Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated in certain networks instead of being evenly distributed. In this article we formally define and frame such areas as Internet Bad Neighborhoods. By extending the reputation of malicious IP addresses to their neighbors, the bad neighborhood approach ultimately enables attack prediction from unforeseen addresses. We investigate spam and phishing bad neighborhoods, and show how their underlying business models, counter-intuitively, influences the location of the neighborhoods (both geographically and in the IP addressing space). We also show how bad neighborhoods are highly concentrated at a few Internet Service Providers and discuss how our fin...
IP Geolocation is used to determine the geographical location of Internet users based on their IP ad...
This paper studies the network-level behavior of spammers, including: IP address ranges that send th...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated...
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated...
A significant part of current attacks on the Internet comes from compromised hosts that, usually, ta...
A significant part of current Internet attacks originates from hosts that are distributed all over t...
It’s known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, ma...
Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have als...
IP Geolocation is used to determine the geographical location of Internet users based on their IP ad...
This paper studies the network-level behavior of spammers, including: IP address ranges that send th...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated...
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated...
A significant part of current attacks on the Internet comes from compromised hosts that, usually, ta...
A significant part of current Internet attacks originates from hosts that are distributed all over t...
It’s known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, ma...
Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have als...
IP Geolocation is used to determine the geographical location of Internet users based on their IP ad...
This paper studies the network-level behavior of spammers, including: IP address ranges that send th...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...