Sciweavers

122 search results - page 1 / 25
» Re-wiring Activity of Malicious Networks
Sort
View
INFOCOM
2010
IEEE
13 years 3 months ago
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
—While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-...
Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta
PAM
2012
Springer
12 years 13 days ago
Re-wiring Activity of Malicious Networks
This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily invo...
Maria Konte, Nick Feamster
DIMVA
2011
12 years 8 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
TON
2012
11 years 7 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
ACSAC
2006
IEEE
13 years 11 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...