We recently established a new experimental Internet ser-vice for creating customized source address blacklists for DShield.org contributors. This new service utilizes a radically different approach to blacklist formulation that we refer to as Highly Predictive Blacklists (HPB). A highly predictive black-list is a list of malicious Internet addresses that is formulated through an analysis of the roughly 30 million firewall log en-tries that are contributed to the DShield repository each day from across the Internet. The HPB service employs a link anal-ysis algorithm similar to the Google PageRank scheme to cross-compare contributors in search of overlaps among the attackers they report. The attacker addresses included within an HPB are selec...
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
Blacklists (BLs), also called Domain Name Systembased Blackhole List (DNSBLs) are the databases of k...
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially har...
Blacklists are a collection of origins (URLs, domains or IP addresses) associated with malevolent ac...
Besides all the advantages and reliefs the Internet brought us over the years, there are also a lot ...
abstract: IP blacklisting is a popular technique to bolster an enterprise's security, where access t...
The misuse of websites to serve exploit code to compromise hosts on the Internet has increased drast...
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, ma...
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally mai...
Domain blacklists are widely-used in security research. However, given their proprietary nature, the...
In this paper, we study the effectiveness of phishing blacklists. We used 191 fresh phish that were ...
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally mai...
Abstract — How can we protect the network infrastructure from malicious traffic, such as scanning, m...
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
Blacklists (BLs), also called Domain Name Systembased Blackhole List (DNSBLs) are the databases of k...
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially har...
Blacklists are a collection of origins (URLs, domains or IP addresses) associated with malevolent ac...
Besides all the advantages and reliefs the Internet brought us over the years, there are also a lot ...
abstract: IP blacklisting is a popular technique to bolster an enterprise's security, where access t...
The misuse of websites to serve exploit code to compromise hosts on the Internet has increased drast...
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, ma...
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally mai...
Domain blacklists are widely-used in security research. However, given their proprietary nature, the...
In this paper, we study the effectiveness of phishing blacklists. We used 191 fresh phish that were ...
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally mai...
Abstract — How can we protect the network infrastructure from malicious traffic, such as scanning, m...
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
Blacklists (BLs), also called Domain Name Systembased Blackhole List (DNSBLs) are the databases of k...
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially har...