Xu et al., 2024 - Google Patents
RaMOF: Ranking Manipulation Leveraging Open ForwardersXu et al., 2024
View PDF- Document ID
- 14443439380492587170
- Author
- Xu C
- Zhang Y
- Shi F
- Li Z
- Zheng J
- Hu M
- Publication year
- Publication venue
- Available at SSRN 4578344
External Links
Snippet
The utilization of top lists in Internet measurement, security analysis, and threat detection is pervasive within the Internet community. Nevertheless, traditional top lists have faced substantial criticism due to their susceptibility to ranking manipulation. Many efforts have …
- 238000013459 approach 0 abstract description 28
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khormali et al. | Domain name system security and privacy: A contemporary survey | |
Owen et al. | Empirical analysis of tor hidden services | |
US10171318B2 (en) | System and method of identifying internet-facing assets | |
Randall et al. | Trufflehunter: cache snooping rare domains at large public DNS resolvers | |
US9118702B2 (en) | System and method for generating and refining cyber threat intelligence data | |
US8813228B2 (en) | Collective threat intelligence gathering system | |
Kondracki et al. | Catching transparent phish: Analyzing and detecting mitm phishing toolkits | |
Patsakis et al. | Unravelling ariadne’s thread: Exploring the threats of decentralised dns | |
Houser et al. | A comprehensive measurement-based investigation of DNS hijacking | |
Korczynski et al. | Reputation metrics design to improve intermediary incentives for security of TLDs | |
Bouwman et al. | Helping hands: Measuring the impact of a large threat intelligence sharing community | |
US8898292B2 (en) | Determination of unauthorized content sources | |
Lumezanu et al. | Observing common spam in Twitter and email | |
Jin et al. | Design of detecting botnet communication by monitoring direct outbound DNS queries | |
Zhou | A survey on fast-flux attacks | |
Zhang et al. | Characterization of blacklists and tainted network traffic | |
So et al. | Domains do change their spots: Quantifying potential abuse of residual trust | |
Portier et al. | Security in plain txt: Observing the use of dns txt records in the wild | |
Rweyemamu et al. | Getting under alexa’s umbrella: Infiltration attacks against Internet top domain lists | |
Fejrskov et al. | Detecting DNS hijacking by using NetFlow data | |
Shetty et al. | Auditing and analysis of network traffic in cloud environment | |
Xu et al. | RaMOF: Ranking Manipulation Leveraging Open Forwarders | |
Chang et al. | Understanding adversarial strategies from bot recruitment to scheduling | |
Hernandez-Quintanilla et al. | On the reduction of authoritative dns cache timeouts: Detection and implications for user privacy | |
Liu et al. | Understanding the implementation and security implications of protective DNS services |