[PDF][PDF] From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.

C Lu, B Liu, Y Zhang, Z Li, F Zhang, H Duan, Y Liu… - NDSS, 2021 - utdallas.edu
When a domain is registered, information about the registrants and other related personnel
is recorded by WHOIS databases owned by registrars or registries (called WHOIS providers …

COMAR: classification of compromised versus maliciously registered domains

S Maroofi, M Korczyński, C Hesselman… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Miscreants abuse thousands of domain names every day by launching large-scale attacks
such as phishing or malware campaigns. While some domains are solely registered for …

TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network

J Liu, J Yan, J Jiang, Y He, X Wang, Z Jiang, P Yang… - Cybersecurity, 2022 - Springer
The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with
detailed threat attack procedures and indicators of compromise (IOCs), eg, malware hash or …

Law enforcement and disruption of offline and online activities: A review of contemporary challenges

C Faubert, D Décary-Hétu, A Malm, J Ratcliffe… - Cybercrime in Context …, 2021 - Springer
The digital world represents a new frontier for law enforcement operations. The virtual nature
of online communications creates challenges regarding legal frameworks and sovereignty …

Detecting DGA-based botnets through effective phonics-based features

D Zhao, H Li, X Sun, Y Tang - Future Generation Computer Systems, 2023 - Elsevier
Botnets are machines that are increasingly controlled by cybercriminals to perform various
attacks. Traditional methods of defense, such as blocklisting, become ineffective because …

C3PO: large-scale study of covert monitoring of C&C servers via over-permissioned protocol infiltration

J Fuller, RP Kasturi, A Sikder, H Xu, B Arik… - Proceedings of the …, 2021 - dl.acm.org
Current techniques to monitor botnets towards disruption or takedown are likely to result in
inaccurate data gathered about the botnet or be detected by C&C orchestrators. Seeking a …

Characterizing and Mitigating Phishing Attacks at ccTLD Scale

GCM Moura, T Daniels, M Bosteels, S Castro… - Proceedings of the …, 2024 - dl.acm.org
Phishing on the web is a model of social engineering and an attack vector for getting access
to sensitive and financial data of individuals and corporations. Phishing has been identified …

PKDGA: A Partial Knowledge-based Domain Generation Algorithm for Botnets

L Nie, X Shan, L Zhao, K Li - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Domain generation algorithms (DGAs) can be categorized into three types: zero-knowledge,
partial-knowledge, and full-knowledge. While prior research merely focused on zero …

Operational domain name classification: from automatic ground truth generation to adaptation to missing values

J Bayer, BC Benjamin, S Maroofi, T Wabeke… - … Conference on Passive …, 2023 - Springer
With more than 350 million active domain names and at least 200,000 newly registered
domains per day, it is technically and economically challenging for Internet intermediaries …

MalNet: A binary-centric network-level profiling of IoT malware

A Davanian, M Faloutsos - Proceedings of the 22nd ACM Internet …, 2022 - dl.acm.org
Where are the IoT C2 servers located? What vulnerabilities does IoT malware try to exploit?
What DDoS attacks are launched in practice? In this work, we conduct a large scale study to …