Besides all the advantages and reliefs the Internet brought us over the years, there are also a lot of suspicious and malicious activities taking place. Attackers are constantly developing new techniques to compromise computer systems. Furthermore, there are many malicious servers on the Internet that host, for example, exploits, drive-by download toolkits, or malicious software. We want to track the network locations of these malicious servers by analyzing different kinds of blacklists that provide a listing of suspicious servers. In this article, we present the design and implementation of our blacklist parser system that tracks 49 different blacklists. We have collected more than 2.2 million distinct blacklist entries and more than 410,0...
Client-side attacks have become an increasing problem on the Internet today. Malicious web pages lau...
As mobile devices have become more popular, malware and attacks directed at them have significantly ...
The expansion of Distributed Denial of Service (DDoS) for hire websites, known as Booters, has radic...
Blacklists are a collection of origins (URLs, domains or IP addresses) associated with malevolent ac...
We recently established a new experimental Internet ser-vice for creating customized source address ...
The Internet is a dangerous place, filled with dierent cyber threats, including malware. To withstan...
The misuse of websites to serve exploit code to compromise hosts on the Internet has increased drast...
The retrieval and analysis of malicious content is an essential task for security researchers. At th...
Malicious Web sites are a cornerstone of Internet criminal activities. They host a variety of unwant...
Sophisticated software with malicious intentions (malware) that can easily and aggressively spread t...
Abstract — Forensic Investigation into security incidents often includes the examination of huge lis...
Domain blacklists are widely-used in security research. However, given their proprietary nature, the...
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions...
Some of the most serious security threats facing computer networks involve malware. To prevent this ...
In this paper, we study the effectiveness of phishing blacklists. We used 191 fresh phish that were ...
Client-side attacks have become an increasing problem on the Internet today. Malicious web pages lau...
As mobile devices have become more popular, malware and attacks directed at them have significantly ...
The expansion of Distributed Denial of Service (DDoS) for hire websites, known as Booters, has radic...
Blacklists are a collection of origins (URLs, domains or IP addresses) associated with malevolent ac...
We recently established a new experimental Internet ser-vice for creating customized source address ...
The Internet is a dangerous place, filled with dierent cyber threats, including malware. To withstan...
The misuse of websites to serve exploit code to compromise hosts on the Internet has increased drast...
The retrieval and analysis of malicious content is an essential task for security researchers. At th...
Malicious Web sites are a cornerstone of Internet criminal activities. They host a variety of unwant...
Sophisticated software with malicious intentions (malware) that can easily and aggressively spread t...
Abstract — Forensic Investigation into security incidents often includes the examination of huge lis...
Domain blacklists are widely-used in security research. However, given their proprietary nature, the...
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions...
Some of the most serious security threats facing computer networks involve malware. To prevent this ...
In this paper, we study the effectiveness of phishing blacklists. We used 191 fresh phish that were ...
Client-side attacks have become an increasing problem on the Internet today. Malicious web pages lau...
As mobile devices have become more popular, malware and attacks directed at them have significantly ...
The expansion of Distributed Denial of Service (DDoS) for hire websites, known as Booters, has radic...