Understanding and Defending against Internet Infrastructures Supporting Cybercrime Operations
نویسندگان
چکیده
To those who help others. iii ACKNOWLEDGEMENTS I would like to thank my advisor Prof. Nick Feamster, for all his support, enthusiasm, and optimism, which have been an invaluable source of inspiration for me. Nick has been a great mentor, who has had an incredible impact on my path. Also, I would like to thank Prof. Roberto Perdisci, for all his support, boundless positive energy, and persistence. I feel extremely fortunate, that I have had the chance to work with him.
منابع مشابه
Cyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملOn Developing Tomorrow’s “Cyber Warriors”
Threats of cyber-warfare attacks (and counter attacks) by countries with the largest economies in the world, massive losses of financial and personal data on millions of Americans to cybercrime, and the potential to disrupt Americas critical infrastructures, should be on the minds of all Americans. Why? Because those who design, build, operate and defend the computer systems and networks that o...
متن کاملSpecial issue on measure, detect and mitigate-challenges and trends in network security
Cybercrime has developed rapidly during the last decade, and recent years in particular have seen an unprecedented number of cyber attacks. Despite increased national and international efforts against cybercrime, cybercrime still has double-digit annual growth rates. As the number of services and systems connected to the Internet and migrating to cloud infrastructures increases, the ability to ...
متن کاملChapter 2 CYBERSPACE POLICY FOR CRITICAL INFRASTRUCTURES
The first step in preparing any battlespace is to define the domain for attack and maneuver. The various military service components have directed authority to focus their efforts in specific domains of operations (e.g., naval operations are mainly in the maritime domain). However, cyberspace operations pose challenges because they span multiple operational domains. This paper focuses on U.S. c...
متن کاملKey Challenges in Defending Against Malicious Socialbots
The ease with which we adopt online personas and relationships has created a soft spot that cyber criminals are willing to exploit. Advances in artificial intelligence make it feasible to design bots that sense, think and act cooperatively in social settings just like human beings. In the wrong hands, these bots can be used to infiltrate online communities, build up trust over time and then sen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015