Characterizing and Mitigating Phishing Attacks at ccTLD Scale

GCM Moura, T Daniels, M Bosteels, S Castro… - Proceedings of the …, 2024 - dl.acm.org
Phishing on the web is a model of social engineering and an attack vector for getting access
to sensitive and financial data of individuals and corporations. Phishing has been identified …

Darkdns: Revisiting the value of rapid zone update

R Sommese, G Akiwate, A Affinito, M Muller… - Proceedings of the …, 2024 - dl.acm.org
Malicious actors exploit the DNS namespace to launch spam campaigns, phishing attacks,
malware, and other harmful activities. Combating these threats requires visibility into domain …

This Is a Local Domain: On Amassing Country-Code Top-Level Domains from Public Data

R Sommese, R van Rijswijk-Deij, M Jonker - ACM SIGCOMM Computer …, 2024 - dl.acm.org
Domain lists are a key ingredient for representative censuses of the Web. Unfortunately,
such censuses typically lack a view on domains under country-code top-level domains …

WHOIS Right? An Analysis of WHOIS and RDAP Consistency

S Fernandez, O Hureau, A Duda… - … Conference on Passive …, 2024 - Springer
Public registration information on domain names, such as the accredited registrar, the
domain name expiration date, or the abuse contact is crucial for many security tasks, from …

[PDF][PDF] DOCTEUR DE L'UNIVERSITÉ GRENOBLE ALPES

S Fernandez - 2023 - simon.fernandez-perrot.fr
Résumé Le Domain Name system est une pierre angulaire de l'Internet moderne,
fournissant des informations techniques sur des millions de domaines en répondant à des …

DNS as a Source of Trust and Information in the Modern Internet

S Fernandez - 2023 - hal.science
The Domain Name System is a cornerstone of the modern Internet, providing information on
millions of domain names by answering billions of requests per day. It is often simplified as …

Passive and Active Measurement

We are excited to present the proceedings of the 25th Annual Passive and Active
Measurement PAM Conference. With this program, PAM continues its tradition as a venue …

[PDF][PDF] INFERMAL: Inferential analysis of maliciously registered domains

Y Nosyk, M Korczynski, S Maroofi, J Bayer, Z Odgerel… - icannhaz.org
Cybercriminals have long depended on domain names for phishing, spam, malware
distribution, and botnet operation. To facilitate the malicious activities, they continually …

[PDF][PDF] The Evolution of Top-Level Domains: A Comparative Study of. org and. dev

F Pfisterer, J Zirngibl, P Sattler - net.in.tum.de
The Domain Name System (DNS) is key to the modern Internet. Many studies investigate the
changes of domain names over time. We argue that the the development of top level …