Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains
暂无分享,去创建一个
Zhou Li | Hai-Xin Duan | Kun Du | Daiping Liu | Haining Wang | Baojun Liu
[1] Brian Ryner,et al. Large-Scale Automatic Classification of Phishing Pages , 2010, NDSS.
[2] Steven M. Bellovin,et al. Using the Domain Name System for System Break-ins , 1995, USENIX Security Symposium.
[3] Shinichi Morishita,et al. On Classification and Regression , 1998, Discovery Science.
[4] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[5] Marc Najork,et al. Detecting spam web pages through content analysis , 2006, WWW '06.
[6] Stefan Savage,et al. Spamscatter: Characterizing Internet Scam Hosting Infrastructure , 2007, USENIX Security Symposium.
[7] Nick Feamster,et al. PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration , 2016, CCS.
[8] Cristian Hesselman,et al. Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[9] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[10] Feng Qian,et al. Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[11] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[12] Wouter Joosen,et al. Parking Sensors: Analyzing and Detecting Parked Domains , 2015, NDSS.
[13] Christian Rossow,et al. Going Wild: Large-Scale Classification of Open DNS Resolvers , 2015, Internet Measurement Conference.
[14] Chris Kanich,et al. The Long "Taile" of Typosquatting Domain Names , 2014, USENIX Security Symposium.
[15] Zhou Li,et al. Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections , 2014, 2014 IEEE Symposium on Security and Privacy.
[16] Wouter Joosen,et al. Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse , 2015, NDSS.
[17] Daiping Liu,et al. All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records , 2016, CCS.
[18] Patrick D. McDaniel,et al. Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[19] Stefan Savage,et al. Cloak and dagger: dynamics of web search cloaking , 2011, CCS '11.
[20] Christopher Krügel,et al. BotFinder: finding bots in network traffic without deep packet inspection , 2012, CoNEXT '12.
[21] Fang Yu,et al. Knowing your enemy: understanding and detecting malicious web advertising , 2012, CCS '12.
[22] Информатика. Public Suffix List , 2010 .
[23] Zhou Li,et al. Understanding the Dark Side of Domain Parking , 2014, USENIX Security Symposium.
[24] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[25] Christopher Krügel,et al. Delta: automatic identification of unknown web-based infection campaigns , 2013, CCS.
[26] Lawrence K. Saul,et al. Identifying suspicious URLs: an application of large-scale online learning , 2009, ICML '09.
[27] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[28] Nick Feamster,et al. Understanding the domain registration behavior of spammers , 2013, Internet Measurement Conference.
[29] Amir Herzberg,et al. Socket overloading for fun and cache-poisoning , 2013, ACSAC.
[30] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[31] Vern Paxson,et al. On the Potential of Proactive Domain Blacklisting , 2010, LEET.
[32] Sandeep Yadav,et al. Detecting algorithmically generated malicious domain names , 2010, IMC '10.
[33] Christopher Krügel,et al. JACKSTRAWS: Picking Command and Control Connections from Bot Traffic , 2011, USENIX Security Symposium.
[34] Wenke Lee,et al. Detecting Malware Domains at the Upper DNS Hierarchy , 2011, USENIX Security Symposium.
[35] Zhou Li,et al. Catching predators at watering holes: finding and understanding strategically compromised websites , 2016, ACSAC.
[36] Niels Provos,et al. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority , 2008, NDSS.
[37] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[38] Chris Kanich,et al. Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting , 2015, 2015 IEEE Symposium on Security and Privacy.
[39] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[40] Johannes Bader,et al. A Comprehensive Measurement Study of Domain Generating Malware , 2016, USENIX Security Symposium.
[41] Stefan Savage,et al. You've Got Vulnerability: Exploring Effective Vulnerability Notifications , 2016, USENIX Security Symposium.
[42] Davide Balzarotti,et al. A Lustrum of Malware Network Communication: Evolution and Insights , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[43] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[44] Gianluca Stringhini,et al. Shady paths: leveraging surfing crowds to detect malicious web pages , 2013, CCS.
[45] H. Jeffreys. An invariant form for the prior probability in estimation problems , 1946, Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences.
[46] Zhou Li,et al. The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO , 2016, USENIX Security Symposium.
[47] Amir Herzberg,et al. Security of Patched DNS , 2012, ESORICS.
[48] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[49] Steven D. Gribble,et al. Cutting through the Confusion: A Measurement Study of Homograph Attacks , 2006, USENIX Annual Technical Conference, General Track.
[50] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.
[51] Paolo Milani Comparetti,et al. EvilSeed: A Guided Approach to Finding Malicious Web Pages , 2012, 2012 IEEE Symposium on Security and Privacy.
[52] Amir Herzberg,et al. Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[53] Fang Yu,et al. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures , 2013, 2013 IEEE Symposium on Security and Privacy.