Searched for: subject%3A%22Hosting%255C+providers%22
(1 - 5 of 5)
document
Noroozian, A. (author)
Hosting providers are theoretically in a key position to combat cybercrime as they are often the entities renting out the resources that end up being abused by miscreants. Yet, notwithstanding hosting providers' current security measures to combat abuse, their responses vary widely. In many cases the response is ineffective, as empirical...
doctoral thesis 2020
document
Çetin, F.O. (author)
Resources on the Internet allow constant communication and data sharing between Internet users. While these resources keep vital information flowing, cybercriminals can easily compromise and abuse them, using them as a platform for fraud and misuse. Every day, we observe millions of internet-connected resources are being abused in criminal...
doctoral thesis 2020
document
Tajalizadehkhoob, S. (author)
In theory, hosting providers can play an important role in fighting cybercrime and misuse. This is because many online threats, be they high-profile or mundane, use online storage infrastructure maintained by hosting providers at the core of their criminal operations. <br/>However, in practice, we see large differences in the security measures...
doctoral thesis 2018
document
Tajalizadehkhoob, S. (author), Hernandez Ganan, C. (author), Noroozian, A. (author), van Eeten, M.J.G. (author)
A variety of botnets are used in attacks on financial services. Banks and security firms invest a lot of effort in detecting and combating malware-assisted takeover of customer accounts. A critical resource of these botnets is their command-and-control (C&amp;C) infrastructure. Attackers rent or compromise servers to operate their C&amp;C...
conference paper 2017
document
Çetin, F.O. (author), Hanif Jhaveri, Mohammad (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author), Moore, Tyler (author)
Motivation: Participants on the front lines of abuse reporting have a variety of options to notify intermediaries and resource owners about abuse of their systems and services. These can include emails to personal messages to blacklists to machine-generated feeds. Recipients of these reports have to voluntarily act on this information. We know...
journal article 2016
Searched for: subject%3A%22Hosting%255C+providers%22
(1 - 5 of 5)