Do Malware Reports Expedite Cleanup? An Experimental Study
نویسندگان
چکیده
Web-based malware is pervasive. Miscreants compromise insecure hosts or even set up dedicated servers to distribute malware to unsuspecting users. This scourge is mainly fought by the voluntary action of private actors who detect and report infections to affected site owners, hosting providers and registrars. In this paper we describe an experiment to assess whether sending reports to affected parties makes a measurable difference in cleaning up malware. Using community reports of malware submitted to StopBadware over two months in Fall 2011, we find evidence that detailed notices are immediately effective: 32% of malware-distributing websites are cleaned within one day of sending a notice, compared to just 13% of sites not receiving a notice. The improved cleanup rate holds for longer periods, too – 62% of websites receiving a detailed notice were cleaned up after 16 days, compared to 45% of websites not receiving a notice. It turns out that including details describing the compromise is essential for the notice to work – sending reports with minimal descriptions of the malware was found to be roughly as effective as not sending reports at all. Furthermore, we present evidence that sending multiple notices from two sources is not helpful. Instead, only the first transmitted notice makes a difference.
منابع مشابه
Information Asymmetries, Uncertainties, and Cleanup Delays at Superfund Sites
Superfund cleanup has been extremely slow. Traditional analysis has centered around reducing negotiation and litigation to expedite the cleanup process. We investigate other factors which provide possible incentives for delay, namely, discounting, risk aversion, and compensation for off-site damage. We find that liability share plays an essential role in PRPs’ incentives to delay. Commonly adop...
متن کاملThe Economics of Cybersecurity: Principles and Policy Options1
Economics puts the challenges facing cybersecurity into perspective better than a purely technical approach does. Systems often fail because the organizations that defend them do not bear the full costs of failure. For instance, companies operating critical infrastructures have integrated control systems with the Internet to reduce near-term, measurable costs while raising the risk of catastrop...
متن کاملUnderstanding the Role of Sender Reputation in Abuse Reporting and Cleanup
Participants on the front lines of abuse reporting have a variety of options to notify intermediaries and resource owners about abuse of their systems and services. These can include emails to personal messages to blacklists to machinegenerated feeds. Recipients of these reports have to voluntarily act on this information. We know remarkably little about the factors that drive higher response r...
متن کاملThe economics of cybersecurity: Principles and policy options
Economics puts the challenges facing cybersecurity into perspective better than a purely technical approach does. Systems often fail because the organizations that defend them do not bear the full costs of failure. For instance, companies operating critical infrastructures have integrated control systems with the Internet to reduce near-term, measurable costs while raising the risk of catastrop...
متن کاملVisit the National Academies Press online, the authoritative source for all books from the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council: • Download hundreds of free books in PDF
The economics of information security has recently become a thriving and fast-moving discipline. Systems often fail because the organizations that defend them do not bear the full costs of failure. For instance, companies operating critical infrastructures have integrated control systems with the Internet to reduce near-term, measurable costs while raising the risk of catastrophic failure, whos...
متن کامل