Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services
We document and evaluate emerging policing strategies that are resha** how centralised
law enforcement agencies deal with online cybercrime markets. The first of these we term …
law enforcement agencies deal with online cybercrime markets. The first of these we term …
[HTML][HTML] Addressing the challenges of modern DNS a comprehensive tutorial
Abstract The Domain Name System (DNS) plays a crucial role in connecting services and
users on the Internet. Since its first specification, DNS has been extended in numerous …
users on the Internet. Since its first specification, DNS has been extended in numerous …
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem
Denial-of-Service attacks have rapidly increased in terms of frequency and intensity, steadily
becoming one of the biggest threats to Internet stability and reliability. However, a rigorous …
becoming one of the biggest threats to Internet stability and reliability. However, a rigorous …
Crimebb: Enabling cybercrime research on underground forums at scale
Underground forums allow criminals to interact, exchange knowledge, and trade in products
and services. They also provide a pathway into cybercrime, tempting the curious to join …
and services. They also provide a pathway into cybercrime, tempting the curious to join …
Characterizing eve: Analysing cybercrime actors in a large underground forum
Underground forums contain many thousands of active users, but the vast majority will be
involved, at most, in minor levels of deviance. The number who engage in serious criminal …
involved, at most, in minor levels of deviance. The number who engage in serious criminal …
DDoS never dies? An IXP perspective on DDoS amplification attacks
DDoS attacks remain a major security threat to the continuous operation of Internet edge
infrastructures, web services, and cloud platforms. While a large body of research focuses …
infrastructures, web services, and cloud platforms. While a large body of research focuses …
Ethical issues in research using datasets of illicit origin
We evaluate the use of data obtained by illicit means against a broad set of ethical and legal
issues. Our analysis covers both the direct collection, and secondary uses of, data obtained …
issues. Our analysis covers both the direct collection, and secondary uses of, data obtained …
The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core
In this paper, we shed new light on the DNS amplification ecosystem, by studying
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …
Scan, test, execute: Adversarial tactics in amplification DDoS attacks
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and
are generated with the help of open, unsecured services, to which an adversary sends …
are generated with the help of open, unsecured services, to which an adversary sends …
Booting the booters: Evaluating the effects of police interventions in the market for denial-of-service attacks
Illegal booter services offer denial of service (DoS) attacks for a fee of a few tens of dollars a
month. Internationally, police have implemented a range of different types of intervention …
month. Internationally, police have implemented a range of different types of intervention …