Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 22, 2024 Fri

Time: 11:55 am

Results for spam

2 results found

Author: Alazab, Mamoun

Title: Spam and criminal activity

Summary: The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale. In a sample of more than 13 million emails identified as spam, more than 100,000 contained malicious attachments; nearly 1.4 million contained malicious web links. If opened, these attachments and links could infect the recipients' devices with software that allows cybercriminals to remotely access them. This paper describes how crime groups increasingly adopt novel approaches to cybercrime. Increased law enforcement capacity, the cultivation of high-level coordination between industry, government and police, and the further development of machine learning techniques should be at the forefront of government initiatives in this area.

Details: Canberra: Australian Institute of Criminology, 2016. 20p.

Source: Internet Resource: Trends & issues in crime and criminal justice, no. 526: Accessed December 5, 2016 at: http://aic.gov.au/media_library/publications/tandi_pdf/tandi526.pdf

Year: 2016

Country: Australia

URL: http://aic.gov.au/media_library/publications/tandi_pdf/tandi526.pdf

Shelf Number: 147867

Keywords:
Computer Crimes
Cybercrime
Internet Crimes
Online Victimization
Spam

Author: Moura, Giovane Cesar Moreira

Title: Internet Bad Neighborhoods

Summary: A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it occurs in most places, but it tends to be concentrated in certain areas. In the real world, high crime areas are usually labeled as "bad neighborhoods". The goal of this dissertation is to investigate Bad Neighborhoods on the Internet. The idea behind the Internet Bad Neighborhood concept is that the probability of a host in behaving badly increases if its neighboring hosts (i.e., hosts within the same subnetwork) also behave badly. This idea, in turn, can be exploited to improve current Internet security solutions, since it provides an indirect approach to predict new sources of attacks (neighboring hosts of malicious ones). In this context, the main contribution of this dissertation is to present the first systematic and multifaceted study on the concentration of malicious hosts on the Internet. We have organized our study according to two main research questions. In the first research question, we have focused on the intrinsic characteristics of the Internet Bad Neighborhoods, whereas in the second research question we have focused on how Bad Neighborhood blacklists can be employed to better protect networks against attacks. The approach employed to answer both questions consists in monitoring and analyzing network data (traces, blacklists, etc.) obtained from various real world production networks. One of the most important findings of this dissertation is the verification that Internet Bad Neighborhoods are a real phenomenon, which can be observed not only as network prefixes (e.g., /24, in CIDR notation), but also at different and coarser aggregation levels, such as Internet Service Providers (ISPs) and countries. For example, we found that 20 ISPs (out of 42,201 observed in our data sets) concentrated almost half of all spamming IP addresses. In addition, a single ISP was found having 62% of its IP addresses involved with spam. This suggests that ISP-based Bad Neighborhood security mechanisms can be employed when evaluating e-mail from unknown sources. This dissertation also shows that Bad Neighborhoods are mostly application specific and that they might be located in neighborhoods one would not immediately expect. For example, we found that phishing Bad Neighborhoods are mostly located in the United States and other developed nations - since these nations hosts the majority of data centers and cloud computing providers - while spam comes from mostly Southern Asia. This implies that Bad Neighborhood based security tools should be application-tailored. Another finding of this dissertation is that Internet Bad Neighborhoods are much less stealthy than individual hosts, since they are more likely to strike again a target previously attacked. We found that, in a one-week period, nearly 50% of the individual IP addresses attack only once a particular target, while up to 90% of the Bad Neighborhoods attacked more than once. Consequently, this implies that historical data of Bad Neighborhoods attacks can potentially be successfully employed to predict future attacks. Overall, we have put the Internet Bad Neighborhoods under scrutiny from the point of view of the network administrator. We expect that the findings provided in this dissertation can serve as a guide for the design of new algorithms and solutions to better secure networks.

Details: Twente, NETH: University of Twente, 2013. 245p.

Source: Internet Resource: Dissertation: Accessed April 11, 2017 at: http://doc.utwente.nl/84507/1/thesis_G_Moura.pdf

Year: 2013

Country: International

URL: http://doc.utwente.nl/84507/1/thesis_G_Moura.pdf

Shelf Number: 144779

Keywords:
Computer Crime
Computer Security
Internet Crimes
Internet Safety
Internet Security
Spam