 2017 - dl.acm.org
We evaluate the use of data obtained by illicit means against a broad set of ethical and legal
issues. Our analysis covers both the direct collection, and secondary uses of, data obtained …

The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core

M Nawrocki, M Jonker, TC Schmidt… - Proceedings of the 21st …, 2021 - dl.acm.org
In this paper, we shed new light on the DNS amplification ecosystem, by studying
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …

Scan, test, execute: Adversarial tactics in amplification DDoS attacks

H Griffioen, K Oosthoek, P van der Knaap… - Proceedings of the 2021 …, 2021 - dl.acm.org
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and
are generated with the help of open, unsecured services, to which an adversary sends …

Booting the booters: Evaluating the effects of police interventions in the market for denial-of-service attacks

B Collier, DR Thomas, R Clayton… - Proceedings of the …, 2019 - dl.acm.org
Illegal booter services offer denial of service (DoS) attacks for a fee of a few tens of dollars a
month. Internationally, police have implemented a range of different types of intervention …