The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

نویسندگان

  • Kurt Thomas
  • Rony Amira
  • Adi Ben-Yoash
  • Ori Folger
  • Amir Hardon
  • Ari Berger
  • Elie Bursztein
  • Michael Bailey
چکیده

The underground commoditization of compromised hosts suggests a tacit capability where miscreants leverage the same machine—subscribed by multiple criminal ventures—to simultaneously profit from spam, fake account registration, malicious hosting, and other forms of automated abuse. To expedite the detection of these commonly abusive hosts, there are now multiple industrywide efforts that aggregate abuse reports into centralized threat exchanges. In this work, we investigate the potential benefit of global reputation tracking and the pitfalls therein. We develop our findings from a snapshot of 45 million IP addresses abusing six Google services including Gmail, YouTube, and ReCaptcha between April 7–April 21, 2015. We estimate the scale of end hosts controlled by attackers, expose underground biases that skew the abuse perspectives of individual web services, and examine the frequency that criminals re-use the same infrastructure to attack multiple, heterogeneous services. Our results indicate that an average Google service can block 14% of abusive traffic based on threats aggregated from seemingly unrelated services, though we demonstrate that outright blacklisting incurs an untenable volume of false positives.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal portfolio allocation with imposed price limit constraint

Daily price limits are adopted by many securities exchanges in countries such as the USA, Canada, Japan and various other countries in Europe and Asia, in order to increase the stability of the financial market. These limits confine the price of the financial asset during all trading stages of any trading day to a range, usually determined based on the previous day’s closing price. In this pape...

متن کامل

آثار اقتصادی گسترش کاربرد پول الکترونیکی، با تأکید بر سیاست‌های پولی

Extended distribution of digicash has commercial, socio-economic as well as political effects. From the economic viewpoint, the most crucial effect of digicash use extension takes place on money supply, monetary policies and central bank. Because digicash is capable of being replaced by bank notes and the coins, it is possible that digicash gradually takes the place of the central bank money an...

متن کامل

Inter-Partner Interactions and Knowledge Transfer Mechanisms in the Chinese Automotive Industry: A Qualitative Research Based on Dual Managerial Perceptions

The purpose of this study is to extend the existing knowledge of inter-firm knowledge transfer research and provide a deeper understanding of knowledge transfer practice in an alliance context, as well as the reasons for such a practice. This study reports on relevant results derived from semi-structured interviews with 16 top managers in a Chinese international joint venture (IJV) formed by tw...

متن کامل

Evaluation of the effective factors in accepting e-commerce to develop a handmade carpet economy

Nowadays, the status of e-commerce in the exchange of art works is the subject of study experts in the field of art economics. Considering the importance of this issue, identifying the effective factors in accepting e-commerce in this sector of the economy is essential.  Hence, using this technology in the art sector, especially the handmade carpet exchanges, we can overcome the problems in the...

متن کامل

Understanding the Nature of the Crypto Currencies and Determining Some of Its Regulatory Requirements in Iran: Islamic Economics Approach

The lag between legislation and technological advances is known as one of the key factors of economic and social crises. Technological advances have sometimes occurred so quickly that it has not been possible to be monitored and legislated and this has led to social conflicts. Because it is impossible to prevent technological advance, legislators need to have a comprehensive understanding of th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016