Abstract—Malicious Web activities continue to be a major threat to the safety of online Web users. Despite the plethora forms of attacks and the diversity of their delivery channels, in the back end, they are all orchestrated through malicious Web infrastructures, which enable miscreants to do business with each other and utilize others ’ resources. Identifying the linchpins of the dark infrastructures and distinguishing those valuable to the adversaries from those disposable are critical for gaining an upper hand in the battle against them. In this paper, using nearly 4 million malicious URL paths crawled from different attack channels, we perform a large-scale study on the topological relations among hosts in the malicious Web infrastruct...
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we d...
The academic community has long acknowledged the existence of malicious botnets, but very little is ...
The ability of cyber criminals to compromise networked computer systems through the spread of malwar...
Abstract—Malware is a major threat to security and privacy of network users. A huge variety of malwa...
Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, mor...
a b s t r a c t In this paper, we investigate cyber-threats and the underlying infrastructures. More...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
AbstractIn this paper, we investigate cyber-threats and the underlying infrastructures. More precise...
Knowledge about the graph structure of the Web is important for understanding this complex socio-tec...
The Internet is built on top of intertwined network services, e.g., email, DNS, and content distribu...
The web is one of the most popular vectors to spread mal-ware. Attackers lure victims to visit compr...
Abstract. In recent years, terrorist groups have used the WWW to spread their ideologies, disseminat...
The world has seen a dramatic increase in illegal activities on the Internet. Prior research has inv...
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser...
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we d...
The academic community has long acknowledged the existence of malicious botnets, but very little is ...
The ability of cyber criminals to compromise networked computer systems through the spread of malwar...
Abstract—Malware is a major threat to security and privacy of network users. A huge variety of malwa...
Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, mor...
a b s t r a c t In this paper, we investigate cyber-threats and the underlying infrastructures. More...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
AbstractIn this paper, we investigate cyber-threats and the underlying infrastructures. More precise...
Knowledge about the graph structure of the Web is important for understanding this complex socio-tec...
The Internet is built on top of intertwined network services, e.g., email, DNS, and content distribu...
The web is one of the most popular vectors to spread mal-ware. Attackers lure victims to visit compr...
Abstract. In recent years, terrorist groups have used the WWW to spread their ideologies, disseminat...
The world has seen a dramatic increase in illegal activities on the Internet. Prior research has inv...
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser...
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we d...
The academic community has long acknowledged the existence of malicious botnets, but very little is ...
The ability of cyber criminals to compromise networked computer systems through the spread of malwar...