[go: up one dir, main page]

Xu et al., 2024 - Google Patents

RaMOF: Ranking Manipulation Leveraging Open Forwarders

Xu et al., 2024

View PDF
Document ID
14443439380492587170
Author
Xu C
Zhang Y
Shi F
Li Z
Zheng J
Hu M
Publication year
Publication venue
Available at SSRN 4578344

External Links

Snippet

The utilization of top lists in Internet measurement, security analysis, and threat detection is pervasive within the Internet community. Nevertheless, traditional top lists have faced substantial criticism due to their susceptibility to ranking manipulation. Many efforts have …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Khormali et al. Domain name system security and privacy: A contemporary survey
Owen et al. Empirical analysis of tor hidden services
US10171318B2 (en) System and method of identifying internet-facing assets
Randall et al. Trufflehunter: cache snooping rare domains at large public DNS resolvers
US9118702B2 (en) System and method for generating and refining cyber threat intelligence data
US8813228B2 (en) Collective threat intelligence gathering system
Kondracki et al. Catching transparent phish: Analyzing and detecting mitm phishing toolkits
Patsakis et al. Unravelling ariadne’s thread: Exploring the threats of decentralised dns
Houser et al. A comprehensive measurement-based investigation of DNS hijacking
Korczynski et al. Reputation metrics design to improve intermediary incentives for security of TLDs
Bouwman et al. Helping hands: Measuring the impact of a large threat intelligence sharing community
US8898292B2 (en) Determination of unauthorized content sources
Lumezanu et al. Observing common spam in Twitter and email
Jin et al. Design of detecting botnet communication by monitoring direct outbound DNS queries
Zhou A survey on fast-flux attacks
Zhang et al. Characterization of blacklists and tainted network traffic
So et al. Domains do change their spots: Quantifying potential abuse of residual trust
Portier et al. Security in plain txt: Observing the use of dns txt records in the wild
Rweyemamu et al. Getting under alexa’s umbrella: Infiltration attacks against Internet top domain lists
Fejrskov et al. Detecting DNS hijacking by using NetFlow data
Shetty et al. Auditing and analysis of network traffic in cloud environment
Xu et al. RaMOF: Ranking Manipulation Leveraging Open Forwarders
Chang et al. Understanding adversarial strategies from bot recruitment to scheduling
Hernandez-Quintanilla et al. On the reduction of authoritative dns cache timeouts: Detection and implications for user privacy
Liu et al. Understanding the implementation and security implications of protective DNS services