The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
نویسندگان
چکیده
The underground commoditization of compromised hosts suggests a tacit capability where miscreants leverage the same machine—subscribed by multiple criminal ventures—to simultaneously profit from spam, fake account registration, malicious hosting, and other forms of automated abuse. To expedite the detection of these commonly abusive hosts, there are now multiple industrywide efforts that aggregate abuse reports into centralized threat exchanges. In this work, we investigate the potential benefit of global reputation tracking and the pitfalls therein. We develop our findings from a snapshot of 45 million IP addresses abusing six Google services including Gmail, YouTube, and ReCaptcha between April 7–April 21, 2015. We estimate the scale of end hosts controlled by attackers, expose underground biases that skew the abuse perspectives of individual web services, and examine the frequency that criminals re-use the same infrastructure to attack multiple, heterogeneous services. Our results indicate that an average Google service can block 14% of abusive traffic based on threats aggregated from seemingly unrelated services, though we demonstrate that outright blacklisting incurs an untenable volume of false positives.
منابع مشابه
Optimal portfolio allocation with imposed price limit constraint
Daily price limits are adopted by many securities exchanges in countries such as the USA, Canada, Japan and various other countries in Europe and Asia, in order to increase the stability of the financial market. These limits confine the price of the financial asset during all trading stages of any trading day to a range, usually determined based on the previous day’s closing price. In this pape...
متن کاملآثار اقتصادی گسترش کاربرد پول الکترونیکی، با تأکید بر سیاستهای پولی
Extended distribution of digicash has commercial, socio-economic as well as political effects. From the economic viewpoint, the most crucial effect of digicash use extension takes place on money supply, monetary policies and central bank. Because digicash is capable of being replaced by bank notes and the coins, it is possible that digicash gradually takes the place of the central bank money an...
متن کاملInter-Partner Interactions and Knowledge Transfer Mechanisms in the Chinese Automotive Industry: A Qualitative Research Based on Dual Managerial Perceptions
The purpose of this study is to extend the existing knowledge of inter-firm knowledge transfer research and provide a deeper understanding of knowledge transfer practice in an alliance context, as well as the reasons for such a practice. This study reports on relevant results derived from semi-structured interviews with 16 top managers in a Chinese international joint venture (IJV) formed by tw...
متن کاملEvaluation of the effective factors in accepting e-commerce to develop a handmade carpet economy
Nowadays, the status of e-commerce in the exchange of art works is the subject of study experts in the field of art economics. Considering the importance of this issue, identifying the effective factors in accepting e-commerce in this sector of the economy is essential. Hence, using this technology in the art sector, especially the handmade carpet exchanges, we can overcome the problems in the...
متن کاملUnderstanding the Nature of the Crypto Currencies and Determining Some of Its Regulatory Requirements in Iran: Islamic Economics Approach
The lag between legislation and technological advances is known as one of the key factors of economic and social crises. Technological advances have sometimes occurred so quickly that it has not been possible to be monitored and legislated and this has led to social conflicts. Because it is impossible to prevent technological advance, legislators need to have a comprehensive understanding of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016