Szurdi, 2020 - Google Patents
Measuring and Analyzing Typosquatting Toward Fighting Abusive Domain RegistrationsSzurdi, 2020
View HTML- Document ID
 - 12688975511345449069
 - Author
 - Szurdi J
 - Publication year
 
External Links
Snippet
Inexpensive and simple domain name registrations foster a wide variety of abuse. One of the  most common abusive registration practices is typosquatting, where typosquatters register  misspelled variants of existing domain names to profit from users' typing mistakes. Making … 
    - 238000001514 detection method 0 abstract description 44
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
 - G06F21/562—Static detection
 - G06F21/563—Static detection by source code analysis
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1425—Traffic logging, e.g. anomaly detection
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1416—Event detection, e.g. attack signature detection
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/577—Assessing vulnerabilities and evaluating computer system security
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1433—Vulnerability analysis
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/1458—Denial of Service
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/2101—Auditing as a secondary aspect
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q30/00—Commerce, e.g. shopping or e-commerce
 - G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
 - H04L63/0227—Filtering policies
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L12/00—Data switching networks
 - H04L12/54—Store-and-forward switching systems
 - H04L12/58—Message switching systems, e.g. electronic mail systems
 - H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
 - H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Szurdi et al. | The long {“Taile”} of typosquatting domain names | |
| Oest et al. | Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis | |
| Alani | Big data in cybersecurity: a survey of applications and future trends | |
| US9985978B2 (en) | Method and system for misuse detection | |
| Maroofi et al. | Comar: Classification of compromised versus maliciously registered domains | |
| Invernizzi et al. | Cloak of visibility: Detecting when machines browse a different web | |
| Alrizah et al. | Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems | |
| Grier et al. | Manufacturing compromise: the emergence of exploit-as-a-service | |
| Li et al. | Knowing your enemy: understanding and detecting malicious web advertising | |
| Tounsi | What is cyber threat intelligence and how is it evolving? | |
| Vissers et al. | Exploring the ecosystem of malicious domain registrations in the. eu tld | |
| Moore et al. | The impact of public information on phishing attack and defense | |
| Gupta et al. | Emerging phishing trends and effectiveness of the anti-phishing landing page | |
| Samarasinghe et al. | On cloaking behaviors of malicious websites | |
| Szurdi et al. | Where are you taking me? understanding abusive traffic distribution systems | |
| Liu et al. | Traffickstop: Detecting and measuring illicit traffic monetization through large-scale dns analysis | |
| Acharya et al. | The imitation game: Exploring brand impersonation attacks on social media platforms | |
| Szurdi | Measuring and Analyzing Typosquatting Toward Fighting Abusive Domain Registrations | |
| Li | An empirical analysis on threat intelligence: Data characteristics and real-world uses | |
| Fryer et al. | Malicious web pages: What if hosting providers could actually do something… | |
| Thomas | The role of the underground economy in social network spam and abuse | |
| AT&T | ||
| Chachra | Understanding URL abuse for profit | |
| Alowaisheq | Security Traffic Analysis Through the Lenses Of: Defenders, Attackers, and Bystanders | |
| Miramirkhani | Methodologies and tools to study malicious ecosystems |